What to Include in a Year-end Technology Infrastructure Review
Don’t go into 2023 without a plan for optimising your technology. Start on the right foot, improve productivity, and lower costs with a year-end technology review. We’ll tell you what to include!
Tips for Overcoming Barriers TO a Smooth BYOD Program
Bring-your-own device programs are popular because they’re more affordable than buying mobile devices for staff. But employee-owned devices are often a security risk. We’ll tell you how to manage BYOD better to mitigate the chance of a network breach.
A Simple Guide to Better Endpoint Protection
Endpoints make up much of a company's network and IT infrastructure. Each device allows a hacker to penetrate a company's defences, so an endpoint security strategy is critical to address endpoint risk and put focused tactics in place.
Checklist for Better Digital Offboarding of Employees
Digital footprints cover today's modern workplace. Employees begin making these the moment they're hired. They get a company email address and application logins. They may even update their LinkedIn page to connect to your company.
Internet Explorer Has Lost All Support - What You Need to Know.
As of June 15, 2022, Microsoft dropped the web browser from support. So, now that IE has reached its End Of Life (EOL), what happens next?
Get More Out of Microsoft 365 With These handy Tips.
Would you like to get more value from your Microsoft 365 subscription? These are some of the most helpful apps and features in Microsoft 365 that could save you and your team time and money.
What Can You Do If Your Mobile Device Is Lost to Lower Your Risk?
Few things invoke instant panic, like a missing smartphone or laptop. These devices manage a good part of our lives through files, personal financials, apps, passwords, pictures, videos, and so much more. So, what can you do if your mobile device is lost to lower your risk?
Critical IT policies any size practice should implement
Many small businesses make the mistake of skipping policies. They feel that things don't need to be so formal. So instead, they'll tell staff what they expect when it comes up and hope that's good enough.
6 Discontinued Technology Tools You Should No Longer Be Using.
One constant about technology is that it changes rapidly. Tools that were once staples, like Internet Explorer and Adobe Flash, age with new tools replace those that are obsolete. Discontinued technology can leave computers and networks vulnerable to attacks.
What are the best ways to give an older PC a new lease of life?
Purchasing a new computer is a significant investment. Many small businesses and home PC owners struggle with older systems because they want to get as many years out of them as possible.
Home Security: Why You Should Put IoT Devices on a Guest Wi-Fi Network
Over 25% of all cyberattacks against businesses involve IoT devices. With so many remote workers, it’s important to use this home security tip to create a network barrier between IoT and more sensitive devices.
How Often Do You Need to Train Employees on Cybersecurity Awareness?
How frequently is sufficient to raise your team's level of cyber awareness? It turns out that four months between training sessions is the "sweet spot" and produces more reliable outcomes for your IT security.
Utilise Your Laptop's Battery for Longer by Using These Power-Saving Tips
It can be upsetting to see your laptop's battery capacity decline. However, you can do several things to lengthen the period of time you can go without plugging it in.
Does Microsoft’s edge browser really have the “edge”?
Our internet browser is one of the most important programmes we select. Since many programmes are now cloud-based and accessible only through browsers, we typically operate with them using our computers or mobile devices.
Is it true that two monitors make you more productive than one?
When you see somebody with two monitors, you might suppose they have some specialised task that necessitates so much screen real estate, or they just really like technology. Even if you're doing accounting or paperwork all day, having the extra display space that a second screen gives can be beneficial.
It’s world password day!
Are you still using your pet’s name followed by a “@” for your account password? Sorry, but it won’t keep you safe in 2022. So, for World Password Day, here’s a term you should know - Layerup!
The Death Star is the easiest-to-hack infrastructure in the entire universe.
THE DEATH STAR'S SECURITY MEASURES AND STORMTROOPER ACTION PROTOCOLS ARE SO BAD THAT A SINGLE HACKER WITH RUDIMENTARY COMPUTING EXPERTISE WOULD HAVE BEEN ENOUGH TO DESTROY DARTH VADER'S ARMY AND THE EMPEROR INSTEAD OF SENDING OUT A BUNCH OF JEDI KNIGHTS WITH LIGHTSABRES.
how we spent our easter weekend…
While the rest of the country slowly woke to a sunny (shocker!) Good Friday - the Redgate IT team were several hours into a critical move for a long-running client to the newest Data Centre.
Transitioning to Named User Licenses in Autodesk Licensing
AUTODESK ANNOUNCED THAT IT WOULD STOP SUPPLYING NETWORK LICENCING AND MAINTENANCE IN MAY 2021. BECAUSE SO MANY CAD MANAGERS ARE RESPONSIBLE FOR SUPPORTING AUTODESK PRODUCTS, ANY SIGNIFICANT CHANGE IN THE COMPANY'S LICENCING REGULATIONS IS MASSIVE NEWS FOR OUR CLIENT'S PROFESSION.
It’s world back up day!
It’s World Backup Day when our technology geeks remind you of the need to backup your data. Of course, we remind you of this more frequently than once a year, but we’ll use this as an excuse to do it again!