To help you understand how your business can be targeted by hackers and the different types of cyber threats most commonly used, we have put together an easy-to-read guide to the 9 most common types of malware in use today. Read more...
By NTS Security on 22/06/2021

To help you understand how your business can be targeted by hackers and the different types of cyber threats most commonly used, we have put together an easy-to-read guide to the 9 most common types of malware in use today.

By Vikki Croxson on 15/06/2021

Find sharing files or documents difficult when working from home? Watch our video on Microsoft OneDrive and see how you can stay connected, scan and share documents and photos with colleagues, friends and family, and collaborate in real time.

By SoundBytes Spring 2021 on 27/05/2021

If you’ve ever pulled data into Microsoft Excel from multiple sources, you’ll probably have had to deal with lots of minor discrepancies, such as differences in how information is collated or simple spelling errors, which can make it difficult to scrutinize large amounts of data. To resolve this issue, Microsoft has created Fuzzy Lookup.

By SoundBytes Spring 2021 on 27/05/2021

What’s the difference between Office 365 and Microsoft 365? Not the setup to a dreadful joke, but a legitimate question being asked by many businesses in light of Microsoft’s rebranding of its Office suite. So what are the differences between these rather confusingly titled solutions?

By SoundBytes Spring 2021 on 13/05/2021

Businesses have gone through fundamental changes over the past 12 months – and technology has played a key role in keeping operations going. This is the conclusion of a new report from the EBC Group, in conjunction with the Herefordshire and Worcestershire Chamber of Commerce...

By SoundBytes Spring 2021 on 11/05/2021

Hackers have found a new way to put pressure on businesses that have been subject to a data breach – enlisting their own customers to call for a ransom to be paid. Tech news site Bleeping Computer discovered that one particular ransomware gang, Clop, has sent emails directly to customers, contacts and partners of its victims...