01604 926100

               

Ultrafast Connectivity · Secure Analytics · Smart Energy
Rugged Technologies · Outdoor Wireless · Fibreglass Technology · Secure Data Storage · Consultancy

Click here to read this blog post
Cyber Attackers And Phoney Phone Calls

I have been reading with interest that it has been the turn of the mighty MGM Group to fall victim to hackers ...

 

Click here to read this blog post

What Is The Most Important Part Of Your Business Network?

The final words from my last blog post led me to determine a business network's commonest point of failure ...

Click here to read this blog post

How Secure Are Your Business Networks?

The Colonial pipeline was recently subject to a ransomware attack by the Russian hacker group Darkside ...

Click here to read this blog post

The Importance Of Being Earnest

I believe that 'people buy from people', yet we seem to be in a world where people are pressured into buying technology ...

 
Click here to read this blog post

Technology Overload And Mental Health

In 1990, I was selling a different kind of technology and life was very much simpler for all of us ...

Click here to read this blog post

Riding the Crest of the Wave - Part 3

And all of a sudden, we had Blackberry dominating the Global market. Their handsets are no longer with us ...

Click here to read this blog post

Planning ahead for the 2025 Copper Switch-Off

As a business, there is a 99% chance that the phones you have are PSTN/ISDN based on Openreach's legacy copper network ...

 
Click here to read this blog post

Firewalls: Test, Test And Test Again!

What do your IT systems, servers, IP telephone systems, network-connected mobile phones all have in common?

Click here to read this blog post

Riding The Crest of The Wave - Part 2

In 1997, the showrooms closed and I moved to the business call centre where the first dial-up disks were emerging ...

Click here to read this blog post

Technology Vs Humans: Who Is Right Or Wrong? Part 2

Supercomputers have been around since the 50s and have assisted in historic moments such as sending man to the moon ...

 
Click here to read this blog post
And This Is How Scams Start

Saturday night, rushing to try and finish off some paperwork and wanting to catch the last half hour of visiting time at the hospital ...

 

Click here to read this blog post

The Increasing Need For Power In Technology

Virtually everything we do these days relies on nuclear, gas, coal, oil, solar, geothermal or wind ...

Click here to read this blog post

Riding The Crest Of The Wave - Part 1

It's November 1990 and I am a fresh-faced salesman working in the flagship Dixons store at the Clarendon Centre in Oxford ...

Click here to read this blog post

Cybersecurity: Beware Of Bad Links And Dodgy Websites

With Christmas coming, there will be an inevitable increase in the number of searches you make on the internet ...

 
Click here to read this blog post

What Will Artificial Intelligence Bring To The Table?

There are lots of use cases to show the benefits of using Artificial Intelligence (AI) to perform mundane and repetitive tasks ...

Click here to read this blog post

Technology Vs Humans: Who Is Right Or Wrong? Part 1

As I said in my last blog post, I have been an avid technology fan since my school days, but sometimes it may go too far ...

Click here to read this blog post

Houston, We Have A Major Problem!

Let me start by saying that I love technology. I have sold consumer electronics since the early 1990s ...

 
Click here to read this blog post

Security: It’s Time To Tighten Up

I had 5 emails from Microsoft in the last few days. The emails were sending me the two-factor authentication codes ...

Click here to read this blog post

How Do Customers Contact You?

Your customers see your Facebook, Instagram and LinkedIn pages and read all about you. But how do they contact you?

Click here to read this blog post

There's no let up on Trojans, Malware And Hacking

This week has been the turn of telephony software company 3CX to have one of their most used applets compromised ...

 
Click here to read this blog post
Cyber Awareness And Training

In a recent blog post, I wrote about the MGM hack and how it was potentially conceived via a phone call ...