Many people think of Microsoft Teams as a platform to host meetings and calls, but there’s so much more to this application than meets the eye. Particularly now when remote and hybrid working have become so prominent in our society, collaborative platforms, and communication “on the fly" have been widely needed and depended on. Microsoft have brought us several new collaboration features over the last a few years; for example, co-authoring of documents, sharing links to files instead of the files themselves and persistent chat.
Windows 365 is your PC in the cloud. Securely stream your personalised Windows experience, including your desktop, apps, settings, and content, at any time to any device. MSPs will be able to offer a fully-managed service, to assign and configure Cloud PCs using familiar tools like Microsoft Endpoint Manager.
Each month Microsoft roll out updates to its products services including Teams, Outlook, SharePoint and much more! You could look through all the updates on the Microsoft roadmap. But to make it easier, we’ve put together the top ones to look out for this June.
Most small organisations do not have an IT department, or technical staff responsible for cyber security. And with so much cyber security advice out there, it can be difficult for small organisations to know where to start. This is where the NCSC's new training for small organisations and charities can help. It guides you through all the actions you need to take to reduce the likelihood of you becoming a victim of the most common cyber attacks.
Remote/Hybrid working has created many positives around recruiting talent. We can widen our recruitment search area, reduce office and infrastructure costs and improve employee engagement, to name but a few. However, the challenge it creates is how you onboard new people when you have never met them face-to-face?
Simply put, shadow IT refers to any IT related projects or programmes including apps, software, services and devices being used within in a business without the knowledge of the management team. With the increase in use of cloud technology so has the use of these unauthorised cloud-based systems, often with the intention of improving productivity and efficiency, however, this also increases the risks to businesses.
Weak passwords, a lack of updates and network vulnerabilities mean some home routers could be putting users at risk In December 2020, Which? conducted a survey of more than 6,000 UK adults, asking them which routers they’re using at home.
In 2025 the last elements of Openreach’s analogue and ISDN digital copper network will be turned off as an all-IP network replaces these legacy services. The impact on telephony and broadband services is far reaching so you need to know how it will impact you. The project has already begun so don’t wait to consider your options.
So, what is an impersonation scam? With so many different scams out there nowadays it can be difficult to keep a track of them but this is a particularly nasty one to watch out for as they often use a voice of authority to coerce their victims and leave them feeling pressured into acting quickly. Impersonation scams can come as a phishing email, smishing text or even a phone call and cyber criminals often choose to impersonate an authority figure like your manager, the HMRC or even the CEO of your company.