Skip to the main content.

Our client portal provides all the tools you need to create, view or update your support requests. 


For urgent IT support during business hours, or if you suspect anything suspicious call  01314528444 for the fastest response.


If one of our team has asked you to start a remote control session on your computer, use the remote control menu option above.

it foundations blog.

keep up to date with the latest news, information and advice from our team

Cyber Security (4)

ticked checklist

3 min read

Checklist for digitally offboarding employees

Digitally offboarding employees when they leave your organisation is of paramount importance to your security (and your business’s well-being). We...

Read More
woman using a computer

3 min read

Internet Explorer has lost all support (What you need to know)

After being the primary gateway to the internet in the late 1990s and early 2000s, Internet Explorer (IE) is gone. As of June 15, 2022, Microsoft...

Read More
small businesses are cyber attacked 3x more than larger ones

3 min read

Small businesses are cyberattacked 3x more than large ones

Have you felt more secure from cyberattacks because you have a smaller business? Maybe you thought that you couldn’t possibly have anything that a...

Read More
Computers in a home

3 min read

5 mistakes companies make with their remote working setup

The pandemic has been a reality that companies around the world have shared. It required major changes in how they operate. No longer, did the status...

Read More
padlock symbol

3 min read

What to do when you have lost your mobile device

Few things invoke instant panic like a lost mobile device, be that smartphone or laptop. These devices hold a good part of our lives. This includes...

Read More
a criminal holding a fishing rod, trying to hook  victim's computer

3 min read

You need to watch out for reply-chain phishing attacks

Phishing. It seems you can’t read an article on cybersecurity without it coming up, and we write about it all the time at IT Foundations. That’s...

Read More
cartoon of a hand fixing a computer with a wrench

3 min read

6 discontinued technology tools you shouldn’t be using any longer

One constant about technology is that it changes rapidly. Tools that were once staples, like Internet Explorer and Adobe Flash, age out. New tools...

Read More
Some Employees Won’t Stop Using Apps That Could Be A Security Risk

1 min read

Some employees won’t stop using apps that could be a security risk

Some employees won’t stop using apps that could be a security risk. It’s likely a lot of the applications and software tools you’re using now are...

Read More
a laptop showing a message being fished out of it

3 min read

How using the SLAM method can improve phishing detection

What is the SLAM method and how does it help identify phishing?

Read More
shield on blue background

3 min read

How often should you conduct cyber security awareness training?

We often get asked how regularly cybersecurity awareness training should be done. Is annually enough? We don’t think so. In fact, we provide weekly...

Read More
a hooded person holding a phone with a question mark in front of their face

3 min read

Why did I just receive a text from myself? It’s probably smishing.

Have you received a text message from yourself? If you have then you should delete it immediately because it’s probably a smishing attempt.

Read More
A mobile phone showing a padlock

3 min read

Top 5 threats to your mobile phone

Smartphones and tablets are often the preferred device for communications, web searching, and accessing many types of apps. They’re more portable...

Read More