Android Security Recently, there has been a fairly large increase in the number of security threats to android devices. This comes as a result of the ever increasing use of smartphones and other connected devices where attempts to gain access to the user’s device are becoming more and more successful. These threats can include Malware, […]
Setting up O365 Exchange Active Sync in iOS
A question that is commonly asked by our clients is how to set up their work email on their mobile iOS device. Our clients use O365 as their email service, which is handy as it’s designed to work from a variety of devices or platforms. Setting up your O365 Exchange account on your iPhone or […]
Training Staff on Security
Training Staff on Security Introduction Most people will not struggle to recall an international data breach over the past few years. Sony, TalkTalk and Moonpig have all suffered breaches in their security in not too distant past. The impact of bad publicity combined with shares taking a hit has led to businesses tightening up their […]
Office 365 OneDrive for Business (Part 2)
In my previous article, “Office 365 OneDrive for Business“, I described the development and history of One Drive for Business. In this article, I will go onto detail some of the One Drive for Business basic features. How to access OneDrive for Business: If you know how to log in to your Office 365 email […]
Office 365 OneDrive for Business
In my last blog, “Office 365, More than just email”, I discussed some of my top favourite features of Microsoft’s Office 365 platform. I had briefly touched on the history of Office 365 and how I use some of the tools and features the platform is known for. In this article I will discuss in […]
Reasons for Server Virtualisation
Intro The ability to user server virtualisation technology has been around in the IT industry for over a decade now, however for a lot of people this is still viewed as a relatively new technology. It could be argued that for most technicians who have been involved in server virtualisation, its viewed as a technology […]