How to formulate a disaster recovery plan
What do you think of when you hear the word ‘disaster’? Perhaps it is an earthquake, or a wildfire, or maybe a global pandemic. Have you considered the word disaster in the context of your business? Every year, thousands of businesses face disasters in the form of cyber-attacks or hardware failure. These disasters can disrupt day-to-day business or, in some cases, can put a company out of business entirely.
Read more
Multi Factor Authentication: What it is, why you need it & how to use it.
These days, passwords are no longer being viewed as the most secure way to protect an account. Cyber criminals are advancing at an exponential rate as are the ways in which they can find out your credentials. By only using a password as an authentication method, the security of an account is based solely on the strength of a password, which, as years of research has proven, is not generally very strong – two-thirds of people use the same password everywhere, and many of the passwords they use are easily guessed.
Read more
Remote Desktop Service vs VPN: What is best for your business?
Since the start of the Coronavirus pandemic, we have seen a huge move towards the use of remote access technologies such as Remote Desktop Services and VPNs. The move came as many organisations were being urged to have their employees work from home in order to prevent the spread of Coronavirus – according to research, RDS use is up by 41% and enterprise VPN use is up by 33%.
Read more
The end of Privacy Shield: What does it mean?
On July 16th, The European Court of Justice (ECJ) officially declared that the EU-US Privacy Shield, a key data sharing mechanism, is invalid as they believe it fails to protect people’s rights to privacy and data protection. The historic decision will have substantial consequences and be a major headache for thousands of organisations that already exchange data with the US.
Read more
5 ways to secure remote working
2020 has been a turbulent year. The COVID-19 pandemic has caused major disruption to the global economy and has changed the way we all live our lives. However, as cases fall throughout the UK, we are seeing a gradual return to the workplace for many. Indeed, Government advice on home working changes from August 1st, and employees will now be actively encouraged to return to their place of work. That being said, the example of Leicester and the recent rise in cases in Spain, serves as a reminder that we will be living with this virus for many months to come, and localised lockdowns can come very suddenly.
Read more
How to conduct an IT audit in-house [+Free Template]
The word ‘audit’ is often enough to strike fear into even the most resolute business owners. What issues will an audit raise? Will I have to fix them right away? What if it is bad news?
Read more
5 cyber security trends to look out for in 2020
2019 was an interesting (and eventful!) year for cyber security. Breaches were hitting the headlines almost every week. According to research, the number of data breaches increased by 54% in the first half of 2019, with nearly 4,000 publicly disclosed breaches during that time.
Read more
How does Cloud CCTV Recording work?
In a previous blog, we discussed Cloud CCTV and how it works for businesses. We discussed how Cloud CCTV differs from “traditional” CCTV, how it works for the end user, and how you can take advantage of this service. In this blog, we will go slightly further, describing exactly how the recording function of Cloud CCTV works in a technical sense. This blog will help you to understand where your CCTV recordings go, what effect that has on your internet bandwidth, and what the differences are between our two packages: VideoIT Essentials and VideoIT Advanced.
Read more
What is Cloud CCTV and how does it work?
The Background We are all familiar with Closed-Circuit Television (CCTV). It has been around for some time. The concept is a series of video-recording cameras which record imagery for use in securing buildings. It helps to give owners an overview of footfall and activity, as well as deterring criminal activity and for use as evidence to prosecute should that be required.
Read more
The top 10 benefits of moving to the cloud.
In today’s world, the cloud has become one of the most talked about buzzwords among business environments, and it’s safe to say that won’t be changing anytime soon. In fact, the cloud is becoming the technology standard for most companies. By the end of 2020, 67% of enterprise infrastructure will be cloud-based.
Read moreSubscribe here!
Recent Posts
Posts by tag
- technology (126)
- Security (107)
- IT Security (95)
- cyber security (95)
- Microsoft 365 (68)
- modern technology (68)
- Cloud (66)
- Managed Service (66)
- IT support (63)
- business (63)
- cloud computing (60)
- cyber attack (59)
- cloud it (56)
- microsoft (55)
- workplace (55)
- Microsoft Teams (53)
- cybersecurity (53)
- Working from home (51)
- productivity (49)
- office (46)
- IT (45)
- office 365 (45)
- Password Security (41)
- employees (39)
- entrustit (39)
- Uncategorised (38)
- flexible work (37)
- Remote (33)
- Cyber (32)
- efficiency (31)
- Hosted Workspace (30)
- hosted desktop (30)
- it support bournemouth (30)
- schools (29)
- independent schools (28)
- cyber privacy (27)
- it support dorset (27)
- school ict (27)
- collaboration (26)
- email security (26)
- 2023 (25)
- it support hampshire (25)
- computing (24)
- public cloud (24)
- it consultancy (21)
- it support southampton (20)
- password (20)
- entrust (19)
- it consultancy bournemouth (19)
- it consultancy dorset (19)
- it consultancy hampshire (19)
- passwords (19)
- IT audit (18)
- hosted applications (18)
- it support winchester (18)
- msp (18)
- VoIP (17)
- cloud voip (17)
- covid19 (17)
- hacking (17)
- it consultancy southampton (17)
- private cloud (17)
- ransomware (17)
- data (16)
- teamwork (16)
- Coronavirus (15)
- cloud cctv (15)
- office 365 support (15)
- GDPR (14)
- IT costs (14)
- cctv (14)
- hackers (14)
- internet (14)
- network (14)
- Protection (13)
- covid-19 (13)
- hack (13)
- internet safety (13)
- management (13)
- Hosted Desktop and Applications (12)
- Windows Virtual Desktop (12)
- hardware (12)
- hybrid cloud (12)
- windows 10 (12)
- 2020 (11)
- 2022 (11)
- Microsoft Planner (11)
- awards (11)
- vulnerabilities (11)
- Hampshire (10)
- data breach (10)
- digital (10)
- phishing (10)
- uk (10)
- windows (10)
- Backup (9)
- IT Director (9)
- bitwarden (9)
- planning (9)
- software (9)
- telephony (9)
- artificial intelligence (8)
- attack (8)
- communication (8)
- desk phone (8)
- education (8)
- eu (8)
- outsource (8)
- partnership (8)
- staff (8)
- usecure (8)
- Bournemouth (7)
- Dorset (7)
- Google (7)
- OneDrive (7)
- award winning (7)
- cloud storage (7)
- infrastructure (7)
- mobile (7)
- offsite backup (7)
- 2019 (6)
- AI (6)
- Apple (6)
- ISO (6)
- News (6)
- Skype for Business (6)
- apps (6)
- architect (6)
- child protection (6)
- european union (6)
- hacks (6)
- internet of things (6)
- legal (6)
- legal it (6)
- mobile phones (6)
- onsite backup (6)
- password manager (6)
- remote desktop service (6)
- resources (6)
- virus (6)
- 3d design desktop (5)
- Azure (5)
- Case Studies (5)
- Cyber Essentials (5)
- Cyber Essentials Plus (5)
- Desktop (5)
- Microsoft Copilot (5)
- Multi-Site Business (5)
- Risk assessment (5)
- Thames Valley Tech & Innovation Awards (5)
- The Business Magazine (5)
- Windows 7 (5)
- award (5)
- brexit (5)
- designer (5)
- ios (5)
- personal data (5)
- smartphone (5)
- sophos (5)
- surrey (5)
- united kingdom (5)
- website (5)
- Access Management (4)
- Attacks (4)
- BYOD (4)
- DR (4)
- DR planning (4)
- Facebook (4)
- Government (4)
- Microsoft Forms (4)
- SharePoint (4)
- VPN (4)
- WannaCry (4)
- computer performance (4)
- ddos (4)
- digital transformation (4)
- disaster recovery (4)
- iot (4)
- law (4)
- legacy (4)
- proactive (4)
- remote learning (4)
- wireless internet bournemouth (4)
- wireless internet southampton (4)
- 2021 (3)
- 2024 (3)
- AI CCTV (3)
- ChatGPT (3)
- Dorset Chamber (3)
- EDR (3)
- General (3)
- Google Drive (3)
- Hampshire Chamber (3)
- Help (3)
- IP (3)
- Local (3)
- NHS (3)
- New Forest (3)
- South Coast Tech & Innovation Awards (3)
- Tech Company of the Year (3)
- Tech Growth (3)
- Thames Valley (3)
- Tiva (3)
- Zoom (3)
- big switch off (3)
- budgets (3)
- citrix (3)
- closed cloud (3)
- copilot (3)
- copilot pro (3)
- digital hub (3)
- guide (3)
- innovation (3)
- instagram (3)
- intelligence (3)
- london (3)
- meetings (3)
- modern work (3)
- online meetings (3)
- sme (3)
- storage (3)
- strategy (3)
- teaching (3)
- trump (3)
- twitter (3)
- windows 11 (3)
- 2016 (2)
- 2018 (2)
- 5G (2)
- Bourne Group (2)
- Burhill (2)
- Burhill Group (2)
- CAD (2)
- Environment (2)
- Firewall (2)
- GPT-4 (2)
- Gen Z (2)
- Hampshire Business Awards (2)
- High Growth (2)
- ISBA (2)
- MDR (2)
- Macs (2)
- Microsoft Autopilot (2)
- Mr Mulligans (2)
- PaaS (2)
- Privacy Shield (2)
- Sydenhams (2)
- XDR (2)
- acquisition (2)
- afc bournemouth (2)
- afcb (2)
- android (2)
- b2b (2)
- bcs (2)
- berkshire (2)
- blockchain (2)
- broadband (2)
- camcloud (2)
- cryptocurrency (2)
- downtime (2)
- dropbox (2)
- east grinstead (2)
- exhibition (2)
- farnham (2)
- finalist (2)
- legalex (2)
- machine learning (2)
- macos (2)
- organisation (2)
- paypal (2)
- predictions (2)
- president (2)
- reading (2)
- serval systems (2)
- smart buildings (2)
- solent (2)
- us (2)
- video conferencing tools (2)
- 1998 (1)
- AMD (1)
- ARM (1)
- Abbey Hill (1)
- Aldwickbury Park (1)
- BBC (1)
- BGL Company (1)
- BUNKERS! (1)
- Birchwood Park (1)
- Burnout (1)
- CEO (1)
- Central South Business Awards (1)
- Cloud VMS (1)
- Cloudtango (1)
- Endpoint 100 (1)
- Fourth Industrial Revolution (1)
- Go Integrator (1)
- Growth 100 (1)
- Harvey Jones Kitchens (1)
- Hoebridge (1)
- Ignite 2018 (1)
- Ignite 2020 (1)
- Insider (1)
- Intune (1)
- LLM (1)
- Leaders (1)
- Loop (1)
- M&A (1)
- MFA (1)
- MPLS (1)
- MSP Select 2024 (1)
- Managed Service Provider of the Year (1)
- Market (1)
- May (1)
- Multi Factor Authentication (1)
- MyAnalytics (1)
- Ninja Warrior UK (1)
- PBX (1)
- PM (1)
- Power BI (1)
- Ramsdale Park (1)
- Redbourn (1)
- Regulation (1)
- Reid Steel (1)
- SD-WAN (1)
- Surrey Business Awards (1)
- Thornbury (1)
- WCry (1)
- WannaCrypt (1)
- Wifi (1)
- Wycombe Heights (1)
- ashley madison (1)
- bandwidth (1)
- battersea (1)
- beach (1)
- big data (1)
- bloatware (1)
- brand (1)
- builders merchant (1)
- business growth (1)
- business process audit (1)
- cambridge analytica (1)
- canada (1)
- cia (1)
- clinton (1)
- cnn (1)
- co op (1)
- compliance (1)
- connectivity (1)
- copyright (1)
- crime (1)
- dark web (1)
- defence (1)
- dkim (1)
- dmarc (1)
- dns (1)
- donald (1)
- dyn (1)
- eagle eye networks (1)
- election (1)
- enterprise (1)
- epos (1)
- equality (1)
- executive order (1)
- fax (1)
- football (1)
- gchq (1)
- grinstead (1)
- intel (1)
- intercept x (1)
- josh widdicombe (1)
- knights of old (1)
- landmarks (1)
- learning (1)
- legal technology forum (1)
- meltdown (1)
- millennials (1)
- mimecast (1)
- mirai (1)
- no-deal (1)
- number plate detection (1)
- onsite (1)
- outsourcing (1)
- paper (1)
- patisserie valerie (1)
- performance reviews (1)
- pound (1)
- premier league (1)
- private equity (1)
- procrastination (1)
- recruitment (1)
- research (1)
- retail (1)
- roundtable (1)
- samsic (1)
- sharefile (1)
- smart sensors (1)
- smishing (1)
- snowden (1)
- solent business awards (1)
- solentBA (1)
- spectre (1)
- spf (1)
- sterling (1)
- storm (1)
- talktalk (1)
- trumppresident (1)
- ukitawards (1)
- united states (1)
- usa (1)
- utility management (1)
- vault 7 (1)
- vitality stadium (1)
- whatsapp (1)
- white (1)
- white house (1)
- wikileaks (1)
- women in business (1)
- xiongmai (1)
- year (1)
- zero touch deployment (1)
- zero-trust (1)
How to formulate a disaster recovery plan
What do you think of when you hear the word ‘disaster’? Perhaps it is an earthquake, or a wildfire,..
Read more
Multi Factor Authentication: What it is, why you need it & how to use it.
These days, passwords are no longer being viewed as the most secure way to protect an account...
Read more
Remote Desktop Service vs VPN: What is best for your business?
Since the start of the Coronavirus pandemic, we have seen a huge move towards the use of remote..
Read more
The end of Privacy Shield: What does it mean?
On July 16th, The European Court of Justice (ECJ) officially declared that the EU-US Privacy..
Read more
5 ways to secure remote working
2020 has been a turbulent year. The COVID-19 pandemic has caused major disruption to the global..
Read more
How to conduct an IT audit in-house [+Free Template]
The word ‘audit’ is often enough to strike fear into even the most resolute business owners. What..
Read more
5 cyber security trends to look out for in 2020
2019 was an interesting (and eventful!) year for cyber security. Breaches were hitting the..
Read more
How does Cloud CCTV Recording work?
In a previous blog, we discussed Cloud CCTV and how it works for businesses. We discussed how Cloud..
Read more
What is Cloud CCTV and how does it work?
The Background We are all familiar with Closed-Circuit Television (CCTV). It has been around for..
Read more
The top 10 benefits of moving to the cloud.
In today’s world, the cloud has become one of the most talked about buzzwords among business..
Read more