Yearly Archives: 2019

Office 365 Popularity Grows…as does its potential vulnerability

Since its introduction, Microsoft’s Office suite products have clearly been the tools of choice for most of the world’s businesses.

The online subscription version – Office 365 – vastly improved the user experience and arguably the affordability of these critical software apps. Office 365 is a rightly popular, brilliant, piece of software that we highly recommend but the rise of adoption appears to be in line with that of security compromise according to a recent report published by the National Cyber Security Centre (NCSC)…

Are You Doing Enough on Mobile Device Security?

We all want to do our best to keep our corporate data and systems safe. Each year, organisations invest millions in firewalls, anti-virus software, training and patching programmes. But how much of this is directed at mobile devices?

In this article, Grant McGregor consultants consider the bare minimum you should be doing to protect and secure the mobile devices you and your users are carrying wherever you go.

How setting up SOPs can help you deal with IT points of failure

Creating Standard Operating Procedures (SOPs) covering your core technology is valuable even within a small business. It will save you a lot of stress when having to deal with critical events and help your team when having to think and act under pressure. Moreover, setting up proactive actions will help you avoid such stressful situations to begin with.

Here are some key tips to follow when looking at your SOPs and points to consider if your current operating procedures are lacking or need to be rebooted…

Passwords: Can we live without them?

Today, passwords form one of the major cornerstones of our digital era, providing us with peace of mind in almost everything we do, locking down our internet banking accounts, credit cards, mobile phones and our laptops in order to keep personal data secure.

The problem with this is that we end up with so many different passwords for so many things.

Wouldn’t a future where we didn’t have to remember a huge list of passwords be truly incredible?

Windows Server 2008 R2 Approaching End of Life

Are you still using Windows Server 2008 R2 within your business IT environment? If so, it’s time to start planning a migration strategy as the server technology approaches its end of life.

We’ve covered the withdrawal of support for Windows 7 in an earlier post. Here, we are going to take a look at what businesses need to do to respond to the Windows Server 2008 challenge.

Urgent Call to Action if You Are Using Windows 7

Are you using the Windows 7 operating system on your PCs and laptops? If so, it is time to take action and start planning an upgrade to Windows 10.

We’re now less than a year away from the date that Microsoft will stop providing free support for Windows 7.

5 Things Every BYOD Policy Needs

Bring Your Own Device (BYOD) policies are rapidly gaining traction in the modern workplace owing to the flexibility and convenience they provide to both employees and their employers. However, just like any other major change in the workplace, BYOD comes with its fair share of challenges.

Therefore, you need a carefully thought-out BYOD policy that protects your corporate apps and, more importantly, your data while upholding the rights of your employees.

Supporting Work Life Balance Through Technology

Organisations in the UK have a legal obligation to consider employee requests to work flexibly. Yet beyond this requirement, many businesses now realise that work life balance attracts better talent, and also helps rather than hinders productivity.

We take a look at how you can offer flexible working through technology securely…

Advancing Your IT Strategy: How to Identify Critical Vulnerabilities and Points of Failure

In a recent blog, we looked at the five steps required to develop an effective IT strategy. In this article, we will take a deeper look into one of these key stages: how to identify critical vulnerabilities and points of failure.

The Five Vital Components to Think About When Creating a New IT Strategy

Developing an IT strategy can be a daunting task to start, especially if you’ve not done it before.

Our new guide helps to demystify the process and offers a five-step approach to help you to get it done.