Ransomware backup protection

The National Cyber Security Centre recommend organisations use backups as a way to help mitigate against a wide range of potentially catastrophic problems, such as fire, theft, flooding, and – naturally – ransomware.

Cloud Connect

Cloud Connect uses the latest in fibre hardware technology to create a physical link between your network, and the cloud. While most data will travel across the public Internet, Cloud Connect is a dedicated connection between your network and your cloud services. Learn what it is, how it works, why you need it.

Office 365 App Password

If you’re using Multi-Factor Authentication for your organisation, and want to use Apps that connect to your Office 365 account, you will need to create an Office 365 App Password. Thankfully, it’s really easy to do, if a little hard to find.

Azure Multi-Factor Authentication HowTo

Azure Multi-Factor Authentication HowTo: In Part One and Part Two we covered step-by-step of how to enable Multi-Factor Authentication in the Admin Panel and enrol users. In Part Three I will cover the additional steps the user is required to take in order to install and verify Multi-Factor Authentication with the Azure Multi-Factor Authenticator App.

Office 365 Multi Factor Authentication HowTo

Office 365 Multi-Factor Authentication HowTo: In Part One we covered step-by-step of how to enable Multi-Factor Authentication in the Admin Panel. In Part Two I will cover the additional steps the user is required to take in order to enrol in Multi-Factor Authentication. The user will create two forms of verification and update their account recovery details.

Office 365 Multi Factor Authentication Exchange Online Multi Factor Authentication HowTo

Exchange Online Multi-Factor Authentication HowTo: We’ve covered the notion of two-factor authentication (2FA) and multi-factor authentication (MFA), especially how you MUST enable it for sensitive accounts. I include all IT users, plus any senior management user within the organisation, such as the MD/CEO as their email is sensitive enough to justify Exchange Online Multi-Factor Authentication.

Leased Line Providers UK

Even though we work with all of the Tier 1 network and leased line providers, we don’t often talk about it. This is due in part to our customers’ network and ethernet fibre leased line services being both commercially sensitive and a security risk should we divulge their details. It is also a relatively complex area of IT infrastructure, where one size rarely fits all. So here goes . . .

Fibre internet ultrafast broadband

Fibre Broadband: In a statement yesterday, the Advertising Standards Authority (ASA) said it was acting because of “evolving concerns” about the way fibre internet services were being advertised. ISPs are advertising services as being “fibre internet” or “fibre broadband“, when in actual fact they rely upon copper wires for the last-mile link. The probe has been prompted by […]

Leased Line Birmingham

If your organisation needs connectivity to support business critical data and applications, it’s important to find a solution that works for you, and a leased line connection is often part of that. Leased lines provide connections between networks that require data to ease communication. This could mean they connect offices to the Internet, or to other geographically distant offices and sites, or they might even carry telephony data such as a call centre.