• According to IT Support Providers Using End-of-Life Computers is Dangerous: A Comprehensive Insight In today’s rapidly advancing technological world, keeping up with the latest computer systems might seem challenging, especially for those who are budget conscious. However, the use of end-of-life (EOL) computers – those that have reached the end of their regular support and […]

  • Hello, Last week, our security team reiterated some recommendations that we will confirm are implemented in your environment. Here are some protocols we are going to be confirming or enabling. Multi Factor Authentication is enabled and REQUIRED for all employees. Conditional Access – People and computers must meet certain conditions to log in to your […]

  • When you think about tools for remote working and chatting online, one of the first names in your mind is Zoom. But its popularity has opened the door for cyber criminals. They’re using its name to steal sensitive data. Researchers have discovered at least six convincing-looking download sites. They’re not the real thing. They’re designed […]

  • Microsoft has become the leader of productivity over many decades. Can you imagine doing your day to day work without their software? So, it’s no surprise the tech giant recently conducted a major new survey into productivity in the workplace – and some of the results might surprise you. Researchers surveyed 20,000 people working for […]

  • Last week there were stories that a password manager called LastPass had seen some of its customers’ master passwords compromised. The company denies that happened. And it’s possible that some of the people who reported being affected had old accounts with master passwords they’d used with other services. Do you use a password manager in […]

  • A new survey just released by a specialist website has confirmed that phishing attacks remain the greatest cyber security threat to businesses. Phishing is where a hacker sends you an email pretending to be from someone else. They might fake an email from your bank, for example. When you click a link in the email, […]

  • A couple months ago, we got a call from a new potential client.  For the purposes of this story, we’ll call them VeeCo.  VeeCo used to have an IT service provider, but they ended the relationship a couple years ago when they realized they could save money by having one of their computer-savvy phone technicians […]

  • In 2019, two thirds of all organizations reported some type of incident relating to cyber-crime. You could make a sure bet this figure rose significantly last year, thanks to criminals taking advantage of the pandemic. It’s easy to look at big figures like these, and not relate them back to your own business. But here’s […]

  • It is difficult to give a concise answer to what IT services will cost because every client is different and IT companies offer different services and different models of service delivery. Read this article for a description of the different service delivery models. Companies offering a Break/Fix model usually charge an hourly rate. Since clients […]