Phil Aston
Our Complete IT Offboarding Checklist For Optimum Security
- 16th December 2022
- Posted by: Phil Aston
- Category: cybersecurity
No CommentsDigital footprints cover today’s modern workplace. Employees begin making these the moment they’re hired. They get a company email address and application logins. They may even update their LinkedIn page to connect to your company. When an employee leaves a company, a process needs to happen. The process is to “decouple” the employee from the company’s
3 Common Problems When Transitioning to Remote Working (And How to Avoid Them)
- 28th September 2021
- Posted by: Phil Aston
- Category: Business, Growth, Strategy, Technology
Remote work is here to stay and this means a big shift for many offices. We’ve helped our customers go through many transitions over last two years. But are you ready for your own transition to remote working if you haven’t done so already? We recently sat down and thought about the most common problems
Do I Need a Dedicated Server In-House?
- 25th March 2021
- Posted by: Phil Aston
- Category: Professional Services
So many businesses have great big, clunky servers hiding away somewhere. In fact, sometimes, they’re not hidden at all; they stick out like a sore thumb and do nothing more than get in everyone’s way. Over the last few weeks, we’ve spoken to a number of potential clients who have a machine just like that
Is Your IT Provider Communicating Well? Or is it Time to CTRL + ALT + Delete?
- 18th March 2021
- Posted by: Phil Aston
- Category: Business, Strategy
Successful businesses rely on great communication throughout the organisation. It’s how you foster relationships with customers, build great teams, and draw more people towards your brand. Why is it, then, that you’ve not heard from your IT provider for the last three months? Come to think of it, the last time you heard from them
Is OneDrive or Dropbox Better for Your Business
- 4th March 2021
- Posted by: Phil Aston
- Category: Business, Strategy, Technology
As the ability to store files online has become more secure and affordable, our reliance on traditional hard drives has reduced. This has led to more cost-effective hardware purchases and storage which grows effortlessly with your requirements. Cloud storage also provides significant benefits for productivity, thanks to seamless integration with the apps we rely on
Zoom Versus Microsoft Teams: Which is Best for Business?
- 9th February 2021
- Posted by: Phil Aston
- Category: Business, Microsoft, Office 365, Technology
In December 2019, Zoom reported a maximum of 10 million daily users hitting its platform. By the end of March 2020, that number had doubled. This has led to terms like “the Zoom Boom”, and has ushered the video calling platform closer to the realm of transitive verb, just like Google (there’s a chance you’ve
What You Shouldn’t Share on LinkedIn
- 12th January 2021
- Posted by: Phil Aston
- Category: Business, Growth, Security, Technology, Uncategorised
Did you know that closing your account on LinkedIn doesn’t delete it entirely? Therefore, if you decide to leave the networking platform one day, anything you published there will still be available to hackers, should LinkedIn’s defences be breached. That’s pretty frightening, but it’s also a timely reminder that we all need to be very
How to handle cybersecurity for remote workers in the construction sector
- 10th April 2020
- Posted by: Phil Aston
- Category: Uncategorised
Cyber criminals don’t need much temptation to exploit weaknesses within a company’s IT infrastructure. This is particularly the case when they identify employees who are working remotely in a less than secure fashion. It’s thought that 16% of companies now exclusively hire remote workers, and that figure could rise significantly if the sudden increase in
What is proactive IT?
- 1st April 2020
- Posted by: Phil Aston
- Category: Business, Technology
Why would you ever wait for the worst to happen when it comes to IT? In the digital economy, ‘the worst’ might be very bad indeed. For instance, a data breach could cost your company its reputation, your customers their personal data, and your staff a tonne of unnecessary stress. Prevention has always been better
The Most Common Email Scams and Hacks
- 13th January 2020
- Posted by: Phil Aston
- Category: Security
It’s thought that 91% of all cyber-attacks start with a phishing email. Even if ‘phishing’ isn’t a term with which you’re familiar, you’ve probably been targeted. At some stage during our working and personal lives, we all receive an email that purports to be from a source that it isn’t. Sometimes, the clues are there;
- 1
- 2