01604 926100

               

Utrafast Connectivity · Secure Analytics · Smart Energy
Rugged Technologies · Outdoor Wireless · Fibreglass Technology · Secure Data Storage · Consultancy

Click here to read this blog post
Security, Security, Security!

I cannot emphasise it enough! Security is incredibly important when it comes to your computer systems ...

 

Click here to read this blog post

Cybersecurity: Are Your Documents And Emails Safe?

Are you aware that when you receive an email from someone you recognise, it might not be from who you think it is?

Click here to read this blog post

How Do Customers Contact You?

Your customers see your Facebook, Instagram and LinkedIn pages and read all about you. But how do they contact you?

Click here to read this blog post

Are You Ready For The Big Copper Switch Off?

PSTN, ISDN2e, ISDN30e, IP and VoIP. What does it all mean and how will it affect you if you don't plan for the big copper switch off?

   
Click here to read this blog post

IP Telephony: It’s Not The Same As IT And WiFi

Virtually all computers, laptops, phones, WiFi hardware, CCTV, and numerous other devices have an IP address ...

Click here to read this blog post

What Do You Use Your Smartphone For?

The increasing number of messages and notifications I get on my smartphone, all day every day is rising rapidly ...

Click here to read this blog post

How Safe Are Mobile Phone Apps?

Thousands of mobile phone apps are uploaded to Google and Apple AppStore on a daily basis ...

   
Click here to read this blog post

Downtime Vs Down Time

In today's technological world, there is an urgency to have all systems up and running 24 hours of the day, seven days a week ...

Click here to read this blog post

Two Hours On Hold! How Much Is Your Time Worth?

Whatever type of business you are, you need technology. Your company will need broadband, computers and comms ...

Click here to read this blog post

Ransomware Is Not Going Away!

There are more reports of hackers getting into networks, stealing data and/or encrypting data and holding the business to ransom ...

 
Click here to read this blog post
Cryptocurrency: Where Is It Going?

Today's blog post is an overview in to the complex world of cryptocurrency and what may be become the norm in the future ...

 

Click here to read this blog post

Do You Work Directly or Indirectly With Your Telecoms Supplier?

The UK telecoms market has been deregulated for the best part of 25 years now and there's an infinite amount of choice ...

Click here to read this blog post

Some Concerning News From The Tech World!

This week, I would like to draw your attention to two big news stories: injected Word documents and ransomware ...

Click here to read this blog post

What Is The Internet Of Things?

The Internet of Things (IoT) is a phrase that more people are starting to know, but few understand ...

   
Click here to read this blog post

How Vulnerable Is Your Smartphone?

I talk often about phishing emails that can lead to hackers penetrating your networks. Smartphones are also vulnerable ...

Click here to read this blog post

The Wonderful World Of WiFi

Did you know that unlike HiFi, which is the short form for High Fidelity, WiFi is definitely not the short form for Wireless Fidelity ...

Click here to read this blog post

The Art Of Password Security

Today's blog post is all about password security and it comes from a very personal perspective ...

   
Click here to read this blog post

Firewalls: Test, Test And Test Again!

What do your IT systems, servers, IP telephone systems, network-connected mobile phones all have in common?

Click here to read this blog post

WiFi, Emails And Passwords Are Being Held To Ransom

Every week I write about the cyber-threats and vulnerabilities that hackers use to exploit company networks ...

Click here to read this blog post

The Internet: Is It Evolution Or Revolution?

The internet, the net, the information superhighway, the web, www, the virtual world, cyberspace. What is it really?

 
Click here to read this blog post
How Secure Are Your Business Networks?

The Colonial pipeline was recently subject to a ransomware attack by the Russian hacker group Darkside ...