0800 054 6789
Does your business telephone system meet your needs?
Posted by Simon Dunstan on 23/05 at 10:00 AM Telephone systems, Unified communications, ShoreTel,
ShoreTel Connect modern day telephone system image

If your telephone system works, you might think that’s all that matters. But thinking that all you need is a dial tone could be preventing your users from communicating effectively – internally and externally. If you’re using a legacy PBX system, it may not be meeting the evolving...

I was hacked by my toaster!
Posted by Ash Khagram on 19/05 at 10:00 AM Security,
I was hacked by my toaster blog

The launch of a smart toaster made the rounds across the web recently. This new device connects to your WiFi and allows users to use an app to monitor the temperature and duration of toast, bagel, crumpet and other edible items to ensure they don’t burn or are undercooked.  The...

Three simple steps to fight ransomware
Posted by Colin Woods on 17/05 at 10:00 AM Data centre, Disaster recovery, Security,
Three top tips to protect yourself from ransomware image

Just as the WannaCry ransomware attack has started to dip out of the headlines, the National Security Crime Centre has issued a stark warning.It seems the National Security Crime Centre is convinced that more ransomware attacks will follow. Ransomware attacks see cyber-thieves...

Information at our fingertips
Posted by Caroline Moore on 16/05 at 10:00 AM Data centre, Disaster recovery,

As Exeter Chiefs head towards the semi-final of the Premiership season, we reflect on how always-available data forms a part of the team’s working week.In this video, Gareth Steenson describes how all their on-field activity is catalogued into video clips and all they do is click...

Why law firms need to protect themselves against cyber-crimes
Posted by Caroline Moore on 15/05 at 01:43 PM Law firms, Security,

Law firms pose an attractive prospect to hackers. The funds they handle and the client details they store make them ripe for ransom, trade and blackmail.This infographic summarises the daily risk and challenges law firms face and how they can help protect themselves against cyber...

NHS cyber-attack will surely make businesses take notice of security
Posted by Caroline Moore on 15/05 at 10:00 AM Security,
Protect yourself from cyber hackers

With the ramifications of Friday’s cyber-attack on the NHS still being keenly felt today, maybe other businesses and organisations will finally sit up and take notice of the very real threat hackers pose.As everyone must be aware by now, the NHS was part of a global ransomware...

So long Exchange 2007, Hello Office 365
Posted by Ash Khagram on 12/05 at 10:00 AM Office 365,

Microsoft's 10-year lifecycle on products has now retired Exchange 2007. As the evolution of Cloud solutions increases, more companies are migrating to Exchange Online with seamless migration into Office 365 and its additional security/spam functions. Our infographic looks at the...

Why the legal sector is so vulnerable to cyber-attack
Posted by Caroline Moore on 09/05 at 10:00 AM Security,
Why the legal sector is so vulnerable to cyber-attack

Figures reveal that the legal sector is one of the most vulnerable industries when it comes to cyber-attack. In fact, 73% of the UK top 100 law firms were the target of attacks last year making it a very real concern for managing partners, compliance officers and, if in place, IT...

Law firms: If only you had more time….
Posted by James Hooker on 05/05 at 10:00 AM Legal, Unified communications, Law firms, Unified communications, Video conferencing,
SWComms video conferencing blog post image

Is video conferencing the answer to lawyers juggling the needs of several clients and multiple meetings?  You have several cases to deal with today and they are all in different locations. Time, as always, is of the essence. You could possibly defer a meeting or delegate someone...

The threat from baby face hackers
Posted by Ash Khagram on 02/05 at 10:00 AM Security,
Protect your data from hackers of every age

What is the average age of a hacker? The rather shocking answer is 17 years old, but there have been reports of suspects as young as 12 being part of a cyber-crime organisation. A recent survey by the National Crime Agency (NCA) has outlined how easy it is for young people to acquire...

Page 1 of 39 pages  1 2 3 >  Last ›