News & Resources

OUR LATEST
ARTICLES

hero image
article image

TAKE DATA SECURITY SERIOUSLY? HERE ARE THE BIGGEST DATA BREACHES WE HAVE SEEN SO FAR IN 2020

With more and more businesses working in a remote way, Covid-19 has had an impact on a variety of aspects of how we work, and one way is that there is a much higher risk of data breaches.

READ MORE
article image

38 MILLION PEOPLE SUBSCRIBE TO MICROSOFT 365, LEARN HOW TO GET THE MOST FROM IT TODAY

With over 38 million subscribers to Microsoft 365, and in excess of half a billion worldwide using its free applications and services, Microsoft knows a thing or two when it comes to delivering secure, efficient and versatile software.

READ MORE
article image

HOW TO PROTECT MICROSOFT 365 WITH CYBER BACKUP

Microsoft 365 has long been the primary productivity solution for enterprises, but recently it has also become their go-to when it comes to security and resilience. Microsoft 365, however, shouldn’t be seen as a catch-all.

READ MORE
article image

6 WAYS TO IMPROVE YOUR IT SECURITY AND AVOID A RANSOMWARE ATTACK

The recent ransomware attacks on the Irish Health Service show that, regardless of size or industry, any business can be targeted by cybercriminals.

READ MORE
article image

WHAT IS ERP & WHY IS IT IMPORTANT?

The impact that these Enterprise Resource Planning (ERP) systems are having on business is clear, yet what this system is and does, isn’t quite as transparent.

READ MORE
article image

4 REASONS WHY YOU NEED AN ERP SYSTEM

Enterprise resource planning software (ERP) is a suite of customizable applications that can integrate your most important process. ERP’s can provide benefits to your company, no matter what the size.

READ MORE
article image

11 COMMON ATTACK VECTORS TO WATCH OUT FOR IN 2021

The cybersecurity threat landscape is ever-changing, so we’ve compiled a list of the 11 most common attack vectors to watch out for in 2021.

READ MORE
article image

DO I NEED AN OUTSOURCED IT COMPANY?

In a world dependent on technology, future-proofing your business with a solid IT foundation is crucial. Find out about the benefits of outsourcing your IT in our latest blog.

READ MORE
article image

IT OUTSOURCING: 6 ASPECTS TO CONSIDER WHEN SELECTING AN IT PROVIDER

With so many IT providers to choose from, it can be difficult to find the perfect one for your business. This article will discuss 6 aspects to consider when selecting an IT provider that suits your business.

READ MORE
article image

6 CYBERSECURITY THREATS THAT ARE OVERLOOKED BY BUSINESSES

A large component of a strong security posture is ensuring that employees and businesses are aware of cybersecurity threats. No business is completely immune to falling victim to a ransomware attack. In this article, we will discuss 6 cybersecurity threats that are commonly overlooked by businesses.

READ MORE
article image

THE 3 BIGGEST DATA BREACHES OF 2021 SO FAR

Data protection is a primary concern for every business. Here are the biggest data breaches that occurred in 2021…

READ MORE
article image

3 REASONS WHY YOU SHOULD OUTSOURCE IT PROCUREMENT

IT procurement is a term that covers many different procedures for sourcing IT assets. There are many reasons for outsourcing non-core activities. Here are three that can benefit your business...

READ MORE
article image

WHY BUSINESSES SHOULD MIGRATE TO SHAREPOINT ONLINE

With SharePoint Online, businesses can reduce the complexities related to file storage whilst increasing collaboration and productivity. Read our recent blog to find out why your business should migrate to SharePoint Online.

READ MORE
article image

8 WAYS TO PROTECT YOUR PRIVACY ONLINE

Millions of people are unaware of how their personal information is being used, collected or shared online and sometimes exploited by businesses or individuals. For Data Privacy Week, we’re sharing 8 ways that you can protect your privacy online…

READ MORE
article image

5 KEY CHALLENGES OF ENDPOINT SECURITY

The risk of data breaches, cyberattacks and network intrusion has grown exponentially with the rise of hybrid working. Find the 5 key endpoint security challenges that businesses are facing in our latest blog.

READ MORE
article image

THE HUMAN FIREWALL: 6 STEPS TO DESIGN EFFECTIVE CYBERSECURITY TRAINING

In this article, we will discuss what is cybersecurity training, why it is important and the 6 steps to design effective cybersecurity training.

READ MORE
article image

8 WAYS TO PRACTISE INTERNET SAFETY

Social media networking sites and the internet have become an integral part of our online lives, so it's important to know how to stay safe online. For Safer Internet Day, we’re sharing 8 ways that you can practice internet safety…

READ MORE
article image

8 WAYS TO CLEAN UP YOUR COMPUTER SOFTWARE

We all know how frustrating it is when our computers are cluttered and running slowly. So we’ve put together 8 ways that you can clean up your computer software this National Clean Out Your Computer Day.

READ MORE
article image

UKRAINIAN MALWARE ATTACKS: FAKE RANSOMWARE EXPLAINED

On January 13th, The Microsoft Threat Intelligence Center (MSTIC) identified multiple cases of malware targeting organisations within Ukraine. Find more information about the cyberattack and how your business can avoid a similar attack.

READ MORE
article image

SMB CYBERSECURITY: FREQUENTLY ASKED QUESTIONS

As the cybersecurity landscape is constantly changing, it is common for SMBs to have questions about cybersecurity and what they can do to protect their businesses.

READ MORE
article image

4 COMMON DIGITAL TRANSFORMATION CHALLENGES AND HOW TO OVERCOME THEM

Recent technology advancements are driving digital transformation worldwide, with business leaders introducing new IT systems to increase productivity, efficiency and profits.

READ MORE
article image

THE IMPORTANCE OF ZERO TRUST IN A HYBRID WORK ENVIRONMENT

Learn more about the importance of Zero Trust in a hybrid work environment as the workplace model has changed drastically in the past 2 years, now it’s time for your security model to follow suit.

READ MORE
article image

WHAT AZURE ACTIVE DIRECTORY CAN DO FOR YOUR BUSINESS

Businesses looking to implement a hybrid work model require a comprehensive identity and access management solution, such as Azure Active Directory (AAD).

READ MORE
article image

5 REASONS WHY YOUR BUSINESS SHOULD OUTSOURCE THEIR CYBERSECURITY

Is your in-house IT team equipped to stop a cyberattack out of hours? Find out the benefits of outsourcing your cybersecurity requirements in our recent blog.

READ MORE
article image

SHADOW IT: WHAT IS SHADOW IT AND HOW CAN BUSINESSES COMBAT IT?

Learn more about Shadow IT and how to combat it if your company faces a potential security issue due to IT teams' lack of awareness of digital technology.

READ MORE
article image

HOW VOIP WILL REPLACE TRADITIONAL TELEPHONY

ISDN lines are currently being phased out and will be switched off by 2025. Find out how VoIP will replace traditional telephony and how you can prepare for the switch over.

READ MORE
article image

MICROSOFT PLANS TO SAY GOODBYE TO FLASH; BUT IS IT ACTUALLY GOING TO HAPPEN?

Microsoft plans to say goodbye to Flash technology as it is no longer used as much as it once was. In fact, it has been replaced by newer, more secure options such as HTML5, WebGL and WebAssembly.

READ MORE
article image

IS TIGER LAKE THE BEST PROCESSOR FOR THIN LAPTOPS?

The idea of Tiger Lake is that it is designed to assist these thin laptops to do all the things that consumers choose them for. In the second edition of Project Athena, Intel has set out a variety of baseline requirements that meets the needs of modern laptops.

READ MORE
article image

HACKERS HAVE IDENTIFIED A BUG IN WORDPRESS

WordPress has become something that many businesses now rely on to ensure that they can run, that they can create content and that they can share their product or service with the world, however, of late, it seems that there have been some security issues picked up.

READ MORE
article image

THE CLOUD: WHAT IS MICROSOFT AZURE?

Microsoft Azure is one of the world’s leading cloud services that is constantly growing and evolving to ensure that you can stay up to date and ahead of the curve.

READ MORE
article image

THERE’S MORE TO THE CLOUD THAN MICROSOFT 365

For the typical employee, the cloud = Microsoft 365 (formerly Office 365) and easy collaboration. But only using the cloud in a 365 context is a bit like only using a Tesla for driving to the supermarket. The cloud has a myriad of benefits that any business would be insane to overlook.

READ MORE
article image

5 LESSONS TO LEARN FROM 2020 SECURITY BREACHES

Capitalising on the disruption resulting from the move to remote working, cybercriminals ‘prospered’ in 2020...

READ MORE
article image

NEW WINDOWS 11 STARTUP SOUND TEASED BY MICROSOFT

Microsoft is back teasing Windows 11 again. In a new video on YouTube, the software giant has published an 11-minute (ahem) collection of startup sounds from various versions of Windows.

READ MORE
article image

WINDOWS 11: 6 INTERESTING NEW FEATURES FROM MICROSOFT

Microsoft has just announced the next major release of the Windows operating system, Windows 11. We’ve compiled a list of the 6 most interesting changes between Windows 10 and 11.

READ MORE
article image

BETTER BACKUP WITH THE 3-2-2 RULE

Find out about the key benefits of moving to the 3-2-2 rule as it prevents ransomware attacks and in the case of a disaster, the recovery is timely and there is no risk of any loss of data.

READ MORE
article image

8 FEATURES OF MICROSOFT 365 YOU MIGHT NOT KNOW ABOUT

There are many features included in a Microsoft 365 subscription that goes unused as users simply do not know that they exist. We have compiled a list of 8 features in Microsoft 365 that you might not know about.

READ MORE
article image

SECURITY STARTS FROM WITHIN: HOW TO BUILD A SECURITY CULTURE IN YOUR BUSINESS

If a business has a strong security culture, it decreases the chance of falling victim to an attack. Find out more about security culture and what puts a business at risk of a cyberattack.

READ MORE
article image

INTRODUCING AZURE 5: 5 WAYS AZURE CAN SAVE YOUR BUSINESS TIME AND MONEY

Find out how Azure can benefit your business with its cloud platform containing 200 products and cloud services, designed to solve IT challenges, drive innovation and support businesses.

READ MORE
article image

WHAT IS ZERO TRUST SECURITY AND HOW CAN IT BE IMPLEMENTED?

Regardless of the size or industry, all businesses are at risk of a data breach as they store valuable information, especially customer data. If your business is considering moving to a zero trust security model, find out more in our blog.

READ MORE
article image

HACKING HUMANS: HOW TO PROTECT AGAINST SOCIAL ENGINEERING ATTACKS

Find out about the most common social engineering attacks and how to protect your business from giving away sensitive information by hackers breaching your security.

READ MORE
article image

WHAT IS CLOUD SERVICE DELIVERY?

Over the course of the COVID-19 pandemic, Cloud services made remote working a possibility for many companies. But what does a Cloud Service Delivery model do and how do you find the right one for you?

READ MORE