Latest News from IT365

Cyber Security Risks – The Internet of Things at home16 August 2017

Is your television spying on you? Is your fridge broadchasting that you’ve gone away for the weekend? Or has your toaster been recruited by North Korea as part of a plot to cripple a major US corporation? Read more...

Endpoint security – delivering cyber protection in depth10 July 2017

Every day, endpoint security solutions repel massive numbers of malware attacks from a myriad of sources. Malware can be triggered by someone simply visiting a website, clicking a link in an email or connecting an infected USB stick into their computer. A comprehensive endpoint security solution detects and reacts to all these activities, and scans all incoming data for dangers. Read more...

Effective Perimeter Security14 June 2017

Best Practice Guide

Hardly a day goes by without a shocking cybercrime story hitting the news headlines. Hospitals are forced to shut down all their IT due to a ransomware attack. Major companies suffer the theft of customer data. Online services are put out of action by massive digital assaults. Read more...

Defend your business against cybercrime28 February 2017

Over 5.6 million fraud and other computer misuse cases were reported in the year to September 2016. And the police admit that many cybercrimes go unreported. Read more...

Disaster Recovery Planning2 February 2017

Best Practice Guide

Around half of all businesses fail when a serious problem strikes and they don’t have a disaster recovery plan. Those that survive often endure serious pain, both financially and through damage to their strategic plans. Read more...

Break free of traditional telephone technology23 September 2016

The internet has revolutionised how we communicate with one another. You can set up, in an instant, a video call with a client on the other side of town or the other side of the world. You can launch a live broadcast from almost anywhere, using just a smartphone. You can read and send written messages at any time, using a host of different systems. Yet when it comes to the telephone, many businesses are still tied to out-dated, copper cable technology. Read more...

Sea, sand and safe surfing18 July 2016

Summer is a time for being outdoors, for travel and for children to have long days of fun. In today’s digital world, all these activities can mean children and adults using mobile devices to entertain, inform and connect with others.

Unfortunately, this digital freedom comes hand in hand with three significant challenges: security of mobile devices, keeping children safe online and ensuring the internet of things doesn’t compromise your data. Read more...

The high-speed promise of a 5G world14 June 2016

Wireless broadband is poised to take a huge leap forward. The next generation of mobile communication technology, 5G, offers the prospect of download speeds that far outstrip what’s currently available through wired broadband. Read more...

Internet of Things or Internet of Risks?20 May 2016

What are the chances that a cybercriminal could hack into your company’s IT network through your fitness tracker? It’s quite possible, according to an expert working for security specialists Fortinet. Read more...

Artificial intelligence and your business: it’s time to think differently22 April 2016

Whether your business is ready for it or not, intelligent software could soon bring new thinking to the way you do business. It will have an impact many different aspects of your operations, including how you employ staff, how you access information and how you engage with customers. Read more...

How to protect your business data from children and hackers14 March 2016

It can take a while to build a strong business or organisation. But all that hard work can be threatened by just one click or tap by a child.

In just a moment someone using a tablet or computer to download something that looks cool, exciting or simply useful. That download could be carrying something much more sinister, like a virus, that opens the way for a hacker to raid corporate data, or that locks you out of that data and demands a ransom. Read more...

Is your server room a disaster waiting to happen?9 February 2016

Organisations are continually being reminded of the need for disaster recovery planning. But even as they plan, they can unknowingly be laying the foundations for future problems. Read more...

Protect your business against cybercrime15 January 2016

Are you worried that cybercriminals may be targeting your business? Tens of thousands of UK firms, of all sizes, have already fallen victim to cybercrime and many have lost tens or even hundreds of thousands of pounds.

  Read more...

How to stay safe in your mobile office14 August 2015

Ten years ago, your staff would never have considered taking their office computer home with them at night. They certainly wouldn’t have taken it up to their bedroom or on holiday. But that’s exactly what many of them do now, because their smartphone is one of their office computers. Read more...

Keeping your children safe online17 July 2015

The summer holidays are here! Smartphones, games consoles, tablets and desktop computers are probably going to feature quite heavily in your children’s holiday fun. Years ago, children roamed the countryside in their summer holidays—now they’re just as likely to be roaming the internet. Read more...

Keeping the Lights on When the Power Goes Off10 June 2015

When did you last take a look at your organisation’s uninterruptible power supply (UPS) unit? Probably never. After all, it’s just a big black box sitting in a corner somewhere, one of those pieces of IT that most people never think about and, if they come across it, don’t really understand what it does. Read more...

Protect productivity with our internet usage monitoring service10 April 2015

Few of today’s businesses could tolerate being disconnected from the internet, even for a few minutes. As communication becomes increasingly digital and Cloud computing becomes the norm, losing access to the web is a productivity killer. Read more...

Outsourcing: the gain without the pain19 March 2015

As a critical part of every business, IT systems both support and facilitate most business activities. The growth in reliance on these systems means that many organisations are busy ‘firefighting’ issues on a daily basis, leaving little time for strategic development of their IT systems and infrastructure. Read more...

Has your business booked its space on the cloud?22 January 2015

The impact of cloud computing is as big as the industrial revolution, said Gary Turner, Managing Director of Xero. Well, he would say that, wouldn’t he? Xero is a cloud-based accounting system and its success depends on businesses becoming comfortable moving their bookkeeping online. Read more...

Be prepared for the Microsoft Software Asset Management Review 3 December 2014

How confident are you that every piece of Microsoft software running in your organisation is correctly licensed? Let’s be honest – it can be hard to keep track of the detail, particularly when the day to day issues of running a business take priority over record keeping. Read more...

Protect Your Business Data by Training Your Staff3 November 2014

Cyber criminals are targeting your firm. If you’re in any doubt about this, dip into the spam section of your email system. It’s packed with invitations to share your bank details, to download viruses and to pay for goods or services you never received. Read more...

5 Tips for Improving Business Cyber Security2 October 2014

  • It seems that barely a week can go by without another cyber security story hitting the headlines. Global businesses have their websites or data compromised. Celebrities have their photos stolen. Systems that were perceived to be secure turn out to be far from it.
Read more...

Doing business on the move6 August 2014

  • What does your office look like today? Four walls, a window and a desk jumbled with gadgets and paper? Or a car, travelling between client sites? Perhaps it’s in a holiday apartment or caravan, a tent or even on the beach.
Read more...

Internet Usage Monitoring13 June 2014

No one benefits from a traffic jam. People and goods are stuck in the wrong place, frustration rises and time is lost. The result, for a business, is lower productivity and higher costs. Read more...

Are you paying your staff to entertain themselves online?16 May 2014

Seven out of ten employees waste time at work, with gossiping and surfing the web being their favourite ways of getting through the day. This is according to a survey carried out last year by Salary.com. Read more...

Sink hole or swim: how good is your disaster recovery plan?3 March 2014

What would you do if the ground literally opened up and swallowed your business?

Okay, so the chances of a sink hole appearing beneath your office, your warehouse or even your home are slim, but it’s not impossible. Six holes have appeared across the UK in just the last few weeks, compared to an average of two a year. The ridiculous levels of rainfall are to blame.

This same rain is also threatening to wash away businesses in the south west and Thames Valley, as local rivers move into the workplace. With predictions of stormier winters and summers to come, the risk of flooding and its associated perils, including looting and sink holes, is going up. Read more...

Mobile device management made easy10 February 2014

The rise of the personal mobile device has taken workplace computing away from the desktop and placed it, quite literally, in the hands of your employees.

Smartphones and tablets, in all their various forms, whether personally owned or company supplied, provide new levels of flexibility through remote connectivity. Mobile technology gives your staff, whether office-based or in the field, unprecedented levels of access to email, intranets, ERP systems and alternative communication channels such as social media. Read more...