sales.enquiries@swcomms.co.uk
0800 054 6789
09/06
2017
Is your business GDPR-ready?
Posted by Ben Squires on 09/06 at 10:00 AM
GDPR law image

With latest figures revealing 71% of UK businesses are unaware of the fines they will incur if they do not meet the EU General Data Protection Regulation (GDPR), I share an industry-wide concern that most businesses will not be ready when the legislation comes into effect...

06/06
2017
Is the Internet of Things safe from hackers?
Posted by Fletcher Wilkinson on 06/06 at 10:00 AM Security,
IoT security image

As the Internet of Things gathers momentum and devices are being developed for use in your home, at work, the car and on your body, how do you know which one is keeping your data safe?When you purchase household appliances, you may decide to check the safety rating and...

02/06
2017
Why your business telephone system should integrate with your applications
Posted by Adam Williams on 02/06 at 10:00 AM Telephone systems, Unified communications, ShoreTel,
ShoreTel Connect business telephone systems image

The technology you use in the office should enhance your ability to do business. That’s what technology does. Yet, the same technology that helped you serve clients better just a short five or 10 years ago can just as easily hinder your staff’s ability to work as fast or...

30/05
2017
IT power failure: Could your business survive a BA-style blackout?
Posted by Colin Woods on 30/05 at 10:00 AM Data centre,
BA IT failure image

With British Airways declaring a power cut as the reason for their IT issues over the bank holiday weekend, we question how this could ever happen.To recap, the airline was hit by a worldwide computer system power failure on Saturday, causing cancellations and delays for...

26/05
2017

Law firms often do not have the time or the in-house resource to research the communications and IT solutions that would best fit their needs. As an independent supplier, we can design a converged solution to alleviate the stress of dealing with multiple suppliers while...

23/05
2017
Does your business telephone system meet your needs?
Posted by Simon Dunstan on 23/05 at 10:00 AM Telephone systems, Unified communications, ShoreTel,
ShoreTel Connect modern day telephone system image

If your telephone system works, you might think that’s all that matters. But thinking that all you need is a dial tone could be preventing your users from communicating effectively – internally and externally. If you’re using a legacy PBX system, it may not be meeting...

19/05
2017
I was hacked by my toaster!
Posted by Ash Khagram on 19/05 at 10:00 AM Security,
I was hacked by my toaster blog

The launch of a smart toaster made the rounds across the web recently. This new device connects to your WiFi and allows users to use an app to monitor the temperature and duration of toast, bagel, crumpet and other edible items to ensure they don’t burn or are...

17/05
2017
Three simple steps to fight ransomware
Posted by Colin Woods on 17/05 at 10:00 AM Data centre, Disaster recovery, Security,
Three top tips to protect yourself from ransomware image

Just as the WannaCry ransomware attack has started to dip out of the headlines, the National Security Crime Centre has issued a stark warning.It seems the National Security Crime Centre is convinced that more ransomware attacks will follow. Ransomware attacks see...

16/05
2017
Information at our fingertips
Posted by Caroline Moore on 16/05 at 10:00 AM Data centre, Disaster recovery,

As we continue to enjoy Exeter Chiefs' first Premiership title, we reflect on how always-available data forms a part of the team’s working week.In this video, Gareth Steenson describes how all their on-field activity is catalogued into video clips and all they do is...

15/05
2017
Why law firms need to protect themselves against cyber-crimes
Posted by Caroline Moore on 15/05 at 01:43 PM Law firms, Security,

Law firms pose an attractive prospect to hackers. The funds they handle and the client details they store make them ripe for ransom, trade and blackmail.This infographic summarises the daily risk and challenges law firms face and how they can help protect themselves...

15/05
2017
NHS cyber-attack will surely make businesses take notice of security
Posted by Caroline Moore on 15/05 at 10:00 AM Security,
Protect yourself from cyber hackers

With the ramifications of Friday’s cyber-attack on the NHS still being keenly felt today, maybe other businesses and organisations will finally sit up and take notice of the very real threat hackers pose.As everyone must be aware by now, the NHS was part of a global...

12/05
2017
So long Exchange 2007, Hello Office 365
Posted by Ash Khagram on 12/05 at 10:00 AM Office 365,

Microsoft's 10-year lifecycle on products has now retired Exchange 2007. As the evolution of cloud solutions increases, more companies are migrating to Exchange Online with seamless migration into Office 365 and its additional security/spam functions.Our infographic...

09/05
2017
Why the legal sector is so vulnerable to cyber-attack
Posted by Caroline Moore on 09/05 at 10:00 AM Security,
Why the legal sector is so vulnerable to cyber-attack

Figures reveal that the legal sector is one of the most vulnerable industries when it comes to cyber-attack. In fact, 73% of the UK top 100 law firms were the target of attacks last year making it a very real concern for managing partners, compliance officers and, if in...

05/05
2017
Law firms: If only you had more time….
Posted by James Hooker on 05/05 at 10:00 AM Legal, Unified communications, Law firms, Unified communications, Video conferencing,
SWComms video conferencing blog post image

Is video conferencing the answer to lawyers juggling the needs of several clients and multiple meetings?  You have several cases to deal with today and they are all in different locations. Time, as always, is of the essence. You could possibly defer a meeting or delegate...

02/05
2017
The threat from baby face hackers
Posted by Ash Khagram on 02/05 at 10:00 AM Security,
Protect your data from hackers of every age

What is the average age of a hacker? The rather shocking answer is 17 years old, but there have been reports of suspects as young as 12 being part of a cyber-crime organisation. A recent survey by the National Crime Agency (NCA) has outlined how easy it is for young people...

Page 2 of 28 pages  < 1 2 3 4 >  Last ›