Skip to the main content.

Our client portal provides all the tools you need to create, view or update your support requests. 


For urgent IT support during business hours, or if you suspect anything suspicious call  01314528444 for the fastest response.


If one of our team has asked you to start a remote control session on your computer, use the remote control menu option above.

it foundations blog.

keep up to date with the latest news, information and advice from our team

Cyber Security (2)

a qr code on a virus cell

1 min read

Why you shouldn't scan QR codes

We thought we’d write an impromptu blog to address a menace that has started to flood inboxes this week. QR codes have always been dangerous ; they...

Read More
Cyber Security Month

3 min read

Cybersecurity awareness month: strengthening your team’s defences

October is Cybersecurity Awareness Month. It serves as a timely reminder that there are many ways to safeguard data. Following the basics can make a...

Read More
a criminal behind an envelope containing a skull and cross bones

3 min read

Business email compromise jumped 81% last year! Learn how to fight it

For decades now email has been an essential part of our daily lives. Many people use it for various purposes, including business transactions. With...

Read More
Person working on a laptop at home

3 min read

How to address the cyber security risks of remote working

Remote working became increasingly popular during covid but it is very much here to stay as many workers have found they are much more productive...

Read More
skull pattern within computer code

3 min read

What is zero-click malware? How do you fight It?

It shouldn’t be news by now that cybersecurity threats continue to evolve. It’s something that we talk about on a very regular basis, heck it’s a...

Read More
Padlock

3 min read

How to use threat modelling to reduce your cyber security risk

As cyber threats continue to increase, businesses must take proactive steps and the first step towards that is threat modelling.

Read More
Wifi text incorporating a wireless router

2 min read

Best practice for securing your home network

Many of us work from home these days but is your home actually safe to work from? Securing your home network has become more critical than ever. A...

Read More
A hacker hiding in code on a computer screen

3 min read

How to tell if your computer might have a malware infection

Approximately 34% of businesses take a week or longer to regain access to their data and systems once hit with a malware infection. Thankfully there...

Read More
a key with an attached fob saying

3 min read

What are Passkeys and should they be replacing our passwords?

Passkeys are the newest weapon in the fight against credential theft and they’re set to become the norm across the net in the near future. It’s new...

Read More
cartoon of a hand stealing credentials from a laptop

3 min read

What is push-bombing and how can you prevent it?

In this blog we look at push-bombing – what is it and how to avoid it.

Read More
How to send files via secure links with Microsoft Teams visualisation

2 min read

How to send files via secure links with Microsoft Teams

Email has long been the default method of sharing files, but it’s not always the most efficient or secure way. Fortunately, Microsoft Teams offers a...

Read More
Cyber security graphic

3 min read

6 things you should do to handle data privacy updates

Once data began going digital, authorities realised a need to protect it. Thus, the creation of data privacy rules and regulations to address cyber...

Read More