Exploring the future: automation in 2024 and the three trends influencing global shifts.

Automation in 2024: Three Trends Shaping the Universal Shift

Yann Guides 9 minutes

Introduction Automation is simply unmissable in the modern business world. With 48% of businesses utilising automation as part of their processes, it’s become essential to know the technology’s ins and outs and how it can be useful to your organisation. Nearly half of all businesses integrate automation into their workflows, so it’s not just a buzzword—it’s a revolution. As we …

Server warranties ensure continuity, leaving no server behind and safeguarding secret information.

No Server Left Behind: Warranty Secrets for IT continuity

Yann Guides 4 minutes

A standard three-year server warranty is just the start. To truly protect your IT setup, you need to know the nitty-gritty of your warranty. We’ll highlight why you can’t overlook warranty details, how they link to your bottom line, and how to pick the right warranty to fit your business needs. Server Warranties: Beyond the Basics The typical three-year warranty …

The BT switch off plan prompts urgent action to implement best practices.

The Big Switch Off Best Practice Plan – Take action now

Yann Guides 3 minutes

Emerging technologies such as SIP (Session Initiation Protocol) and VoIP (Voice over Internet Protocol) are poised to revolutionize digital services, surpassing the outdated PSTN (Public Switched Telephone Network) networks. By embracing these advancements, customers can expect various advantages, including enhanced capacity, faster speeds, and a versatile range of features. By the end of 2025, PSTN will be switched off across …

IT Challenges

Strategies for Success: Conquering IT Challenges in Nonprofits

Yann Guides 9 minutes

Introduction: Charities in the UK play a crucial role in providing essential services to people worldwide, but often they encounter unique IT challenges due to limited budgets and factors of a nonprofit nature. As the digital world continues to evolve, UK nonprofits must address these obstacles to remain effective and competitive. In this guide, we’ll explore the top IT challenges …

An image of a man boxing with the words introduction 2 cyber incident response plan using the cyber incident form.

Introduction to a Cyber Incident Response Plan

Yann Guides 2 minutes

The Cyber Security Breaches Survey 2023 highlights that in the last 12 months: 32% of businesses and 24% of charities overall recall any breaches or attacks. This is much higher for medium businesses (59%), large businesses (69%) and high-income charities with £500,000 or more in annual income (56%). Among those identifying any breaches or attacks, we estimate that the single …

The importance of backup and disaster recovery.

Unlocking Peace of Mind: The Crucial Role of Backup and Disaster Recovery

Yann Guides 11 minutes

Regarding computer catastrophes, individuals often rely on backups as their go-to solution for restoring their data. However, for larger organisations, the effectiveness of backups in post-disaster scenarios is limited. On the other hand, organisations that have a well-structured and comprehensive disaster recovery process in place are able to swiftly restore operations. Both detailed backup and disaster recovery processes are crucial …

The very useful guide to windows 11 shortcuts.

Windows 11 shortcuts

Yann Guides 11 minutes

  Welcome to our updated Windows 11 shortcuts guide   Windows key + A — Open the Quick Settings panel. This lets you turn Wi-Fi, Bluetooth, aeroplane mode, and more features on or off. You can also adjust the brightness of your screen and computer volume in this panel. Windows key + C — Open Chat with Microsoft Teams. This …

3 ways you can leverage ChatGPT for your business today.

3 Ways you can use ChatGPT in your business today

Yann Guides 5 minutes

Small business owners are the backbone of our communities, working tirelessly to provide services and products that drive local economies. But with the challenges of managing finances, operations, and customer satisfaction, it can be overwhelming to keep up with the demands of running a small business. That’s where ChatGPT comes in, offering a powerful solution to help small business owners …

Warning IT policy and cyber security considerations.

Onboarding New Staff: IT and Cyber Security Considerations

Yann Guides 6 minutes

Onboarding new staff is an exciting time for any business. It represents growth, expansion, and new opportunities for your company. However, it’s important to take the necessary steps to ensure that the onboarding process is done smoothly and securely. With so much sensitive information being stored on computers and in the cloud, it’s crucial to take an IT and cyber …

Effective budgeting tips and tricks for businesses and charities to procure low cost software licenses.

Effective Budgeting for Software Licenses: Tips and Tricks for Businesses and Charities

Yann Guides 7 minutes

Software licenses can be a major expense for businesses, particularly for those that rely on multiple software programs to run their operations. While these licenses are often necessary for productivity and efficiency, they can also take up a significant portion of a company’s budget. Efficient use of software in business can provide a competitive advantage. This is especially true today, …

The state of cybersecurity 2021 in numbers.

The State of Cybersecurity in 2023

Yann Guides, News 2 minutes

How to protect your business in the face of an ever-evolving threat landscape When looking back at 2022, it was a turbulent year, full of macroeconomic and geopolitical risk. From the war in Ukraine to rapid inflation and supply chain failures, it has been the perfect storm of interlocked risks. This has had a profound effect on cybersecurity for businesses …

Power Down sequence.

What’s your power down sequence?

Yann Guides, Tips 5 minutes

As we’ve already highlighted, many businesses are now planning for possible power outages and blackouts. The one question we’ve been hearing from many of our clients is what needs to be turned off and when? From an IT and facilities perspective, it’s worth writing up a checklist for your office on what exactly needs to be turned off manually and …

What is ftp broadband?.

What is FTTP Broadband?

Yann Guides 1 minute

FTTP stands for Fibre To The Premises,and it is interchangeably referred to as ‘Ultrafast’ or ‘Full Fibre’ broadband delivering speeds up to 1Gbps. It is a pure fibre connection from the exchange into your business so, unlike FTTC where broadband is delivered via fibre optic cables only as far as the cabinet, FTTP uses cable across the entire distance to …

An advertisement for a business phone system in the BT switchoff.

BT Openreach has announced it intends to switch off traditional landlines in 2025.

Yann Guides 2 minutes

BT Openreach has announced it intends to switch off traditional landlines in 2025. This is commonly called the Public Switch Telephone Network(PSTN) and Integrated Services Digital Network (ISDN) switch-off. Now is the time to look at an alternative system that is future-proof and resilient, that would be Voice over the Internet (VoIP) By the end of 2025, everyone in the …

A poster with the words academy of 5 phishing attacks.

Protect your business from the evolving threat of phishing attacks

Yann Guides 12 minutes

According to recent research by Tessian, 26% of employees have clicked on a phishing email at work in the past year. For this reason, and many others, there is no surprise that most CISOs are concerned about how phishing attacks are evolving. Thankfully, email security solutions are always becoming more advanced and stopping more potentially malicious emails and attachments. However, …

A laptop screen displaying a shared calendar.

How to share calendar in Outlook

Yann Guides 2 minutes

Share your calendar with others so they can view details about your schedule. Share your calendar Select Calendar > Share Calendar. Choose a calendar to share. Select Add, decide who to share your calendar with, and select Add. Select OK and you’ll see the added people with a default permission level. Choose a name, select the access level to give, …

How to make the most of your microsoft 365 investment.

How to make the most of your Microsoft 365 investment

Yann Guides 2 minutes

The way that businesses use technology has changed drastically over the past 5 years. Many of these changes are due to the move from office-based work to remote or hybrid work. As organisations made this move, it was essential to implement new technology solutions to enable productivity, communication and collaboration. Working with a trusted IT provider can help your business …

Maximize Microsoft Teams with direct routing.

Make the most of Microsoft Teams with Direct Routing

Yann Guides 2 minutes

Direct Routing allows you to connect Teams to preimum voice service providers. This allows you to take advantage of cheaper call rates, more flexibility, and better support. It’s also helpful for users locked into existing contracts with other PSTN providers. They can use Teams without any contract violations. Put simply, Direct Routing enables users to make and receive external calls …

Suspect malware and how to protect your business.

Suspect Malware and How to Protect your Business

Yann Guides 12 minutes

In 1971, the first worm proof of concept was created, called ‘The Creeper’. This worm was able to spread via network protocol, infecting remote computers to display the message “I’m the creeper, catch me if you can”. However, ‘The Creeper’ was not technically malware as it was not created with malicious intent. Fast forward 51 years and there are over …

Email security guide for SMBs.

Our Guide to Email Security for SMBs

Yann Guides 11 minutes

Please find Our Guide to Email Security for SMBs Emails are the lifeblood of any business, and with that, here are some little statistics: https://abcom.co.uk/our-guide-to-email-security-for-smbs/ In 2021 1) there were 3.9 billion active email users. 2) In the US, workers receive an average of 126 emails daily. 3) Nearly 60 billion junk emails will be sent each day in the …

Accessible technology guide.

Make your business’s technology more accessible with these tools

Yann Guides, News 9 minutes

Every employee has their own set of needs and requirements, and it is the employer’s responsibility to accommodate them. This is especially true for employees with disabilities. Although businesses need to make accessibility accommodations for their building and internal processes, it is also important that technology is accessible too. Thankfully, the most widely used technology solutions have built-in tools to …

What are insider threats and how can you defend against them?.

What are insider threats and how can you defend against them?

Yann Guides 8 minutes

Typically, most businesses are concerned about external adversaries maliciously accessing confidential data and systems. However, businesses often neglect to safeguard against their own employees who are threats to the business. This concept is known as insider threats. An insider threat is any employee, vendor, contractor or person within a business that has authorised access to sensitive data or IT systems, …

Tips to stay safe using hotel and public wi-fi networks.

Tips To Stay Safe While Using Hotel & public Wi-Fi

Yann Guides 11 minutes

Public Wi-Fi has come a long way over the last few years in terms of improved security as many have realized that by offering this amenity, they are somewhat liable if their occupants get hacked while using it. Wireless access is now everywhere, on trains, in shopping centre and just about anywhere we meet other people. Nevertheless, it is still very …

Business broadband our guide for small to medium businesses.

Business broadband – A quick overview on the new broadband technologies

Yann Guides, News 1 minute

What is the difference between FTTP and SOGEA? We can help demystify what broadband service you need for your business. We match your business technological requirments with the most suitable broadband package. Our broadband solutions make us the perfect end-to-end supplier for your connectivity and communication requirements. Includiing IP telephony, video and conferencing services as well as instant messaging,

How crucial are passwords in the realm of cyber security?

The role passwords play in a world of cybercrime

Yann Guides 9 minutes

In previous articles we have described that there is a multi tiered approach to adopting cybersecurity. This is an ongoing process and needs to be constantly reviewed and improved upon. One very important aspect and should take priority, is safeguarding the use of passwords. For businesses, one weak password can be the cause of a major cybersecurity incident. For this …

How can your business stay victorious in the face of increased global cyber risk?.

How can your business stay vigilant in periods of “heightened” global cyber risk?

Yann Guides 10 minutes

Following Russia’s attack on Ukraine, the National Cyber Security Centre has placed the cyber threat in the UK as “heightened”. The cyber challenge becomes increasingly complex as the hacktivists group Anonymous have become involved. Anonymous has apparently hacked into Russia’s media censorship agency and released 340,000 files in the latest undermining of Putin’s war media campaign. The reality is that …

How does cloud technology benefit nonprofits in 2021?

How does Cloud Technology Benefit Not For Profits

Yann Guides 10 minutes

Charities and voluntary sector businesses must operate at optimum and ensure they get the best value for money. Technology has become increasingly important, and if the systems don’t operate properly, this can affect time-critical service delivery and projects. If your charity or organisation has not moved across yet, there are some key considerations to make. What is the business case …

What is all the fuss about passwordless authentication?

What is all the fuss about Passwordless Authentication?

Yann Guides, News 9 minutes

Poor password hygiene remains a key security weakness for many businesses. All employees know that a password should be long, complex, unique and never shared with anyone. Although this is simple in theory, in practice it can be difficult to remember a new complex password for every application or system. For this reason, it is common for employees to re-use …

Endpoint protection - what is it and how does it work.

Key challenges of endpoint security

Yann Guides, News 8 minutes

  The rise of hybrid working has forever changed how businesses must view their security posture. As employees are now working between multiple locations, the risk of data breaches, cyberattacks and network intrusion has grown exponentially. With employees working from home, it is more difficult for IT teams to ensure employees are following best practices to avoid an attack, and …

A group of soldiers forming a human firewall around an email symbol.

The Human Firewall: 6 steps to design effective cybersecurity training using your staff

Yann Guides 8 minutes

The cybersecurity threat landscape is constantly evolving, and cyberattacks becoming more common with 4 in 10 businesses reporting having cybersecurity breaches or attacks in the past 12 months. There are many cybersecurity solutions available to strengthen a business’s security posture, including firewalls, endpoint protection and email security. However, for a business to safeguard themselves from a potential attack they must …

What do you do if you experience a cyber attack?

What do you do if you fall victim to a cyberattack?

Yann Guides, News 9 minutes

Between 2020 and 2021, 4 in 10 businesses and a quarter of charities reported some form of cybersecurity breach or attack. These figures are increasing year-on-year as cybercriminals innovate with new attack vectors to infiltrate businesses for profit or to steal valuable data. For a business owner, if you have not already, now is the time to invest in a …

Thinking of implementing BYOD? Some key tips on getting it right.

8 steps to successfully implement a BYOD programme

Yann Guides, News 8 minutes

As employees return to the office, many businesses will be implementing a Bring-Your-Own-Device (BYOD) programme. There are many potential benefits of introducing a BYOD programme, including substantial cost savings, convenience for employees, and flexibility in work location. However, if your programme is not well planned, it carries a significant security risk. Employees may be using an unsecured device on a …

2021 guide to hybrid working: keep your business safe from anywhere.

The 2021 Guide to How to keep your business safe from anywhere, on any device – Hybrid Working – Cyber Security

Yann Guides 3 minutes

After months of working from home, restrictions have now eased, and many businesses have implemented a hybrid work model whereby employees work both in the office and remotely. This comes as no surprise as a recent survey found that 47% of employees would be likely to look for another job if their employer failed to offer flexible working arrangements. Hybrid …


10 tips to get the most out of Microsoft OneNote

Yann Guides, News, Tips 8 minutes

Microsoft 365 is the gift that keeps giving. There is a smorgasbord of cool apps. Notably, this feature is about OneNote. This great app is a digital notebook for legal eagles, students and everyone else. Microsoft OneNote is a digital note-taking app that is packed full of features. It is easy to use and can be organised like a real …

Work smarter with Microsoft Outlook tips.

Work smarter in Outlook with these tips

Yann Guides, News 10 minutes

The amount of emails sent and received around the world is growing day by day. By 2021 there are approximately 4.147 billion email users in 2021 Microsoft first released their email client known as Microsoft Internet Mail and News in 1996. Since then, Outlook has gone through many changes and is now one of the Microsoft applications that most people use …