Email Archiving vs. Email Backup: What’s the Difference?

Email Archiving vs. Email Backup: What’s the Difference?

Our emails contain a treasure trove of valuable information – from important work documents to cherished memories in personal correspondences. It’s crucial to safeguard this data, but are you aware of the differences between email archiving and email backup? These two services serve distinct purposes, and understanding their unique features can help you make the…

Microsoft isn’t Responsible for your Business Data – You Are

Microsoft isn’t Responsible for your Business Data – You Are

With Microsoft 365 growing in popularity, this short brief explains the importance of backing-up its data and how you can minimise disruption risk to your business. The Importance of Backing-Up Microsoft 365 Like any other data storage repository, Microsoft 365 can be vulnerable to data loss or corruption and is not automatically protected.  Back-up is…

April 2023 – prices set to rise across the board

April 2023 – prices set to rise across the board

Technology has seen prices fluctuate significantly over the last three years. As the world rushed to work from home we saw hardware shortages combine with the wider silicon chip shortage leaving costs rising. 2022 saw Microsoft introduce their first significant price changes in their subscription model in a number of years and they are set…

Become Cyber Secure with Cyber Essentials

Become Cyber Secure with Cyber Essentials

We are delighted to have recently completed our Cyber Essentials Accreditation and are now helping several customers achieve theirs too. This is a government-backed scheme that will help protect your organisation, whatever its size, against a whole range of the most common cyber-attacks. With Cyber hackers becoming more intelligent and adapting to many counter-hacking measures,…

5 Ways to Stop Cyber-Attacks in their Tracks
|

5 Ways to Stop Cyber-Attacks in their Tracks

How secure are your systems and data? Are your systems regularly monitored for cyber-attacks? Can you be sure any security breaches are stopped in their tracks immediately? Dealing with advanced threats is the most significant concern for cybersecurity professionals and organisations these days. With system downtime, disruption of business operations and reduced productivity costing businesses…

How to check if your PC has been hacked, and what to do next

How to check if your PC has been hacked, and what to do next

Are you concerned that your PC has been hacked? Whatever happens, don’t panic! Here Philip Muncaster from our security partner, ESET, explains ten signs that show your PC has been hacked and gives you handy tips on how to fix it. Global cybercriminals make trillions of dollars each year. Much of their success comes from exploiting the…

Defending the Data Centre: The time to act is now

Defending the Data Centre: The time to act is now

As the war in Ukraine sadly continues, so does the potential for further escalation in kinetic hostilities. At the same time, the odds that the conflict may lead to major cyberattacks against targets beyond Ukraine’s borders seem to shorten. This has put the world on heightened alert, and one critical component of today’s digital-centric world…

Is the Future Passwordless?

Is the Future Passwordless?

Passwords definitely have their disadvantages so could passwordless authentication be the answer? As Microsoft further nudges the world away from passwords, Phil Muncaster from ESET explains what your organisation should consider before going password-free. For such a clumsy sounding word, “passwordless” actually promises to make life a lot easier – for both users and security teams….

Beware of these 5 common scams on Instagram

Beware of these 5 common scams on Instagram

From phishing and clones, to romance and verification badge scams, Amer Owaida at our Security Partner, ESET, explains the most common tactics fraudsters use to trick us on Instagram. Instagram is one of the most popular social media platforms. Indeed, with over one billion monthly active users it is among the top four most popular social media networks in…

A scammer sits, posing as the Ritz

A scammer sits, posing as the Ritz

Not quite the original song lyric but scammers appear to have targeted customers of London’s Ritz Hotel by contacting customers and asking to double check payment details. The BBC article can be found here – https://www.bbc.co.uk/news/technology-53793922 A worrying detail here is that the scammers had an amount of information to hand to make the approach,…

Protect your Business against Ransomware

Protect your Business against Ransomware

With Ransomware increasingly in the news, it is worth remembering the current advice on how best to protect our businesses against Ransomware and ensure these security procedures are in place and fully supported company-wide. 1. Run Software Updates Are you ever tempted to skip software updates as they take up valuable time and perhaps seem…

Be Smart & Not Scared by these Scams!

Be Smart & Not Scared by these Scams!

Changing situations present new opportunities for the dishonest minority and scams, whether by email or telephone, are no exception and are constantly being adapted to spoof the unsuspecting. Many of us will have received emails advising that we are in line for a small fortune of overseas wealth……subject to confirming our banking details or covering…

5 Key Considerations for Effective Communication in the Workplace

5 Key Considerations for Effective Communication in the Workplace

Communication is key to a successful business these days but just what is key to successful communication? With information being exchanged through a variety of communication channels both internally and externally, an organised set up and system for each chosen communication channel will help your company run efficiently, boost productivity and reduce stress. Companies and…

A Picture Paints a Thousand Words – 3 Easy Ways to Snap a Screenshot

A Picture Paints a Thousand Words – 3 Easy Ways to Snap a Screenshot

“The screen says, something, something, error, random numbers” “OK, I’m going to need to see a copy of that error, could you send me a screenshot please?” “I don’t know how, please help!” This is a situation we often come across. Passing along screenshots is simple enough but if you don’t know how to then…

Behind-the-Scenes Support Gives you Peace of Mind

Behind-the-Scenes Support Gives you Peace of Mind

We are here to support you with any ad hoc IT issues whenever you need us – on the phone or on-site. We also provide behind-the-scenes support in order to ensure all IT systems are running smoothly and resolve any issues as they occur. In early 2017 we took on a new client who was unhappy with both the reliability of their network and…

Backup and beyond – the business continuity you always wanted but couldn’t afford

Backup and beyond – the business continuity you always wanted but couldn’t afford

I’m not quite old enough to have worked with spools of half inch tape but magnetic tape was certainly the go-to medium for data backup on the first networks I managed. Backup solutions have changed considerably over the years – where we once talked about data backups we now talk about disaster recovery and business…

Smile, you’re on Camera!

Smile, you’re on Camera!

CCTV systems have been available for a long time whether providing monitoring, safety or security. In keeping with other areas of technology (telephony, audio-visual, etc.) selecting camera solutions which integrate with the network broadens the functionality with multiple points of access on site or remotely, email notification of activity, etc. VCI is able to help…

Encryption: How to wish your data a safe journey

Encryption: How to wish your data a safe journey

One of my defining memories of childhood holidays is the Tetris-like exercise of squeezing everything into the small family car (suitcases, rucksacks, travel games, sleeping bags, etc.) closely followed by the last minute checks. Are the passports packed, is the road atlas to hand (no sat-nav back then), last check of fuel, coolant, oil and…

Right from the Start – Benefiting from Experience

Right from the Start – Benefiting from Experience

The trouble with learning from experience is that the lesson is delivered just after the knowledge is required. This, of course, is one of the reasons we turn to others to benefit from the broader, collective experiences whether that be friends and colleagues or suppliers and consultants to a business. It is far from unusual…

Don’t be spooked by GDPR – Be Aware & Prepare for changes in Data Protection Regulations

Don’t be spooked by GDPR – Be Aware & Prepare for changes in Data Protection Regulations

With the General Data Protection Regulations (GDPR) coming into force on 25th May 2018, we take a look at the initial strides you can take in ensuring your data and IT systems will be fully compliant. The changes in regulations may seem a little daunting but hopefully, as with everything, breaking them down into more…

Life on the Edge….or IE11 for W7 and W8 users

From 12th January 2016, Microsoft is no longer offering support for any versions of Internet Explorer other than the latest v11 (for Windows 7, 8 and 8.1) or Edge for Windows 10 (though IE11 remains an installed option). In Microsoft’s own words, “Internet Explorer 11 offers improved security, increased performance, better backward compatibility, and support…

The Heartbleed Bug – do you need to act?

The latest concern regarding the safety of a cyber world has come in the form of the Heartbleed bug, the potential compromise of a system intended, ironically, to safeguard user data. The BBC has a good article outlining the flaw and surrounding issues – http://www.bbc.co.uk/news/technology-26954540 The headline of “Heartbleed Bug: Tech firms urge password reset”…