0800 054 6789
Why your business telephone system should integrate with your applications
Posted by Adam Williams on 29/05 at 10:00 AM Telephone systems, Unified communications, ShoreTel,
ShoreTel Connect business telephone systems image

The technology you use in the office should enhance your ability to do business. That’s what technology does. Yet, the same technology that helped you serve clients better just a short five or 10 years ago can just as easily hinder your staff’s ability to work as fast or...


Law firms often do not have the time or the in-house resource to research the communications and IT solutions that would best fit their needs. As an independent supplier, we can design a converged solution to alleviate the stress of dealing with multiple suppliers while...

Does your business telephone system meet your needs?
Posted by Simon Dunstan on 23/05 at 10:00 AM Telephone systems, Unified communications, ShoreTel,
ShoreTel Connect modern day telephone system image

If your telephone system works, you might think that’s all that matters. But thinking that all you need is a dial tone could be preventing your users from communicating effectively – internally and externally. If you’re using a legacy PBX system, it may not be meeting...

I was hacked by my toaster!
Posted by Ash Khagram on 19/05 at 10:00 AM Security,
I was hacked by my toaster blog

The launch of a smart toaster made the rounds across the web recently. This new device connects to your WiFi and allows users to use an app to monitor the temperature and duration of toast, bagel, crumpet and other edible items to ensure they don’t burn or are...

Three simple steps to fight ransomware
Posted by Colin Woods on 17/05 at 10:00 AM Data centre, Disaster recovery, Security,
Three top tips to protect yourself from ransomware image

Just as the WannaCry ransomware attack has started to dip out of the headlines, the National Security Crime Centre has issued a stark warning.It seems the National Security Crime Centre is convinced that more ransomware attacks will follow. Ransomware attacks see...

Information at our fingertips
Posted by Caroline Moore on 16/05 at 10:00 AM Data centre, Disaster recovery,

As Exeter Chiefs head towards the semi-final of the Premiership season, we reflect on how always-available data forms a part of the team’s working week.In this video, Gareth Steenson describes how all their on-field activity is catalogued into video clips and all they...

Why law firms need to protect themselves against cyber-crimes
Posted by Caroline Moore on 15/05 at 01:43 PM Law firms, Security,

Law firms pose an attractive prospect to hackers. The funds they handle and the client details they store make them ripe for ransom, trade and blackmail.This infographic summarises the daily risk and challenges law firms face and how they can help protect themselves...

NHS cyber-attack will surely make businesses take notice of security
Posted by Caroline Moore on 15/05 at 10:00 AM Security,
Protect yourself from cyber hackers

With the ramifications of Friday’s cyber-attack on the NHS still being keenly felt today, maybe other businesses and organisations will finally sit up and take notice of the very real threat hackers pose.As everyone must be aware by now, the NHS was part of a global...

So long Exchange 2007, Hello Office 365
Posted by Ash Khagram on 12/05 at 10:00 AM Office 365,

Microsoft's 10-year lifecycle on products has now retired Exchange 2007. As the evolution of Cloud solutions increases, more companies are migrating to Exchange Online with seamless migration into Office 365 and its additional security/spam functions. Our infographic...

Why the legal sector is so vulnerable to cyber-attack
Posted by Caroline Moore on 09/05 at 10:00 AM Security,
Why the legal sector is so vulnerable to cyber-attack

Figures reveal that the legal sector is one of the most vulnerable industries when it comes to cyber-attack. In fact, 73% of the UK top 100 law firms were the target of attacks last year making it a very real concern for managing partners, compliance officers and, if in...

Law firms: If only you had more time….
Posted by James Hooker on 05/05 at 10:00 AM Legal, Unified communications, Law firms, Unified communications, Video conferencing,
SWComms video conferencing blog post image

Is video conferencing the answer to lawyers juggling the needs of several clients and multiple meetings?  You have several cases to deal with today and they are all in different locations. Time, as always, is of the essence. You could possibly defer a meeting or delegate...

The threat from baby face hackers
Posted by Ash Khagram on 02/05 at 10:00 AM Security,
Protect your data from hackers of every age

What is the average age of a hacker? The rather shocking answer is 17 years old, but there have been reports of suspects as young as 12 being part of a cyber-crime organisation. A recent survey by the National Crime Agency (NCA) has outlined how easy it is for young people...

Protect your data the right way, not the Wronga way!
Posted by Ash Khagram on 28/04 at 10:00 AM Security,
Protect your data the right way, not the Wronga way!

The recent data breach of the high profile pay day lender Wonga involving the loss of 250,000 customer names, email and financial information made national news that highlighted how sophisticated hackers are becoming. Reports were quick to point out that the potential...

5 facts about cyber crime
Posted by Ash Khagram on 25/04 at 10:00 AM Disaster recovery, Security,

Data breaches are becoming a common occurrence in the news with reports of companies being hacked regularly` circulating through the media. Every business is a potential target and hackers are getting more sophisticated in their attempts to capture data. The damage...

Schools: Your data network is your IT backbone
Posted by Caroline Moore on 21/04 at 10:00 AM Data networks, Education,
LAN traffic in schools image

Local area networks or LANs are often the forgotten workhorses of the IT environment. The truth is though is that they often support anything with plug in schools.  Our infographic is designed to highlight the importance of a school LAN and why it should not be neglected...

Page 1 of 26 pages  1 2 3 >  Last ›