Have you ever had one of those times where you have accidently sent an email to the wrong contact or forgot to add an attachment and wish you could undo the email? Well, you are in luck because if you use Outlook then you have access to do this. Recalling an Email Within Outlook, click on your Sent Items folder and look for the email that you need to recall. It will be at the top if the list of you have your items sorted by most recently sent. Double click on the email to open it in a new
Regardless of how good your organization’s password policies are, relying on passwords as your sole security measure just isn’t enough to resist some of today’s more advanced threats. This is why we—along with most other industry and security experts—recommend that two-factor authentication (2FA) be rolled out organisation wide. Let’s look at some of the options available for 2FA, and the added security it can introduce. First of all, we should clarify something: any form of two-factor authentication is better than using just a password. There are three main ways for a password to be compromised, after all. It could be
The shocking fact about business systems and technology is that they can go out of date very quickly. How do you keep up with new technologies and make sure you have a competitive advantage? That’s easy – Conduct an IT audit! In this article, we will outline the simple steps your IT provider should be doing on an annual basis to keep you informed, and your business up to date with the latest IT technologies. An annual IT audit should be set in the diary when this takes place very much depends on your business operation. A good rule of
The most significant cyber risk to your business is the lack of awareness the workforce has about cyber attacks. With an ever-increasing, more complicated threat landscape, ongoing user awareness is a crucial component of a secure business. In this article, we are going to outline three of the most effective things you can do to help increase the awareness of cyber attacks in your business. Simulated Cyber Attacks Simulated phishing attacks can help educate your staff on how to spot a fake email. There are a number of software solutions on the market now that will simulate a phishing attack
Not so many years ago, business IT firms all over the globe were making huge sums of money selling servers and physical technology solutions to small local businesses. In many instances, it helped the small local business scale at speed using the latest technology. These servers and IT infrastructure all required management and support. However, since the dawn of cloud computing, the business IT support model has been changing. The business no longer prioritises physical technology solutions but instead is now looking at business goals achieved with the assistance of technology. In this article, I will outline three examples of
Not so long ago, many businesses were protected by antivirus solutions that would stop almost all of the nasty surprises landing in your internal corporate network and was the main way to secure your business. However over the years, the game has changed, and cyber crooks are using far more advanced methods of infiltrating local businesses. In this article, you will learn a simple tactic that will help secure your business and keep your workforce safe from a cyber attack. It’s not 100% full proof, but if you don’t have this implemented in your business, then you should really be
I’m sure you’ll agree that the world, and parts of your business have been tipped upside down over the last 12 months. Many businesses were caught off guard, but we’ve helped almost all survive through the use of flexible technology while working from home. Here are some of the most critical lessons many of us in the world of tech have learned to help you thrive: Working from home is workable. Armed with a laptop, internet connectivity and Office 365, we helped many of our biggest customers transition to a work from home environment on a semi-permanent basis. There were
With most businesses now on the Office 365 platform, we’re always looking for ways to help improve the efficiency of your workforce. In this article, we’re going to outline some of the most interesting features in Office 365 you might not be aware of. As an added bonus, tip number three will save you time and money. 1) Sending Videos to others. If you are trying to explain something, there’s nothing better than using video. Be it a staff induction video or training on the latest finance system, video can help your team communicate effectively. Most are not aware of
As companies grow in size and workflow complexity, their IT support grows (or at least should grow) alongside them. In the beginning, start-ups and mum-and-dad small businesses often opt for IT support from someone they know – often a friend or family member. This IT support resource is usually in place on an hours-plus-materials basis and only called in when there is a problem with their computers. But as an organization begins to mature, company leadership realizes the need for ongoing IT maintenance and support from a more advanced IT resource. The considerations then often come down to two options:
When you hear the term “Cyber Whaling Attack,” maybe your mind goes to Captain Ahab and his dogged pursuit of the giant white whale in the classic novel, Moby Dick. And you would be right. Except, in this case, you – the manager or executive – are the whale that’s hunted. Why? Because you have high-level access to your company’s IT environment, personnel records, client files, financial information, and proprietary data. You are the whale that the cybercriminals want to land — because you have unprecedented access. Cyber Whaling attacks are a specialized area of the more common phishing attacks
any questions about your current IT Support
or need our help with getting better service?
Feel free to give us a call or fill out the form below. We always like making new friends!