Skip to the main content.

Our client portal provides all the tools you need to create, view or update your support requests. 


For urgent IT support during business hours, or if you suspect anything suspicious call  01314528444 for the fastest response.


If one of our team has asked you to start a remote control session on your computer, use the remote control menu option above.

it foundations blog.

keep up to date with the latest news, information and advice from our team

Windows Login screen

1 min read

Can’t login to your computer? Try these steps.

The Problem You’ve sat down at your desk after IT or a colleague have been working on your Windows device and now you can’t login to your computer. Don’t worry. It’s probably very easy to fix. Your IT team or your colleague have likely been working...

Read More
padlock symbol

3 min read

What to do when you have lost your mobile device

Few things invoke instant panic like a lost mobile device, be that smartphone or laptop. These devices hold a good part of our lives. This includes...

Read More
a criminal holding a fishing rod, trying to hook  victim's computer

3 min read

You need to watch out for reply-chain phishing attacks

Phishing. It seems you can’t read an article on cybersecurity without it coming up, and we write about it all the time at IT Foundations. That’s...

Read More
cartoon of a hand fixing a computer with a wrench

3 min read

6 discontinued technology tools you shouldn’t be using any longer

One constant about technology is that it changes rapidly. Tools that were once staples, like Internet Explorer and Adobe Flash, age out. New tools...

Read More
Some Employees Won’t Stop Using Apps That Could Be A Security Risk

1 min read

Some employees won’t stop using apps that could be a security risk

Some employees won’t stop using apps that could be a security risk. It’s likely a lot of the applications and software tools you’re using now are...

Read More
a laptop showing a message being fished out of it

3 min read

How using the SLAM method can improve phishing detection

What is the SLAM method and how does it help identify phishing?

Read More
shield on blue background

3 min read

How often should you conduct cyber security awareness training?

We often get asked how regularly cybersecurity awareness training should be done. Is annually enough? We don’t think so. In fact, we provide weekly...

Read More
a hooded person holding a phone with a question mark in front of their face

3 min read

Why did I just receive a text from myself? It’s probably smishing.

Have you received a text message from yourself? If you have then you should delete it immediately because it’s probably a smishing attempt.

Read More
A mobile phone showing a padlock

3 min read

Top 5 threats to your mobile phone

Smartphones and tablets are often the preferred device for communications, web searching, and accessing many types of apps. They’re more portable...

Read More
Mobile apps on a screen

3 min read

Microsoft Teams: comparing the available plans in 2022

Microsoft Teams has become an invaluable tool to many businesses. We can’t imagine getting through the last few years without it. That said the...

Read More