01372 801545        MON - FRI    09:00 - 17:30
TEKblog
Latest News And Alerts

Business Newsletters

Jul
21

Signs You Aren’t Budgeting Enough for IT

Generally, we like to make the argument that nothing about your small business is too small. We do say it a lot in relation to cybersecurity — no size of business is immune. Yet, there is the chance your IT budget is too small. Consider these indicators that you might need to invest more in your IT. Every business wants to be cost-conscious. Saving...
Continue reading
  59 Hits
59 Hits
Jul
14

Everyone Plays a Role in Cybersecurity

Hollywood would have us believe that cyberattacks are elaborately planned and use expensive, sophisticated tools developed by James Bond's tech guru, Q. Yet in real life, most hacks are nothing like that. The cybercriminals often simply fool a human to gain access. Phishing remains a primary way to attack. A scammer sends an email that looks legiti...
Continue reading
  103 Hits
103 Hits
Jul
08

Weighing Software-as-a-Service and Managed Service Providers

There are many acronyms in the IT world. Two common ones are SaaS and MSP, which stand for software-as-a-service and managed service provider, respectively. The bigger question is what the differences are between these two and why you would need one or the other. Here's help. What's SaaS? Your business may already be relying on SaaS. Some of the mo...
Continue reading
  119 Hits
119 Hits
Jul
07

Business Continuity vs. Disaster Recovery: What’s the Difference?

The risk of cyberattack is still growing globally, and no business is too small to hack or breach. It's important to plan for business continuity and disaster recovery, and to do so in advance so you're prepared for the worst. But first, you'll need to understand the difference between the two. Some use business continuity and disaster recovery int...
Continue reading
  69 Hits
69 Hits
Jul
06

What to Do If You’re a Ransomware Victim

You'll know if you're a victim of ransomware. Often you're met with a red screen telling you your business files are encrypted. You won't be able to do anything on the computer, although the cybercriminals will provide helpful instructions for how to pay up. How nice. Here's what to do instead if you're the victim of a ransomware attack. Cybersecur...
Continue reading
  118 Hits
118 Hits
Jun
30

What to do When Your Warranty Runs Out

Most technology you buy in stores comes with a warranty of some sort. It might be included or an add-on. Still, it is unlikely to last the lifetime of the device or software, and it seems inevitable that your desktop will die immediately after the warranty runs out. Don't worry, you still have options. Murphy's Law of warranty says that you will ha...
Continue reading
  57 Hits
57 Hits
Jun
23

Lessons Learned from an Oil Pipeline Ransomware Attack

 Your business may not be supplying oil to the United States, and you may not even be in the critical infrastructure business, but don't think that means ransomware can't happen to you, too. This article shares lessons learned from a headline-grabbing event, and they're applicable to businesses of all sizes in all industries. First, what happe...
Continue reading
  141 Hits
141 Hits
Jun
09

Do You Need Document Management?

The employee surrounded by teetering stacks of paper is less common today. What with the move to digital technology, we're all doing more online. Yet some businesses remain true to traditional processes, passing documents around the office. You could be paying for this in lost productivity or worse. You may need document management. Check out the c...
Continue reading
  137 Hits
137 Hits
Jun
02

What Is Shadow IT, and Why Is It an Issue?

An old-time radio show used to start with the promise "The Shadow knows!" Yet when it comes to shadow IT, the problem is the exact opposite. Shadow IT is the stuff employees download onto a business system that IT doesn't know about, and it can be a big problem. You may have an IT policy telling employees not to download unsanctioned applications, ...
Continue reading
  178 Hits
178 Hits
May
26

What You Need to Know about Web App Security

There's an app for that! Even for business purposes, you can bet this is the case. Yet a small business may be using online applications without understanding the risks. Here's help. Most businesses no longer have all their technology and software solutions on-site. The old cybersecurity perimeter around the IT premises is no longer going to be eno...
Continue reading
  179 Hits
179 Hits
May
19

Microsoft 365 Streamlines Business and Reduces Spend

When doing business online, you have many options for available software and systems. You might turn to one solution to handle online meetings, another to drive collaboration, and yet another to manage your content and workflow. It can get confusing. Plus, when you are duplicating tools, IT spend can mushroom unnecessarily. Microsoft 365 aims to of...
Continue reading
  213 Hits
213 Hits
May
12

Doing Business in Microsoft 365? Backup Your Data

Many business tools are moving to the cloud. One popular option is Microsoft 365, formerly known as Office 365. This unified platform consolidates Excel, Word, and PowerPoint with collaboration and communication tools. Added apps and services help streamline operations, too. Simplifying your IT infrastructure can also cut costs and reduce duplicati...
Continue reading
  234 Hits
234 Hits
Apr
28

Is Your Instagram Account Secure?

Why would someone want to target your Instagram account? You share what you ate, maybe the books you read, the shoes you bought, or that really cool image of the sky above. How is that going to help a hacker? Read on to learn more. OK. Your obvious love of chicken and waffles isn't going to mean a lot to a cybercriminal, not unless your password is...
Continue reading
  275 Hits
275 Hits
Apr
21

Are Your Passwords Compromised?

 News of a big brand suffering a data breach is all too common today. But if you don't get an email from such a company, you could mistakenly be thinking it doesn't affect you. The thing is, large breaches are happening all the time. Cybercriminals then put access credentials online, and other bad actors buy and exploit those email addresses, ...
Continue reading
  223 Hits
223 Hits
Feb
10

Healthcare Providers Must Prepare for IT Disasters

 Healthcare professionals regularly handle the worst. Whether its broken bones, horrible abscesses, disease, or death, but that doesn't mean they're ready for all that can cripple their technology. In 2011, one of the deadliest tornadoes in U.S. history destroyed a large medical centre in southwest Missouri. Fortunately, the regional hospital ...
Continue reading
  175 Hits
175 Hits
Feb
03

Less Common Cyberattacks for Accountants

Check the news any given day and you might see a report about hackers accomplishing a data breach, or of a ransomware attack encrypting all company data until it pays up. These are the well-known types of cyberattack, but there are less common cyberthreats accountants should be aware of, as well. There is almost a malware malaise now. You've heard ...
Continue reading
  147 Hits
147 Hits
Dec
09

That’s So 2010: Why Upgrade Your Office Software

 Are you still using Office 2010? It may have served you well over the past decade, but this software reached its end of life in 2020. It's time to upgrade. Here's why and what to consider. Software has a typical life span, after which the manufacturer turns its resources to supporting a more recent release. Support for Office 2010 ended on Oc...
Continue reading
  136 Hits
136 Hits
May
14

Solving Your Work-from-Home Internet Woes

Your internet used to meet your needs. You could check social media and stream a TV show whenever you wanted without trouble. Now, since working from home, you're finding your internet service more frustrating: it's too slow when you want to send and receive large work files, or erratic when you take part in video meetings. Here's help. Blame your ...
Continue reading
  1304 Hits
1304 Hits
May
14

Tips for Trouble-Free Online Meetings

Online meetings are the new norm for many, but that doesn't mean people magically know how to enjoy a trouble-free online conference experience. These tips can power more successful meetings. Many businesses today are working from home with a reliance on Skype, Microsoft Teams, Google Hangouts, Zoom, or GoToMeeting. But even with these platforms of...
Continue reading
  1326 Hits
1326 Hits
Mar
13

Is Your Business’s IT Ready for the Coronavirus?

The Coronavirus is spreading as fast as feared. Business must be ready for the worst. One priority? Protecting the health of employees. Preparing the way for remote working is one top recommendation. News of the virus, which the WHO is now calling COVID-19, has prompted urgent interest in remote work. Business collaboration software, virtual deskto...
Continue reading
  1629 Hits
1629 Hits