, , , , ,

Whitelist a domain in Office 365 Exchange Online | HowTo

We get asked this particularly irksome issue by clients from time to time. It’s almost always described as “all of the emails from our most important client are going into Spam” or perhaps “the world is about to end and I’ve found the most important email ever in my Junk Folder”. Ordinarily this can be […]

, , , ,

It’s not about capacity, it’s what you do with it.

This week, BT had an outage. Hundreds of thousands of customers were left without internet or phone services. In the aftermath, it was discovered that the cause was a broken router, and this single point of failure was responsible for widespread disruption, and the loss of incalculable productive hours and revenue. Additionally, BT’s customer contact […]

, , , , ,

Eating your own dog food!

Eating your own dog food

Goodness, it’s been ever such a long time since I last posted. We’ve been busy. I wish I could say we’ve been busy acquiring new customers and altering many a paradigm. The reality is much more mundane but equally as important. We moved into our own office on the 1st December 2015, and as it […]

, , , , ,

Passwords, encryption and good practice

Passwords, encryption and good practice

Passwords should be complex and changed regularly. Encryption should be implemented for any business critical information and especially for any information which is mobile or transported in any fashion. Why then do we still get asked the question “why do we need to change our passwords so often” and “do we have to have such […]

, ,

Cyber Security and Cyber Fraud

Cyber Security and Cyber Fraud

Cyber security and cyber fraud. Look, there is no easy answer to this, albeit many pundits, commentators and politicians would have you believe there is. First of all, I’m a technologist, I love it. However, technology does not hold the key to the solution to this issue. The simplistic application of some ethereal technical solution […]