How To

[et_pb_section bb_built="1" admin_label="section"][et_pb_row admin_label="row" background_position="top_left" background_repeat="repeat" background_size="initial"][et_pb_column type="4_4"][et_pb_text admin_label="Intro" background_layout="light" background_position="top_left" background_repeat="repeat" background_size="initial" _builder_version="3.0.102"] There are two methods to set up an Outlook Out of Office (Automatic Replies) when using Microsoft's Office 365. You can use the local Outlook application or the Outlook Web App via...

[et_pb_section bb_built="1"][et_pb_row _builder_version="3.0.83"][et_pb_column type="4_4"][et_pb_text _builder_version="3.0.105" custom_padding_last_edited="on|desktop" background_layout="light" header_2_font="|600|||||||" header_2_font_size="20px" header_2_text_color="#0c71c3"] What should business look for in their Outsourced IT Provider? [/et_pb_text][et_pb_text _builder_version="3.0.105" custom_padding="|100px||" custom_padding_last_edited="on|desktop" background_layout="light" header_2_font="|600|||||||" header_2_text_align="left"] One of the hardest decisions any business needs to make is who their partners will be. This is especially true when...

[et_pb_section fb_built="1" admin_label="section" _builder_version="3.22"][et_pb_row admin_label="row" _builder_version="3.25" background_size="initial" background_position="top_left" background_repeat="repeat"][et_pb_column type="4_4" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_text _builder_version="3.27.4" background_size="initial" background_position="top_left" background_repeat="repeat" border_style="solid"]Are you prepared in the event of data loss, natural disaster, cyber-attack, hardware failure or human error? Every business has to prepare for the worst. That’s why we put...

[et_pb_section admin_label="section"][et_pb_row admin_label="row"][et_pb_column type="4_4"][et_pb_text admin_label="Text" background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid"] You may have heard of Moore's Law which is an observation of the speed in the advancement of computing power. The most simplistic way to describe this is that computing power doubles roughly every year to...

[et_pb_section bb_built="1" admin_label="section"][et_pb_row admin_label="row" background_position="top_left" background_repeat="repeat" background_size="initial"][et_pb_column type="4_4"][et_pb_text background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid" background_position="top_left" background_repeat="repeat" background_size="initial" _builder_version="3.0.69"] Today’s big IT advantages come with major risks. Your networks and systems serve as your silent partner in operations. Should they fail – and when they do, it’s usually...

[et_pb_section bb_built="1" admin_label="section"][et_pb_row background_position="top_left" background_repeat="repeat" background_size="initial"][et_pb_column type="4_4"][et_pb_text background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid" background_position="top_left" background_repeat="repeat" background_size="initial"] Our Desktop Assistant, Monitoring & Automation tool - Sentinel is getting an upgrade, new code that allows us to make use of available technology, improving the services we deliver to our...

[et_pb_section bb_built="1" admin_label="section"][et_pb_row admin_label="row" background_position="top_left" background_repeat="repeat" background_size="initial"][et_pb_column type="4_4"][et_pb_text background_layout="light" use_border_color="off" background_position="top_left" background_repeat="repeat" background_size="initial" _builder_version="3.0.100"] Security breached are costly and rarely a day goes without you seeing a headline about a new data breach. You might wonder how best to keep yourself safe online. One simple advice:...

[et_pb_section bb_built="1" fullwidth="off" specialty="off"][et_pb_row background_position="top_left" background_repeat="repeat" background_size="initial"][et_pb_column type="4_4"][et_pb_text background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid" background_position="top_left" background_repeat="repeat" background_size="initial"] A strong password is your first defence against hackers and cyber criminals. This month is Cyber Security Awareness Month, we will share simple tips on how to create secure password...

[et_pb_section bb_built="1" admin_label="section"][et_pb_row admin_label="row" background_position="top_left" background_repeat="repeat" background_size="initial"][et_pb_column type="4_4"][et_pb_text background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid" background_position="top_left" background_repeat="repeat" background_size="initial"] In 2015, we observed an increase of macro-based malware along with the spike in spam volume. The majority of the macro-based attacks often start with spammed messages containing attachments such...

[et_pb_section admin_label="section"][et_pb_row admin_label="row"][et_pb_column type="4_4"][et_pb_text admin_label="Text" background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid"] There are numerous ways to spot a fake email. The list below is not exhaustive but covers most common types of phishing attempts. [/et_pb_text][et_pb_text admin_label="Text" background_layout="light" text_orientation="left" use_border_color="off" border_color="#ffffff" border_style="solid"] The message contains poor spelling and grammar [/et_pb_text][et_pb_text admin_label="Text"...