A warning for those looking to proactively automate day‑to‑day workflows

We are currently in a time when new technologies are being adopted in days and weeks, rather than months and years. This has been demonstrated with the recent and rapid adoption of AI automation tools that manage how we interact and communicate, which is going to change the way we fundamentally interact with technology. In …

2025 Cybersecurity Roundup and Action Plans for 2026

Thank you for being part of our journey this year. Whether we’ve been helping you to protect your business, collaborating as partners, or supporting you in any capacity in between, it’s been a particularly busy year for technology, and especially for cybersecurity. Before I go any further, though. If you haven’t engaged with our services …

What Is Microsoft Secure Score and Why Should You Care?

You’re flat out running your business, your team is busy, and everything you rely on lives in Microsoft 365. Your emails, files, collaboration tools, client information, all in one convenient place. It feels secure enough, you’ve made sure everybody has a strong password and must log in via 2FA! Then one day, something unexpected happens. …

Agile Workplace Technology Trends

2. Your Computers – Lock Them Down  Company devices should be locked tighter than your weekend plans. Users should only access machines assigned to them, and only from their usual location. No exceptions. Do you store data locally on your computers? If yes, encrypted it. If you don’t know how, then we need to talk. …

Cybersecurity Made Simple – Focus on What Matters Most

Cybersecurity Doesn’t Have to Be Complicated Cybersecurity doesn’t need to be complicated. In fact, it boils down to three things: users, computers, and data. Nail these, and you’re ahead of the curve. We’re looking at the three core aspects of cybersecurity and what you can do today to help improve the cybersecurity of your business. …

The Cost of Doing Nothing: Why Cybersecurity Inaction Is the Biggest Risk of All

Not spending money is great; you get to save it, or use it somewhere that is needed. If you’re a business owner, you already know that risk is part of the job. When it comes to cybersecurity, the biggest threat might not be those that are trying to exploit you—it’s the assumption that “we’re probably …

A worthy consideration to bolster your cybersecurity & earn client trust

The majority of you reading this article will face increasing pressure to demonstrate robust cybersecurity practices, if not already. One of the most effective ways to do this is by adopting Cyber Essentials, the UK government-backed certification developed by the National Cyber Security Centre (NCSC). We know this might be a strange recommendation, a UK …

Beware of Online File Converter Scams: Protect Your Business

The FBI Denver field office has issued a warning about a rising scam involving free online document converter tools. I thought it best to take the opportunity to reflect upon what this actually means and who is most at risk. These types of online tools were created as an online efficiency; the ability to open …

Cyber Security tips for Businesses – by Jordan Gall

Cyber security continues to shape the tech landscape, especially for small and medium businesses. From strengthening defenses and embracing Cyber Essentials (or similar certifications), to increased vendor practices and wider adoption of Zero Trust, there are some clear trends. As a cyber security professional, I want to share some simple yet essential tips to keep …