Your Guide to Microsoft Teams Guest Access: Easy Tips

Your Guide to Microsoft Teams Guest Access: Easy Tips [ez-toc] No man is an island, and no organisation is, either. We all collaborate with people outside our company from time to time, whether that be with freelancers, consultants, vendors or something like an IT support company. As we’ve talked about on our blog over the past […]
Cyber Security – The Perfect Storm?

Cyber Security – The Perfect Storm? [ez-toc] Most of us would be inclined to think of cyber criminals as a lot of lawless occupants of the deep, a gang of individuals that trade exploit kits and stolen data and operate in a chaotic and disorderly manner. But the reality is, cybercrime is now a multibillion […]
How to Establish an Effective Human Firewall of Employees

How to Establish an Effective Human Firewall of Employees [ez-toc] Did you know, research across the British business sector revealed that 70% of IT security breaches are caused by human error. To combat this IT security risk and safe guard your business, you need to establish an effective human firewall of informed employees. One of […]
Disaster Recovery: 5 Things That Can Cripple Your Business

Disaster Recovery: 5 Things That Can Cripple Your Business [ez-toc] Backup and disaster recovery planning are, unfortunately, one of those things that too many companies pay lip service to. It is time-consuming, it needs to be regularly reviewed and updated, it should be tested periodically and it doesn’t appear to add anything to the profitability […]
IT help desk: Troubleshooting to Secure A Simple Life

IT help desk: Troubleshooting to Secure A Simple Life [ez-toc] From printer troubleshooting to accessing shared drives: How an IT help desk improves business continuity. Troubleshooting an offline printer “We had one user calling us because their printer was showing up as offline. It’s generally frustrating for people when they can’t use the equipment in […]
Consent & GDPR – What Interesting Things Are you Agreeing to?

Consent & GDPR – What Interesting Things Are you Agreeing to? [ez-toc] If you lead any kind of online life you will have probably been inundated with emails imploring you to confirm and continue your various subscriptions. The General Data Protection Regulation (GDPR) has had the unexpected benefit of allowing all of us to finally dispose […]
Taking GDPR Compliance Seriously – Be Careful!

Taking GDPR Compliance Seriously – Be Careful! [ez-toc] ‘Serious’ is one of those words in the English language that has multiple meanings depending on context. When we suggest that you should take the GDPR (General Data Protection Regulations) seriously we do not mean that there is a chance that you might regard it as a […]
Cybersecurity and Data Breach Notification: Unlock Safety

Cybersecurity and Data Breach Notification: Unlock Safety [ez-toc] Contained within the General Data Protection Regulation (GDPR) is an obligation to notify the Information Commissioner’s Office (ICO) of a data breach which meets certain criteria: The GDPR introduces a duty on all organisations to report certain types of personal data breach to the relevant supervisory authority. […]
Operational Impact of the GDPR Legislation Now

Operational Impact of the GDPR Legislation Now [ez-toc] The General Data Protection Regulation (GDPR) becomes effective on the 25th of May 2018. It represents a major shift in the way data is treated; it is significant that in the midst of their current troubles Facebook are now suggesting that it is the gold standard to […]
How To Respond To A Subject Access Request (SAR)

How To Respond To A Subject Access Request (SAR) [ez-toc] If there is one thing that we in the I.T. industry love, it’s TLAs (Three Letter Acronyms), so let us throw one at you – SAR. Search And Rescue? Sarah’s Aunt Rachel? Sausages Are Righteous? None of those we regret, although we are fully in […]