Skip to the main content.

Our client portal provides all the tools you need to create, view or update your support requests. 


For urgent IT support during business hours, or if you suspect anything suspicious call  01314528444 for the fastest response.


If one of our team has asked you to start a remote control session on your computer, use the remote control menu option above.

it foundations blog.

keep up to date with the latest news, information and advice from our team

Cyber Security (5)

padlock symbol

3 min read

What to do when you have lost your mobile device

Few things invoke instant panic like a lost mobile device, be that smartphone or laptop. These devices hold a good part of our lives. This includes...

Read More
a criminal holding a fishing rod, trying to hook  victim's computer

3 min read

You need to watch out for reply-chain phishing attacks

Phishing. It seems you can’t read an article on cybersecurity without it coming up, and we write about it all the time at IT Foundations. That’s...

Read More
cartoon of a hand fixing a computer with a wrench

3 min read

6 discontinued technology tools you shouldn’t be using any longer

One constant about technology is that it changes rapidly. Tools that were once staples, like Internet Explorer and Adobe Flash, age out. New tools...

Read More
Some Employees Won’t Stop Using Apps That Could Be A Security Risk

1 min read

Some employees won’t stop using apps that could be a security risk

Some employees won’t stop using apps that could be a security risk. It’s likely a lot of the applications and software tools you’re using now are...

Read More
a laptop showing a message being fished out of it

3 min read

How using the SLAM method can improve phishing detection

What is the SLAM method and how does it help identify phishing?

Read More
shield on blue background

3 min read

How often should you conduct cyber security awareness training?

We often get asked how regularly cybersecurity awareness training should be done. Is annually enough? We don’t think so. In fact, we provide weekly...

Read More
a hooded person holding a phone with a question mark in front of their face

3 min read

Why did I just receive a text from myself? It’s probably smishing.

Have you received a text message from yourself? If you have then you should delete it immediately because it’s probably a smishing attempt.

Read More
A mobile phone showing a padlock

3 min read

Top 5 threats to your mobile phone

Smartphones and tablets are often the preferred device for communications, web searching, and accessing many types of apps. They’re more portable...

Read More
A padlock logo

3 min read

How to protect your online accounts from being breached

Stolen login credentials are a hot commodity on the Dark Web. There’s a price for every type of account from online banking to social media. For...

Read More
Edinburgh skyline

2 min read

Attempted cyber attacks on the rise in Edinburgh

The situation Businesses across Scotland’s capital are coming under increased attack from cyber criminals. At IT Foundations we have seen an increase...

Read More