We explain how Microsoft Edge is introducing some new security-boosting features to help you stay one step ahead.
Microsoft Teams Meeting Recap will summarize your meetings and even make a list of the action points. We show you its other benefits
Don’t fall victim to cyber criminals. We explain what a BEC attack is and how to protect your business.
Old computers and external drives can put your sensitive business data at risk.
We tell you how to dispose of them in the safest way possible.
Have you ever received a notification on your phone while you’re sleeping, asking if it’s really you logging in?
It’s called a fatigue attack and Microsoft Authenticator’s latest feature will help to protect you.
Microsoft has announced there will be no new feature updates for Windows 10 so maybe it’s time to upgrade to Windows 11. Our latest video will help you make up your mind.
Microsoft has just announced an option for people to trial new features before their general release in Windows 11. This isn’t about fixes to security flaws – everyone gets those at the same time. This is an opportunity for businesses to jump the queue to receive new features and updates first. Sound exciting? Yes! Worth the risk? Not quite. Our …
Read More
Cloud computing has quickly become a popular option for businesses that want to streamline their operations, reduce costs, and become more flexible. But are you swayed by the idea that cloud services are automatically better for the environment? Could the need to do your bit ‘cloud’ your decision-making? Sorry. Bad pun. It’s true that cloud services have environmental benefits compared …
Read More
LinkedIn is introducing new verification features over the coming months to help tackle fake accounts.
Airports, hotels, cafés, even shopping malls, offer public charging points where you can boost your phone or laptop battery on the go. They’ve been in the news after the FBI recently tweeted advice to stop using them. Crooks have figured out how to hijack USB ports to install malware and monitoring software onto devices as they charge. The security risk …
Read More