Resources

All businesses should adopt MFA. Now

Welcome to the April 2023 edition of our Technology Insider newsletter. Smartphones have taken over from laptops as most people’s preferred portable work tool. But that creates a new set of security risks to be aware of. We have the latest advice. What’s all the fuss...

read more

June’s Technology Insider: Crumbs in the keyboard?

Hello and welcome to the June 2022 edition of our Technology Insider newsletter. Did you know two thirds of people working remotely are using faulty devices. And you won’t believe the main reason why… all is revealed in this month’s cover story. Here’s what else is...

read more
May’s Technology Insider: Productivity tools: What’s next?

May’s Technology Insider: Productivity tools: What’s next?

Hello and welcome to the May 2022 edition of our Technology Insider newsletter. The development of the world’s productivity software has been amazing over the last couple of years. In our lead story this month, we ask you the simple question: If you could wave a magic...

read more
April’s Technology Insider: A third of employees want an Apple product from you

April’s Technology Insider: A third of employees want an Apple product from you

A third of employees want an Apple product from you

Hello and welcome to the April 2022 edition of our Technology Insider newsletter.
We’ve been looking at some stats about employee expectations of the technology they get from a new employer. A third of them want Apple products… even though Microsoft has better business tools. We’ve got some suggestions to get round that.

read more
Alert: A clever new type of ransomware attack

Alert: A clever new type of ransomware attack

Subject line: A web form was submitted

Hi Name,

If you have a contact form on your business’s website, you’ll be used to getting emails with a subject line like that.

And while some of them might be a waste of your time, have you ever considered that not all requests for your product or service are genuine?

There’s a new technique that cyber criminals are employing to launch ransomware attacks. And you need to be aware of it.

read more