Blog

UEM Endpoint Device Management

It’s Time Your Business Adopted UEM, And This Is Why!

The way in which we manage our workforces' devices is changing.…
windows 11

Windows 11. Huge Steps Forward, But The Death Of Many Devices

Microsoft have announced Windows 11! For now, we can ignore…
fibre broadband

NOW it’s time to embrace the fibre roll-out!

In the last 12 – 18 months Planet IT has seen a huge rise in…
Education IT Event

Virtual Roundtable Recap: Facing and Overcoming IT Challenges In Education

This week, our panel of special guests came together for an educational…
Internet explorer

Internet Explorer is Dead – What you need to do now

Internet explorer is finally coming to the end of its long slow…
Education IT

Education in Focus: Biggest IT Refresh Year Ever

There comes a point in the academic year where exams ramp up,…
Backup webinar recap

Backup Webinar Recap: The Uncomfortable Truths

This week, we hosted a Live Webinar based all around the Uncomfortable…
Conditional Access

What is Conditional Access, and why is it an essential part of your security posture?

By now, you should be aware that the modern digital landscape…
World Backup Day

4 Steps to the Perfect Backup Plan

Today is World Backup Day, for many it's a day to be celebrated,…
Hafnium Attack

HAFNIUM and Exchange Vulnerabilities – What To Do Now…

There has been lots of noise in the press and on social media…
Education Cyber Attack

Education in Focus: Cyber Attacks on the rise while protection remains behind other industries

2020 was far from an easy year for the education sector, with…
sophos MTR vs Security

Sophos MTR vs Security as a Service. What’s the difference?

What is Sophos MTR? Sophos MTR Standard or Managed Threat Response,…

Looking for a technology partner?
Let’s talk

  • This field is for validation purposes and should be left unchanged.