

10 Unnerving Facts About Cybercrime During The Covid-19 Pandemic
2020 has had no shortage of difficult headlines. The pandemic has touched our lives in unprecedented ways. It has put health at risk, business at risk, social lives on hold. The pandemic has also emboldened cyber criminals. Many are using the Covid-19 crisis to profit from malware and social engineering attacks.
Read more
How to formulate a disaster recovery plan
What do you think of when you hear the word ‘disaster’? Perhaps it is an earthquake, or a wildfire, or maybe a global pandemic. Have you considered the word disaster in the context of your business? Every year, thousands of businesses face disasters in the form of cyber-attacks or hardware failure. These disasters can disrupt day-to-day business or, in some cases, can put a company out of business entirely.
Read more
Multi Factor Authentication: What it is, why you need it & how to use it.
These days, passwords are no longer being viewed as the most secure way to protect an account. Cyber criminals are advancing at an exponential rate as are the ways in which they can find out your credentials. By only using a password as an authentication method, the security of an account is based solely on the strength of a password, which, as years of research has proven, is not generally very strong – two-thirds of people use the same password everywhere, and many of the passwords they use are easily guessed.
Read more
Remote Desktop Service vs VPN: What is best for your business?
Since the start of the Coronavirus pandemic, we have seen a huge move towards the use of remote access technologies such as Remote Desktop Services and VPNs. The move came as many organisations were being urged to have their employees work from home in order to prevent the spread of Coronavirus – according to research, RDS use is up by 41% and enterprise VPN use is up by 33%.
Read more
The end of Privacy Shield: What does it mean?
On July 16th, The European Court of Justice (ECJ) officially declared that the EU-US Privacy Shield, a key data sharing mechanism, is invalid as they believe it fails to protect people’s rights to privacy and data protection. The historic decision will have substantial consequences and be a major headache for thousands of organisations that already exchange data with the US.
Read more
5 ways to secure remote working
2020 has been a turbulent year. The COVID-19 pandemic has caused major disruption to the global economy and has changed the way we all live our lives. However, as cases fall throughout the UK, we are seeing a gradual return to the workplace for many. Indeed, Government advice on home working changes from August 1st, and employees will now be actively encouraged to return to their place of work. That being said, the example of Leicester and the recent rise in cases in Spain, serves as a reminder that we will be living with this virus for many months to come, and localised lockdowns can come very suddenly.
Read more
How to conduct an IT audit in-house [+Free Template]
The word ‘audit’ is often enough to strike fear into even the most resolute business owners. What issues will an audit raise? Will I have to fix them right away? What if it is bad news?
Read more
5 cyber security trends to look out for in 2020
2019 was an interesting (and eventful!) year for cyber security. Breaches were hitting the headlines almost every week. According to research, the number of data breaches increased by 54% in the first half of 2019, with nearly 4,000 publicly disclosed breaches during that time.
Read more
How does Cloud CCTV Recording work?
In a previous blog, we discussed Cloud CCTV and how it works for businesses. We discussed how Cloud CCTV differs from “traditional” CCTV, how it works for the end user, and how you can take advantage of this service. In this blog, we will go slightly further, describing exactly how the recording function of Cloud CCTV works in a technical sense. This blog will help you to understand where your CCTV recordings go, what effect that has on your internet bandwidth, and what the differences are between our two packages: VideoIT Essentials and VideoIT Advanced.
Read more
What is Cloud CCTV and how does it work?
The Background We are all familiar with Closed-Circuit Television (CCTV). It has been around for some time. The concept is a series of video-recording cameras which record imagery for use in securing buildings. It helps to give owners an overview of footfall and activity, as well as deterring criminal activity and for use as evidence to prosecute should that be required.
Read moreSubscribe here!
Recent Posts
Posts by tag
- technology (125)
- Security (101)
- cyber security (89)
- IT Security (86)
- Cloud (66)
- Microsoft 365 (66)
- modern technology (65)
- Managed Service (64)
- business (61)
- cloud computing (59)
- IT support (58)
- cyber attack (57)
- cloud it (54)
- microsoft (54)
- workplace (54)
- Microsoft Teams (53)
- Working from home (50)
- productivity (49)
- cybersecurity (47)
- office (46)
- office 365 (44)
- IT (41)
- entrustit (39)
- Uncategorised (38)
- employees (38)
- Password Security (37)
- flexible work (36)
- Remote (33)
- efficiency (31)
- Hosted Workspace (30)
- hosted desktop (30)
- schools (29)
- Cyber (28)
- independent schools (28)
- school ict (27)
- collaboration (26)
- 2023 (25)
- cyber privacy (25)
- it support bournemouth (24)
- public cloud (24)
- email security (23)
- computing (22)
- it support dorset (21)
- password (20)
- entrust (19)
- passwords (19)
- hosted applications (18)
- it support hampshire (18)
- VoIP (17)
- cloud voip (17)
- covid19 (17)
- hacking (17)
- private cloud (17)
- data (16)
- teamwork (16)
- Coronavirus (15)
- GDPR (14)
- cloud cctv (14)
- hackers (14)
- it support southampton (14)
- msp (14)
- office 365 support (14)
- ransomware (14)
- IT audit (13)
- Protection (13)
- cctv (13)
- covid-19 (13)
- hack (13)
- internet (13)
- it consultancy (13)
- it consultancy bournemouth (13)
- management (13)
- network (13)
- Hosted Desktop and Applications (12)
- Windows Virtual Desktop (12)
- hardware (12)
- hybrid cloud (12)
- it consultancy hampshire (12)
- it support winchester (12)
- 2020 (11)
- 2022 (11)
- Microsoft Planner (11)
- internet safety (11)
- it consultancy dorset (11)
- windows 10 (11)
- IT costs (10)
- data breach (10)
- it consultancy southampton (10)
- phishing (10)
- vulnerabilities (10)
- windows (10)
- Backup (9)
- bitwarden (9)
- digital (9)
- telephony (9)
- attack (8)
- awards (8)
- communication (8)
- desk phone (8)
- education (8)
- eu (8)
- partnership (8)
- planning (8)
- software (8)
- staff (8)
- uk (8)
- Bournemouth (7)
- Google (7)
- Hampshire (7)
- OneDrive (7)
- infrastructure (7)
- mobile (7)
- offsite backup (7)
- outsource (7)
- usecure (7)
- 2019 (6)
- Apple (6)
- Dorset (6)
- IT Director (6)
- Skype for Business (6)
- apps (6)
- architect (6)
- child protection (6)
- cloud storage (6)
- european union (6)
- hacks (6)
- legal (6)
- legal it (6)
- mobile phones (6)
- onsite backup (6)
- password manager (6)
- remote desktop service (6)
- resources (6)
- virus (6)
- 3d design desktop (5)
- Azure (5)
- Desktop (5)
- ISO (5)
- News (5)
- Risk assessment (5)
- Windows 7 (5)
- artificial intelligence (5)
- brexit (5)
- designer (5)
- personal data (5)
- smartphone (5)
- surrey (5)
- website (5)
- Access Management (4)
- Attacks (4)
- BYOD (4)
- Case Studies (4)
- Facebook (4)
- Government (4)
- Microsoft Copilot (4)
- Microsoft Forms (4)
- SharePoint (4)
- VPN (4)
- WannaCry (4)
- award winning (4)
- ios (4)
- law (4)
- legacy (4)
- proactive (4)
- remote learning (4)
- 2021 (3)
- 2024 (3)
- AI (3)
- ChatGPT (3)
- DR (3)
- DR planning (3)
- General (3)
- Google Drive (3)
- Help (3)
- IP (3)
- Local (3)
- NHS (3)
- New Forest (3)
- Thames Valley Tech & Innovation Awards (3)
- The Business Magazine (3)
- Tiva (3)
- Zoom (3)
- big switch off (3)
- budgets (3)
- citrix (3)
- closed cloud (3)
- copilot (3)
- copilot pro (3)
- ddos (3)
- digital hub (3)
- disaster recovery (3)
- guide (3)
- innovation (3)
- instagram (3)
- internet of things (3)
- london (3)
- meetings (3)
- sme (3)
- storage (3)
- teaching (3)
- trump (3)
- twitter (3)
- united kingdom (3)
- 2016 (2)
- 2018 (2)
- CAD (2)
- Cyber Essentials (2)
- Cyber Essentials Plus (2)
- Environment (2)
- Firewall (2)
- GPT-4 (2)
- Gen Z (2)
- ISBA (2)
- Macs (2)
- Microsoft Autopilot (2)
- Mr Mulligans (2)
- PaaS (2)
- Privacy Shield (2)
- Sydenhams (2)
- Tech Company of the Year (2)
- Tech Growth (2)
- Thames Valley (2)
- acquisition (2)
- afc bournemouth (2)
- afcb (2)
- android (2)
- award (2)
- bcs (2)
- berkshire (2)
- broadband (2)
- camcloud (2)
- computer performance (2)
- digital transformation (2)
- downtime (2)
- dropbox (2)
- exhibition (2)
- finalist (2)
- legalex (2)
- macos (2)
- online meetings (2)
- organisation (2)
- paypal (2)
- predictions (2)
- president (2)
- serval systems (2)
- solent (2)
- sophos (2)
- strategy (2)
- us (2)
- video conferencing tools (2)
- windows 11 (2)
- wireless internet bournemouth (2)
- 1998 (1)
- 5G (1)
- AI CCTV (1)
- AMD (1)
- ARM (1)
- Abbey Hill (1)
- Aldwickbury Park (1)
- BBC (1)
- BGL Company (1)
- BUNKERS! (1)
- Birchwood Park (1)
- Bourne Group (1)
- Burhill (1)
- Burhill Group (1)
- Burnout (1)
- CEO (1)
- Central South Business Awards (1)
- Cloud VMS (1)
- Cloudtango (1)
- Dorset Chamber (1)
- EDR (1)
- Go Integrator (1)
- Growth 100 (1)
- Harvey Jones Kitchens (1)
- High Growth (1)
- Hoebridge (1)
- Ignite 2018 (1)
- Ignite 2020 (1)
- Intune (1)
- LLM (1)
- Leaders (1)
- Loop (1)
- M&A (1)
- MFA (1)
- MSP Select 2024 (1)
- Market (1)
- May (1)
- Multi Factor Authentication (1)
- MyAnalytics (1)
- Ninja Warrior UK (1)
- PBX (1)
- PM (1)
- Power BI (1)
- Ramsdale Park (1)
- Redbourn (1)
- Regulation (1)
- Reid Steel (1)
- Surrey Business Awards (1)
- Thornbury (1)
- WCry (1)
- WannaCrypt (1)
- Wifi (1)
- Wycombe Heights (1)
- ashley madison (1)
- b2b (1)
- bandwidth (1)
- battersea (1)
- beach (1)
- big data (1)
- bloatware (1)
- blockchain (1)
- brand (1)
- builders merchant (1)
- business growth (1)
- cambridge analytica (1)
- canada (1)
- cia (1)
- clinton (1)
- cnn (1)
- compliance (1)
- copyright (1)
- cryptocurrency (1)
- dark web (1)
- dkim (1)
- dmarc (1)
- dns (1)
- donald (1)
- dyn (1)
- eagle eye networks (1)
- east grinstead (1)
- election (1)
- equality (1)
- executive order (1)
- farnham (1)
- fax (1)
- football (1)
- gchq (1)
- grinstead (1)
- intel (1)
- intelligence (1)
- josh widdicombe (1)
- landmarks (1)
- learning (1)
- legal technology forum (1)
- machine learning (1)
- meltdown (1)
- millennials (1)
- mimecast (1)
- mirai (1)
- modern work (1)
- no-deal (1)
- number plate detection (1)
- onsite (1)
- paper (1)
- patisserie valerie (1)
- performance reviews (1)
- pound (1)
- premier league (1)
- private equity (1)
- procrastination (1)
- reading (1)
- recruitment (1)
- research (1)
- sharefile (1)
- smishing (1)
- snowden (1)
- solent business awards (1)
- solentBA (1)
- spectre (1)
- spf (1)
- sterling (1)
- storm (1)
- talktalk (1)
- trumppresident (1)
- ukitawards (1)
- united states (1)
- usa (1)
- vault 7 (1)
- vitality stadium (1)
- whatsapp (1)
- white (1)
- white house (1)
- wikileaks (1)
- wireless internet southampton (1)
- women in business (1)
- xiongmai (1)
- year (1)
- zero touch deployment (1)

10 Unnerving Facts About Cybercrime During The Covid-19 Pandemic
2020 has had no shortage of difficult headlines. The pandemic has touched our lives in..
Read more
How to formulate a disaster recovery plan
What do you think of when you hear the word ‘disaster’? Perhaps it is an earthquake, or a wildfire,..
Read more
Multi Factor Authentication: What it is, why you need it & how to use it.
These days, passwords are no longer being viewed as the most secure way to protect an account...
Read more
Remote Desktop Service vs VPN: What is best for your business?
Since the start of the Coronavirus pandemic, we have seen a huge move towards the use of remote..
Read more
The end of Privacy Shield: What does it mean?
On July 16th, The European Court of Justice (ECJ) officially declared that the EU-US Privacy..
Read more
5 ways to secure remote working
2020 has been a turbulent year. The COVID-19 pandemic has caused major disruption to the global..
Read more
How to conduct an IT audit in-house [+Free Template]
The word ‘audit’ is often enough to strike fear into even the most resolute business owners. What..
Read more
5 cyber security trends to look out for in 2020
2019 was an interesting (and eventful!) year for cyber security. Breaches were hitting the..
Read more
How does Cloud CCTV Recording work?
In a previous blog, we discussed Cloud CCTV and how it works for businesses. We discussed how Cloud..
Read more
What is Cloud CCTV and how does it work?
The Background We are all familiar with Closed-Circuit Television (CCTV). It has been around for..
Read more