Phishing scams are attempts by scammers to trick users into giving them personal information such as passwords, bank details, card numbers. In some cases they encourage the user to make payments to false accounts. What should you look out for? The email address – is it the right one for that person? The.
Read More…
T4
Blog and Articles


Disaster Recovery
What is a Disaster Recovery Plan? A DR plan is a set of policies and procedures that are put in place to protect a business IT infrastructure. It is put in place to enable the recovery or continuation of vital technology infrastructures and systems in the event of a disaster. Why do you.
Read More…

Technology is driving business innovation
Business Innovation It has long been seen that the direction a business wants to go in would determine how technology grows and progresses. Historically, small businesses have driven innovation and the creation of new technology. If a company needed an application to work in a specific way, technology would create a system to benefit all.
Read More…

Http vs Https
From July 2018, Google Chrome will begin to mark all http:// sites as not secure due to the security risk such unencrypted sites can pose – What is the difference between encrypted and unencrypted sites? Http (Hyper Text Transfer Protocol) is the method by which data is moved around the web. If you look at.
Read More…

Oops – I’ve deleted a file from my OneDrive
When you delete a file in your OneDrive it sits in your recycle bin for 30 days, just in case you decide you’ve made a mistake. Over 30 days, your files have gone forever. If within the 30 days you decide that you have made a mistake, not a problem. Simply log into your.
Read More…

What does your email signature say about you?
There are hundreds of email signature templates available to businesses. A professional email signature should leave a lasting impression, but this should be for the right reasons! Signatures can include dynamic marketing content such as social media icons, promotional banners, award logos and more. You can even opt to have different signature designs for different.
Read More…

New Year, New Password.
When was the last time you changed your password? For many people, once a password is set, they don’t like to change it, but how easily could your security access be guessed? And when a hacker has worked our your access details, how many systems can they access using that same security logon? It might.
Read More…

Preparing for the General Data Protection Regulation changes GDPR
GDPR checklist highlights. 12 steps you can take now to prepare for the General Data Protection Regulation. Many of the GDPR’s concepts and principles are much the same as those in the current Data Protection Act. If you are complying properly with the current law your compliance will remain valid under the GDPR. However, there.
Read More…

Are you using the right email platform for your business?
Many companies are still using POP accounts for their work email accounts, but is this now an outdated system in the modern business era? Whilst POP3 accounts were widely used in the 1980’s and early 90’s, the rise of Exchange and the features available with these accounts, appears to show a shift in the way.
Read More…

How do you build an effective Business Continuity plan?
In your busiest months have you planned for any downtime? Do you have a business continuity plan in place? Business continuity is a proactive plan which focuses on the long term operational issues of a business. Companies put a risk management plan in place which identifies the people, processes and technology required to continue business.
Read More…