Blog

Internet explorer

Internet Explorer is Dead – What you need to do now

Internet explorer is finally coming to the end of its long slow…
Education IT

Education in Focus: Biggest IT Refresh Year Ever

There comes a point in the academic year where exams ramp up,…
Backup webinar recap

Backup Webinar Recap: The Uncomfortable Truths

This week, we hosted a Live Webinar based all around the Uncomfortable…
Conditional Access

What is Conditional Access, and why is it an essential part of your security posture?

By now, you should be aware that the modern digital landscape…
World Backup Day

4 Steps to the Perfect Backup Plan

Today is World Backup Day, for many it's a day to be celebrated,…
Hafnium Attack

HAFNIUM and Exchange Vulnerabilities – What To Do Now…

There has been lots of noise in the press and on social media…
Education Cyber Attack

Education in Focus: Cyber Attacks on the rise while protection remains behind other industries

2020 was far from an easy year for the education sector, with…
sophos MTR vs Security

Sophos MTR vs Security as a Service. What’s the difference?

What is Sophos MTR? Sophos MTR Standard or Managed Threat Response,…
Microsoft Teams Demo

Microsoft Teams Webinar Recap: A record attendance & your questions answered

This week, we hosted a Live Demo Webinar based all around using…
sophos edr

What are the benefits of Sophos Intercept X Advanced with EDR?

Over the last few months, you may have heard the word EDR (Endpoint…
Microsoft Teams as a phone system

Why Microsoft Teams might be the right phone system for your modern business

The continued drive to work from home has increased the pressure…
Ubiquiti Dream Machine

Home security and why I chose the Ubiquiti Dream Machine

We all know that over the last 12 months the U.K. has moved from…

Looking for a technology partner?
Let’s talk