Skip to the main content.

Our client portal provides all the tools you need to create, view or update your support requests. 


For urgent IT support during business hours, or if you suspect anything suspicious call  01314528444 for the fastest response.


If one of our team has asked you to start a remote control session on your computer, use the remote control menu option above.

it foundations blog.

keep up to date with the latest news, information and advice from our team

shield on blue background

3 min read

How often should you conduct cyber security awareness training?

We often get asked how regularly cybersecurity awareness training should be done. Is annually enough? We don’t think so. In fact, we provide weekly cyber awareness training to all our support customers. It covers a whole host of cyber crime topics...

Read More
a hooded person holding a phone with a question mark in front of their face

3 min read

Why did I just receive a text from myself? It’s probably smishing.

Have you received a text message from yourself? If you have then you should delete it immediately because it’s probably a smishing attempt.

Read More
A mobile phone showing a padlock

3 min read

Top 5 threats to your mobile phone

Smartphones and tablets are often the preferred device for communications, web searching, and accessing many types of apps. They’re more portable...

Read More
Mobile apps on a screen

3 min read

Microsoft Teams: comparing the available plans in 2022

Microsoft Teams has become an invaluable tool to many businesses. We can’t imagine getting through the last few years without it. That said the...

Read More
Two monitors on a desk

4 min read

Are bigger monitors really more productive?

Multiple monitors and ultrawide monitors look impressive. They also dramatically improve efficiency!

Read More
visualisation of devices interacting in the cloud

3 min read

4 interesting cloud storage trends to watch for in 2022

Cloud storage. It’s not particularly exciting but it is one of the oldest and most useful cloud computing services out there. Storing files in the...

Read More
A padlock logo

3 min read

How to protect your online accounts from being breached

Stolen login credentials are a hot commodity on the Dark Web. There’s a price for every type of account from online banking to social media. For...

Read More
Edinburgh skyline

2 min read

Attempted cyber attacks on the rise in Edinburgh

Protect your business Businesses across Scotland’s capital are coming under increased attack from cyber criminals. The situation At IT Foundations we...

Read More
a tablet computer  displaying the words Warning Cyber Attack

3 min read

What you need to know about the rise in supply chain cyberattacks

Any cyberattack is dangerous, but the particularly devastating ones are those on supply chain companies. These “one-to-many” supply chain...

Read More
cartoon of a fishing hook extracting data from a computer

3 min read

6 ways to combat social phishing attacks

Phishing is the number one method of attack delivery for everything from ransomware to credential theft. We are very aware of it coming by email, but...

Read More
A mobile phone showing the recycling logo

3 min read

Important steps to take before you change your mobile phone number

Changing your number? Check this first There are some important steps to take before you change your mobile phone number that most people don’t think...

Read More
A digital padlock on a circuit board background

3 min read

Top 5 cyber security mistakes that leave your data at risk

The global damage of cybercrime has risen to an average of $11 million USD per minute, which is a cost of $190,000 each second. You can give yourself...

Read More