Author: admin

[et_pb_section bb_built="1" admin_label="section"][et_pb_row admin_label="row" background_position="top_left" background_repeat="repeat" background_size="initial"][et_pb_column type="4_4"][et_pb_text admin_label="Intro" background_layout="light" background_position="top_left" background_repeat="repeat" background_size="initial" _builder_version="3.0.102"] This blog outlines how to set up Outlook auto forward, including Outlook Web App. You can use Outlook Inbox Rules to forward any messages you received that match conditions specified in the Rule...

[et_pb_section bb_built="1" admin_label="section"][et_pb_row admin_label="row" background_position="top_left" background_repeat="repeat" background_size="initial"][et_pb_column type="4_4"][et_pb_text admin_label="Intro" background_layout="light" background_position="top_left" background_repeat="repeat" background_size="initial" _builder_version="3.0.102"] There are two ways to set up an email account on iOS. This blog will show you step by step how to set up automatically and manually your email account on iPhone,...

[et_pb_section bb_built="1" admin_label="section"][et_pb_row admin_label="row" background_position="top_left" background_repeat="repeat" background_size="initial"][et_pb_column type="4_4"][et_pb_text admin_label="Intro" background_layout="light" background_position="top_left" background_repeat="repeat" background_size="initial" _builder_version="3.0.102"] There are two methods to set up an Outlook Out of Office (Automatic Replies) when using Microsoft's Office 365. You can use the local Outlook application or the Outlook Web App via...

[et_pb_section bb_built="1" _builder_version="3.0.47"][et_pb_row _builder_version="3.0.47" background_size="initial" background_position="top_left" background_repeat="repeat"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.100" background_layout="light"] This month is a special month for Urban Network: our 15th anniversary! [/et_pb_text][et_pb_text _builder_version="3.0.100" background_layout="light"] In 2003, our founders Perry and Stuart quit their jobs and embarked on a journey with a vision of becoming a leading IT...

[et_pb_section bb_built="1" fullwidth="off" specialty="off" transparent_background="off" allow_player_pause="off" inner_shadow="off" parallax="on" parallax_method="off" padding_mobile="on" make_fullwidth="off" use_custom_width="off" width_unit="on" make_equal="off" use_custom_gutter="off" custom_padding="0px||0px|" custom_padding_tablet="0px||0px|"][et_pb_row][et_pb_column type="2_3"][et_pb_divider _builder_version="3.0.83" height="40px" /][et_pb_text background_layout="light" background_position="top_left" background_repeat="repeat" background_size="initial" _builder_version="3.0.96" module_alignment="left" header_2_font="|600|||||||" header_2_font_size="20px" header_2_line_height="1.3em" header_2_text_color="#0c71c3"] Imagine if you were hit with a major server failure...

[et_pb_section bb_built="1" next_background_color="#000000"][et_pb_row _builder_version="3.0.83"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.92" custom_padding_last_edited="on|phone" background_layout="light"] Patch Management is one of the five key technical controls required in the UK Government-backed Cyber Essentials Scheme. [/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version="3.0.83"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.92" custom_padding_last_edited="on|desktop" background_layout="light" header_2_font="|600|||||||" header_2_font_size="20px" header_2_text_color="#0c71c3"] Why Patch Management is important? [/et_pb_text][et_pb_text _builder_version="3.0.92" background_layout="light"] Vulnerabilities or security flaws are common in...

[et_pb_section bb_built="1" next_background_color="#000000"][et_pb_row _builder_version="3.0.83"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.92" custom_padding_last_edited="on|phone" background_layout="light"] Malware Protection is one of the five key technical controls required in the UK Government-backed Cyber Essentials Scheme. [/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version="3.0.83"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.92" custom_padding_last_edited="on|desktop" background_layout="light" header_2_font="|600|||||||" header_2_font_size="20px" header_2_text_color="#0c71c3"] Why Malware Protection is important? [/et_pb_text][et_pb_text _builder_version="3.0.92" background_layout="light"] An organisation should implement robust malware software...

[et_pb_section bb_built="1" next_background_color="#000000"][et_pb_row _builder_version="3.0.83"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.92" custom_padding_last_edited="on|phone" background_layout="light"] Access Control is one of the five key technical controls required in the UK Government-backed Cyber Essentials Scheme. [/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version="3.0.83"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.92" custom_padding_last_edited="on|desktop" background_layout="light" header_2_font="|600|||||||" header_2_font_size="20px" header_2_text_color="#0c71c3"] Why Access Control is important? [/et_pb_text][et_pb_text _builder_version="3.0.92" background_layout="light"] This control aims to ensure that only...

[et_pb_section bb_built="1" next_background_color="#000000"][et_pb_row _builder_version="3.0.83"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.92" custom_padding_last_edited="on|desktop" background_layout="light"] Secure Configuration is one of the five key technical controls required in the UK Government-backed Cyber Essentials Scheme. [/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version="3.0.83"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.92" custom_padding_last_edited="on|desktop" background_layout="light" header_2_font="|600|||||||" header_2_font_size="20px" header_2_text_color="#0c71c3"] Why Secure Configuration is important? [/et_pb_text][et_pb_text _builder_version="3.0.92" background_layout="light"] A new computer, network devices or installed...