Don’t Fall for the Trap: How to Protect Yourself from Social Engineering Attacks Many cyberattacks prey on a lack of education on the topic to create a trap to lure potential victims in. Rather than going for the systems, these attacks target the very people operating them. This is an attack known as a social engineering attack, and they’re one …
The Complete Guide to Server Decommissioning
As with any piece of hardware, your servers will eventually come to the end of their lifespan. But what do you do with your server afterwards? How do you remove it from your systems and ensure everything remains stable and secure in the process? This process is known as server decommissioning and is vital to consider whenever you take servers …
Microsoft 365 Copilot: How to get ready for AI adoption in your company
Here, we have the AI revolution. Businesses worldwide are incorporating AI into their operations rapidly, and with good reason—AI is incredibly versatile and powerful. Given the variety of activities AI can perform for your company, it can be difficult to know where to begin when implementing AI in your operations. Microsoft Copilot gives you access to the most potent AI …
No Server Left Behind: Warranty Secrets for IT continuity
A standard three-year server warranty is just the start. To truly protect your IT setup, you need to know the nitty-gritty of your warranty. We’ll highlight why you can’t overlook warranty details, how they link to your bottom line, and how to pick the right warranty to fit your business needs. Server Warranties: Beyond the Basics The typical three-year warranty …
Benefits of Leased Line vs FTTC: Which Is Right For You?
When it comes to broadband connections, both Leased Lines and FTTC (Fibre to the Cabinet) have their strengths. But which one is the best fit for your needs? Here, we break down the benefits of each. 1. Speed: Leased lines shine when it comes to speed. Offering up to 10 Gbps (10,000 Mbps), they dwarf the ‘up to’ 20 Mbps …
The Dual-Edge of AI: Understanding Core Security Risks & Countermeasures
THE DUAL-EDGE OF AI: UNDERSTANDING CORE SECURITY RISKS & COUNTERMEASURES Introduction Artificial Intelligence (AI) is quickly shaping the conversations around the globe. Its rapid evolution makes it imperative for businesses to grasp not only its perks but the lurking threats. After all, with power comes responsibility, right? Top 4 Security Risks Associated with AI Ever wondered why superheroes face villains? …
What does a wireless survey entail?
In the age of seamless connectivity, a robust wireless network is the lifeblood of any organization. ABCOM offers a comprehensive Wireless Survey solution to ensure optimal performance and coverage, empowered by sophisticated Heatmap Software and a copy of your building’s schematics. In this article, we delve into the intricacies of our offering, explaining how it enhances network optimization and cost-effectiveness. …
Microsoft Purview Unveiled: Mastering Data Safety & Compliance
Imagine you have a big toy box filled with all sorts of toys. Over time, you collect more and more toys, and it becomes hard to remember where each toy is or even what toys you have. Now, imagine there’s a magical toy organiser that helps you keep track of all your toys and tells you where each toy came …
The Benefits of FTTP
Have you switched onto Full Fibre yet? FTTP lines are immune to interference and do not suffer the signal attenuation experienced by copper lines carrying traditional broadband services to the premises. As a result, ultrafast FTTP broadband services deliver significantly higher speeds and are more reliable. Seriously increasing your capabilities, productivity, and output, and removing any reliance on copper-based PSTN …
Microsoft Multifactor Authentication (MFA)
Microsoft is enabling a stronger form of multifactor authentication beginning September 15, 2023 Whom is this aimed at? This will be aimed at companies with Microsoft Entra ID tenants. Why is Microsoft doing this? This is an urgent initiative to drive Azure AD users to transition from SMS/Voice-based Multi-factor Authentication to Microsoft Authenticator app-based MFA. These telephony-based methods of MFA …
Cyber Security Awareness Event: Empowering Businesses and Charities
🔥ATTENTION CHARITY & BUSINESS LEADERS!🔥 💥Are you ready to LEVEL UP your cybersecurity game?💥 STOP being an easy target for cyberattacks! It’s time to arm yourself with the knowledge and tools you NEED to protect your organization! 🚀Join our FREE Cyber Awareness Event NOW!🚀 🎯WHY? Because cyber threats are NOT slowing down, and neither should you! 💡WHAT WILL YOU GET? …
Why Penetration Testing is Essential: A Guide to Robust Cybersecurity
1. Introduction: In the dynamic realm of cybersecurity, Managed Service Providers (MSPs) are the front-line defenders for businesses. As cyber threats multiply, the protective umbrella of our service stack broadens, with penetration testing standing out as a linchpin. Here’s the rundown on its significance: 2. Unearth Vulnerabilities Before They Become Threats: Think of penetration testing as a proactive cyber drill. …
Understanding the Dark Web and its Threats
The dark web, notorious for criminal activity, is the hotspot for cybercriminals trading stolen data. Business credentials or personal details can quickly end up on auction for the highest bidder. Have Your Credentials Been Breached? If your information surfaces on the dark web, it’s a clear sign of a data breach. This compromise can arise from insecure sites, misleading email …
Horizon – A cutting edge cloud phone system for better business communication
Horizon Hosted is a pioneering cloud-based telephone system designed to integrate advanced telephony features into businesses of various sizes seamlessly. With its core telephony switching equipment hosted directly in the telephone exchange, Horizon Hosted offers a robust and reliable solution with a low initial financial commitment. Key Features and Benefits: Cost-Effective Solution: Ideal for small to medium-sized businesses, Horizon Hosted …
The Big Switch Off Best Practice Plan – Take action now
Emerging technologies such as SIP (Session Initiation Protocol) and VoIP (Voice over Internet Protocol) are poised to revolutionize digital services, surpassing the outdated PSTN networks (Public Switched Telephone Network). By embracing these advancements, customers can expect an array of advantages, including enhanced capacity, faster speeds, and a versatile range of features. Despite the promising prospects, a smooth transition requires concerted …
ABCOM IT Solutions Google Review Showcase
Hello there, We hope this message finds you well. We’re excited to share some of the positive feedback ABCOM IT Solutions has received from our esteemed customers via Google reviews. We believe these reviews will give you a clear understanding of our quality of work and the experiences we deliver. Review by Jane Gareze Rating: ⭐⭐⭐⭐⭐ Review Date: A month …
Elevate Your Cybersecurity Awareness: Exclusive Event by ABCOM, featuring Chris White, on September 12th
We are thrilled to invite you to an enlightening event happening on September 12th, from 10 AM – 1 PM, hosted at the scenic Mid Sussex Golf Club. We have a stimulating schedule lined up, with the spotlight on an essential topic – Cybersecurity. Our keynote speaker, Chris White, is a respected Police Detective Inspector and the accomplished Head of …
Strategies for Success: Conquering IT Challenges in Nonprofits
Introduction: Charities in the UK play a crucial role in providing essential services to people worldwide, but often they encounter unique IT challenges due to limited budgets and factors of a nonprofit nature. As the digital world continues to evolve, UK nonprofits must address these obstacles to remain effective and competitive. In this guide, we’ll explore the top IT challenges …
Microsoft Intune: An Overview
Microsoft Intune forms part of Microsoft’s Enterprise Mobility + Security package. It’s a top-notch cloud service designed for superior mobile device and app management. As an MSP, we offer custom Microsoft Intune services to suit your business needs. These services promote productivity, enhance security, and improve the user experience. Why Choose Microsoft Intune? 1. UEM Excellence: Intune combines with other …
Why is Windows Server 2012 R2 becoming obsolete?
Microsoft Windows Server 2012 was the fifth version of the Windows Server operating system. It was released to the market in September 2012, followed by its successor, Windows Server 2012 R2, in October 2013. All Microsoft products and packages adhere to a fixed lifecycle policy. Once a product reaches its end of life, Microsoft no longer provides support or security …
Reimagining Business Operations with Microsoft 365 Copilot: A Comprehensive Overview
As Artificial Intelligence (AI) becomes an indispensable part of enterprise solutions globally, tech behemoths like Microsoft have begun integrating AI capabilities into their flagship tools and applications. A notable example is the innovative Microsoft 365 Copilot that has revolutionised Microsoft’s 365 platform like never before. This article delves into the details of Microsoft 365 Copilot, its groundbreaking features, and the …
Introduction to a Cyber Incident Response Plan
The Cyber Security Breaches Survey 2023 highlights that in the last 12 months: 32% of businesses and 24% of charities overall recall any breaches or attacks. This is much higher for medium businesses (59%), large businesses (69%) and high-income charities with £500,000 or more in annual income (56%). Among those identifying any breaches or attacks, we estimate that the single …
Elevate Your GDPR Compliance with ABCOM IT Solutions and GDAP
At ABCOM IT Solutions, we are committed to providing comprehensive data privacy and security solutions. A key part of our offerings is the implementation of the General Data Protection Regulation (GDPR) Data Access Protocol (GDAP). Designed to empower individuals and businesses with control over their personal data, GDAP aligns seamlessly with the regulations set forth by the GDPR, making it …
Ensuring Uninterrupted Operations: Empowering ABCOM and its Valued Clients with Robust Business Continuity
In order to ensure uninterrupted business operations and provide temporary broadband connectivity to our clients, we have taken proactive measures to enhance our infrastructure. We are proud to announce the implementation of our very own Starlink satellite setup, enabling us to maintain business continuity even in remote areas with limited network coverage. This advanced technology allows us to offer reliable …
Digital Marketing services : Convertable
We only endorse companies that we work with that prove to be reliable and deliver the results. The website and our marketing have had a nice overhaul. Therefore we are happy to recommend their services. ” Do you want to attract more customers, amplify your brand’s reach, and increase your sales? Hi, Luc here from Convertable. I appreciate your interest, …
Webroot DNS Protection
DNS filtering is like having a digital bouncer for your internet connection. It helps keep you safe by blocking access to harmful or inappropriate websites before they can even reach your device. It’s like having a security guard that checks the ID of every website you want to visit and only allows the ones that are trustworthy and safe. So, …
Unlocking Peace of Mind: The Crucial Role of Backup and Disaster Recovery
Regarding computer catastrophes, individuals often rely on backups as their go-to solution for restoring their data. However, for larger organisations, the effectiveness of backups in post-disaster scenarios is limited. On the other hand, organisations that have a well-structured and comprehensive disaster recovery process in place are able to swiftly restore operations. Both detailed backup and disaster recovery processes are crucial …
Windows 11 shortcuts
Windows key + A — Open the Quick Settings panel. This lets you turn Wi-Fi, Bluetooth, airplane mode, and more features on or off. You can also adjust the brightness of your screen and computer volume in this panel. Windows key + C — Open Chat with Microsoft Teams. This new feature in Windows 11 gives you a quick panel …
Navigating the Digital Landscape: Discovering the Top Four Trends in Transformation
As the business world continues to embrace the digital future, digital transformation is gaining popularity among companies worldwide, including in the United Kingdom. After all, in a world that is increasingly digital, companies must evolve to keep up with the modern era. Multiple ways to initiate your organization’s transformation have emerged, and several key digital transformation trends have gained prominence …
AI and Cybersecurity: The Threats and Opportunities
In the past few months and years, one thing has become certain in the technological world — artificial intelligence (AI) is here to stay. As new AI-based technologies are developed and explored both by individuals and businesses around the world, the onslaught of AI has meant that there are a number of cybersecurity risks to now consider in the modern …
Roadmap to Cloud Migration: A Comprehensive Guide to Planning Your IT Infrastructure Move
In today’s fast-paced, digital world, businesses are increasingly recognizing the necessity to migrate their IT infrastructure to the cloud. Cloud migration offers various benefits, including scalability, cost savings, and increased security. However, the process of transferring your business’s IT infrastructure to the cloud can be difficult and scary. That’s where our detailed guide comes in. We’ll bring you through the …
Achieve Cyber Immunity
The world of digital technology is evolving at lightning speed, and so are the risks! It’s time to gear up and protect your business from the relentless surge of cyber threats. Embrace the thrill of a high-performance, impenetrable computer network with our Managed Service Provider (MSP) by your side. The Importance of a Cyber Secure Network In the digital battleground, …
The Future is Now: Benefits of Moving Your IT Infrastructure to the Cloud
In today’s competitive environment, businesses must keep ahead of technology. Cloud computing is one of the most recent advances. A recent study found that 60% of small and medium-sized businesses (SMBs) had moved their IT infrastructure to the cloud, with many more exploring it. In this post, we’ll explain the many benefits of moving your IT infrastructure to the cloud …
The Ultimate Guide to Protecting Your Small Business from Cyber Threats
Table of Contents An Introduction to Penetration Testing for Cybersecurity Why It’s Important for Small Businesses to Do Cyber Security Penetration Testing Different Kinds of Penetration Tests Getting Ready for the Penetration Test Putting the Cybersecurity Penetration Test into Action Analyzing the Results of the Penetration Test for Cybersecurity Fixing the Problems That Have Been Found Follow-Up After the Test …
3 Ways OpenAI’s GPT Can Transform Your Small Business in 2023
Software like OpenAI’s GPT that can process natural language has been called a game-changer for small and medium-sized businesses. Businesses could improve and grow in almost every way possible with OpenAI’s GPT. This essay will talk about the details of OpenAI’s GPT, a cutting-edge technology, and how small and medium-sized businesses can use it to their advantage. Let’s start …
Unlock the Untold Power of the Latest Windows for Your Local Business – What You’ve Been Missing
If you’re a local business owner, you know how crucial it is to have solid technology. To keep up with the most recent software upgrades and versions, however, can be challenging given the rapid growth of technology. The confusion surrounding which Windows version their company is now running and if it is still maintained by Microsoft is one particular issue …
Unlocking Your Company’s Full Potential with Managed IT Services
In the modern business landscape, organisations face numerous challenges such as increasing costs, skill shortages, complex security requirements, and the need for effective digital transformation. However, managed IT services can help businesses overcome these obstacles and thrive in today’s competitive environment. In this article, we’ll explore how partnering with a managed IT service provider can address common business challenges and …
Cyber Insurance Got You Stressed? Uncover 5 Game- Changing Strategies to Keep Costs Low and Your Business Safe
Cyber threats have become a real worry for businesses all over the world in this digital age that is always changing. As a result, cyber insurance is not only a necessary part of any organizations plan for managing risks, but it also costs a lot of money. But don’t worry, dear reader! Here are five clever ways to cut the …
The Ultimate Guide to Reducing Human Cyber Risk
Learn how to boost your organisation’s employee security posture against human error and evolving cyber threats.
The Impact of Throttling and the Consequences of “Big Switchoff”
OpenReach, the UK’s largest phone and broadband network provider, is preparing for the transition from the old copper phone network (PSTN) to a new ‘Digital Voice’ alternative by 2025. However, some customers are yet to upgrade, prompting OpenReach to introduce measures to encourage action. To prompt customers to upgrade, OpenReach plans to “throttle” broadband speeds and limit phone calls. The …
3 Ways you can use ChatGPT in your business today
Small business owners are the backbone of our communities, working tirelessly to provide services and products that drive local economies. But with the challenges of managing finances, operations, and customer satisfaction, it can be overwhelming to keep up with the demands of running a small business. That’s where ChatGPT comes in, offering a powerful solution to help small business owners …
Onboarding New Staff: IT and Cyber Security Considerations
Onboarding new staff is an exciting time for any business. It represents growth, expansion, and new opportunities for your company. However, it’s important to take the necessary steps to ensure that the onboarding process is done smoothly and securely. With so much sensitive information being stored on computers and in the cloud, it’s crucial to take an IT and cyber …
How to Use ChatGPT Securely in Your Business
ChatGPT is a cutting-edge tool that can bring a lot of value to small and medium businesses. With its advanced language processing abilities, it can automate a range of tasks, freeing up time and resources for other important work. However, when it comes to confidential information, it’s essential to make sure that you are using ChatGPT securely. This blog post …
ABCOM Achieves Acronis Gold Partner Accreditation
ABCOM Achieves Acronis Gold Partner Accreditation ABCOM, a leading provider of technology solutions based in Burgess Hill, is proud to announce it has achieved the Acronis Gold Partner Accreditation. This recognition underscores ABCOM’s commitment to delivering the highest level of cybersecurity and data protection solutions to its customers. Acronis Backup and Cybersecurity Software for Businesses is a comprehensive solution that …
The technology knowledge gap in your business.
In business, as in life, there’s the saying you don’t know what you don’t know. Regarding technology in your business, I’m sure you’ve already covered things like IT support. Most businesses now adopt an outsourced “managed service” for all things to do with IT & Technology. Depending on the size of your business, there may even be an internal team …
Effective Budgeting for Software Licenses: Tips and Tricks for Businesses and Charities
Software licenses can be a major expense for businesses, particularly for those that rely on multiple software programs to run their operations. While these licenses are often necessary for productivity and efficiency, they can also take up a significant portion of a company’s budget. Efficient use of software in business can provide a competitive advantage. This is especially true today, …
The State of Cybersecurity in 2023
How to protect your business in the face of an ever-evolving threat landscape When looking back at 2022, it was a turbulent year, full of macroeconomic and geopolitical risk. From the war in Ukraine to rapid inflation and supply chain failures, it has been the perfect storm of interlocked risks. This has had a profound effect on cybersecurity for businesses …
Top cyber security breaches of 2022
Number 1 TwitterTwitter is facing accusations of a cover-up in regards to a massive data breach that has affected millions of users in the US and EU. Cybersecurity expert Chad Loder alerted the public to the breach on November 23, 2022, stating that it occurred no earlier than 2021 and had not been previously reported. This comes after Twitter admitted …
What’s your power down sequence?
As we’ve already highlighted, many businesses are now planning for possible power outages and blackouts. The one question we’ve been hearing from many of our clients is what needs to be turned off and when? From an IT and facilities perspective, it’s worth writing up a checklist for your office on what exactly needs to be turned off manually and …
THE TIMELINE OF COMPUTING
Once upon a time, in a world far away, Computing was a chore, slow and gray. But then came the days of ENIAC and UNIVAC, Machines that could compute, they didn’t lack. As time went on, computers got smaller and faster, From mainframes to desktops, they became a master. People used them for work, for play, and for fun, But …
What is FTTP Broadband?
FTTP stands for Fibre To The Premises,and it is interchangeably referred to as ‘Ultrafast’ or ‘Full Fibre’ broadband delivering speeds up to 1Gbps. It is a pure fibre connection from the exchange into your business so, unlike FTTC where broadband is delivered via fibre optic cables only as far as the cabinet, FTTP uses cable across the entire distance to …
Learn to spot a phishing message
Phishing is a popular form of cybercrime because of how effective it is. Cybercriminals have been successful using emails, text messages, direct messages on social media or in video games, to get people to respond with their personal information. The best defense is awareness and knowing what to look for. Here are some ways to recognize a phishing email: Urgent …
What is Microsoft Teams Voice with Direct Routing?
Many businesses utilising Microsoft Teams for internal collaboration can now benefit from the ability to make and receive calls by enabling Microsoft Teams as a complete cloud-based UC solution with Enterprise-grade telephony. Give your Microsoft Teams a voice with confidence -benefit from a highly reliable, resilient architecture with Direct Routing from the UK’s No.1 SIP Trunking provider with simple provisioning, …
Do You Want to Work Smarter in Microsoft Teams?
The number of daily active users of Microsoft Teams have almost doubled the past year, increasing from 145 million users in 2021 to 270 million in 2022. Companies are rapidly implementing Microsoft Teams to be able to enrich their businesses’ communications structures, and it’s proving successful. Teams is by far the most rapidly growing unified communications solution, and is not …
BT Openreach has announced it intends to switch off traditional landlines in 2025.
BT Openreach has announced it intends to switch off traditional landlines in 2025. This is commonly called the Public Switch Telephone Network(PSTN) and Integrated Services Digital Network (ISDN) switch-off. Now is the time to look at an alternative system that is future-proof and resilient, that would be Voice over the Internet (VoIP) By the end of 2025, everyone in the …
Protect your business from the evolving threat of phishing attacks
According to recent research by Tessian, 26% of employees have clicked on a phishing email at work in the past year. For this reason, and many others, there is no surprise that most CISOs are concerned about how phishing attacks are evolving. Thankfully, email security solutions are always becoming more advanced and stopping more potentially malicious emails and attachments. However, …
How to share calendar in Outlook
Share your calendar with others so they can view details about your schedule. Share your calendar Select Calendar > Share Calendar. Choose a calendar to share. Select Add, decide who to share your calendar with, and select Add. Select OK and you’ll see the added people with a default permission level. Choose a name, select the access level to give, …
The benefits of Cloud Communications
Compared to traditional, capex-intensive, on-site systems, the financial advantages of Cloud Communications are clear and compelling. But the economics are just the beginning of the real business value. Expand your opportunities Free from the constraints of a physical location and a fixed workforce, you can expand your opportunities and grow your business. Ensure seamless experiences By integrating multiple communications and …
How to make the most of your Microsoft 365 investment
The way that businesses use technology has changed drastically over the past 5 years. Many of these changes are due to the move from office-based work to remote or hybrid work. As organisations made this move, it was essential to implement new technology solutions to enable productivity, communication and collaboration. Working with a trusted IT provider can help your business …
Make the most of Microsoft Teams with Direct Routing
Direct Routing allows you to connect Teams to preimum voice service providers. This allows you to take advantage of cheaper call rates, more flexibility, and better support. It’s also helpful for users locked into existing contracts with other PSTN providers. They can use Teams without any contract violations. Put simply, Direct Routing enables users to make and receive external calls …
Enable secure remote work with Microsoft 365
So how can Office 365 make the essential difference to your business? In this downloadble presentation we show you how Small Medium Businesses can benefit with productivity, communication and security. If you already have M365 we can help you truly unpack the suite so you can achieve so much more. For more information call us or email action@abcom.co.uk More information
Suspect Malware and How to Protect your Business
In 1971, the first worm proof of concept was created, called ‘The Creeper’. This worm was able to spread via network protocol, infecting remote computers to display the message “I’m the creeper, catch me if you can”. However, ‘The Creeper’ was not technically malware as it was not created with malicious intent. Fast forward 51 years and there are over …
Are your Microsoft 365 mailboxes backed up?
In today’s business world, email is the backbone of communication. Complete365 reports that Microsoft Office 365 Email is the most popular 365 product among medium-sized companies, and Ontech claims emails contain 60% of business-critical data. No doubt, emails are incredibly important, so having a robust system for storing your email data in case of catastrophe is a good idea. In …
PhoneLine + Simple phone line replacement service
PhoneLine+ has been specifically designed to replace your traditional landline service using VoIP technology to deliver voice calls over the broadband network, all at a highly competitive price. PhoneLine+ can be accessed on a choice of devices including computers, tablets, mobile phones and IP handsets, or we can providean adaptor for your current phone, so there is no need to …
What does the future of business telephony look like?
Ever since the invention of the telephone by Alexander Graham Bell in 1876, the humble telephone has been a mainstay in business life. For the majority of us in the business world, telephony is the default way to engage with clients, reach colleagues and network with other professionals in the industry. For years, our desks were kitted out with work …
Why does it makes good business sense to outsource your IT?
Outsourcing your IT operations can help your business unlock new levels of efficiency whilst also cutting costs. Indeed, 24% of small businesses that outsource their IT cite increased efficiency as their main driver of adoption – according to Capital Counsellor. Why are so many businesses turning to IT outsourcing? What are the main benefits of letting an IT support company …
5 Common Cybersecurity Myths Your Business Should Be Aware Of
Thankfully, businesses are now more aware than ever of cyber threats and are starting to take cybersecurity very seriously. PwC found that nearly 64% of UK CEOs are concerned about how cyber threats could harm their ability to sell products and services. Indeed, taking into proper account your organisation’s cybersecurity is a vital part of running a modern business. This …
What is Data Loss Prevention? Why is it essential for your business?
Whilst data threats and leakages can occur in any organisation, it is small-to-medium businesses (SMBs) that are most susceptible to data loss incidents. Indeed, cybercriminals often target smaller businesses as ‘low-hanging fruit’ as a mixture of inadequate security infrastructure and insufficient staff training leads them to be particularly vulnerable to data incidents. Data leaks are costly. According to IBM, the …
The worst cyberattacks of 2022 (so far)
As expected, in the first 7 months of 2022, there have been multiple major cyberattacks that have resulted in a loss of productivity, revenue or large-scale data leaks. Whilst some of the largest attacks have been in countries such as America and Ukraine, there have also been some major cyberattacks within the UK. Although these cyberattacks are the ones that …
Our Guide to Email Security for SMBs
Please find Our Guide to Email Security for SMBs Emails are the lifeblood of any business, and with that, here are some little statistics: https://abcom.co.uk/our-guide-to-email-security-for-smbs/ In 2021 1) there were 3.9 billion active email users. 2) In the US, workers receive an average of 126 emails daily. 3) Nearly 60 billion junk emails will be sent each day in the …
What is the New Commerce Experience (NCE)?
So, what is the New Commerce Experience (NCE)? Microsoft has recently announced a change in how customers purchase and manage their licences through their Cloud Solution Provider (CSP) Program. Microsoft is launching the New Commerce Experience (NCE). This change will impact the way you purchase Microsoft 365 licenses. But fear not. Microsoft has launched the NCE to reduce complexity and …
Make your business’s technology more accessible with these tools
Every employee has their own set of needs and requirements, and it is the employer’s responsibility to accommodate them. This is especially true for employees with disabilities. Although businesses need to make accessibility accommodations for their building and internal processes, it is also important that technology is accessible too. Thankfully, the most widely used technology solutions have built-in tools to …
What are insider threats and how can you defend against them?
Typically, most businesses are concerned about external adversaries maliciously accessing confidential data and systems. However, businesses often neglect to safeguard against their own employees who are threats to the business. This concept is known as insider threats. An insider threat is any employee, vendor, contractor or person within a business that has authorised access to sensitive data or IT systems, …
Six common IT challenges for fast-growing businesses
Extended periods of rapid growth are positive for most businesses, as it means that the business is acquiring new customers, which is driving increased revenue and better business outcomes. Whilst these periods are exciting and necessary for the longevity of a business, it also creates a host of new challenges, especially regarding IT and technology. In this article we will …
The 2022 guide to migrating SQL Server to Microsoft Azure
As Microsoft SQL Server 2012 is reaching its end of life on July 12, 2022, businesses still using the service will have to upgrade their SQL server to a more recent instance or migrate to Microsoft Azure. If businesses do not upgrade or migrate, they will no longer receive essential security updates, leaving them vulnerable to cyberattacks. Whilst any server …
ABCOM offer Microsoft 365 Expert Setup
The Microsoft 365 Expert Setup is our extra set of configuration settings that are applied to Microsoft 365 tenants. This is a Value Add offering to help improve the overall security of your 365 tenancy. These settings enable and then enhance the solutions made possible by the Microsoft 365 offering. This configuration includes various security and device management policies, as …
The importance of hardware warranty
Warranties are often an overlooked item when making a technology purchase, perhaps because they can be somewhat confusing. Usually machines are sold with a basic one-year warranty, but sometimes an extended warranty is an optional extra. More comprehensive cover may be available, for example weekend support or even extending the warranty period to 3 or more years. Reliability It’s been …
Choosing the right technology partner is essential for better business
Choosing the right technology partner is essential for better business. We offer a no obligation review of your current setup.
Tips To Stay Safe While Using Hotel & public Wi-Fi
Public Wi-Fi has come a long way over the last few years in terms of improved security as many have realized that by offering this amenity, they are somewhat liable if their occupants get hacked while using it. Wireless access is now everywhere, on trains, in shopping centre and just about anywhere we meet other people. Nevertheless, it is still very …
What you need to know about 5G
While a rapid 5G rollout continues across the UK, there are still doubts around the service, its costs and its availability. Let’s debunk the myths and take a closer look at the data…
Microsoft Price Increase and Change in License Terms: What you need to know
Microsoft has recently announced their first price rise in over a decade. This increase in price is to reflect the value that Microsoft has added to the product ecosystem in the past 10 years. Some of the ways that Microsoft has improved the Microsoft 365 suite includes the introduction of Enterprise Mobility and Security (EMS), which keeps your business safe …
Time to upgrade your business phone system
The PSTN switch off is happening soon. Its best to prepare now and adjust for the technological changes. Benefit from the best suited technology for your business.
Business broadband – A quick overview on the new broadband technologies
What is the difference between FTTP and SOGEA? We can help demystify what broadband service you need for your business. We match your business technological requirments with the most suitable broadband package. Our broadband solutions make us the perfect end-to-end supplier for your connectivity and communication requirements. Includiing IP telephony, video and conferencing services as well as instant messaging,
How to make the most of the modern workplace
Throughout history, the concept of an ideal workplace has constantly evolved, from the Action Offices of the ‘60s to the rise of office cubicles and the introduction of computers in the ‘90s, and the recent adoption of remote and hybrid working. Novel technologies underpinned many of these changes, and that is no different today with new technologies enabling businesses to …
Why Cyber Essentials certification is important for SMBs
In recent years, it has become increasingly important for businesses to secure their IT systems to reduce the chance of falling victim to a cyberattack. In the UK alone, 39% of businesses were targeted by a cyberattack in the last 12 months. Whilst most newsworthy cyberattacks target large businesses and enterprises, it is just as common for small businesses to …
The role passwords play in a world of cybercrime
In previous articles we have described that there is a multi tiered approach to adopting cybersecurity. This is an ongoing process and needs to be constantly reviewed and improved upon. One very important aspect and should take priority, is safeguarding the use of passwords. For businesses, one weak password can be the cause of a major cybersecurity incident. For this …
Connectivity – Every successful business has a trusted Internet Partner
Today, businesses are expected to respond quickly to customer requests and want reliable, high performance connectivity solutions that can help them enhance their customer service. They also need to be ‘agile’ and see using cloud applications as a way to increase flexibility. Choose a trusted partner with a data network you can rely on to deliver great customer service and …
The business case for SIP
Cloud-based call control allows you to automatically direct calls to a destination you define such as a colleague, mobile, hunt group or call queue. Combined with all the features and benefits of SIP Trunks, including call bundles and the only fraud management tool that protects you and your customers by enabling them to set spend limits, SIP Trunk Call Manager …
What is Shadow IT and how can businesses combat it?
Shadow IT refers to information technology (IT) projects that are managed outside of, and without the knowledge of, the IT department. As companies reach to the “cloud” their enthusiasm for hasty adoption can suddenly be tempered by security, compliance, and governance concerns. Once this is reviewed and a plan of action made then adoption makes perfect sense. However it’s the shadow/ …
How to make better use of Microsoft Teams
Microsoft Teams has taken the productivity world by storm. That’s because it’s so much more than just a chat app. The true power of Teams lies in its integration with the rest of Microsoft 365, and its emergence as a one-stop-shop collaboration hub. As businesses across the country have made the move to hybrid work, technology should empower employees to …
The Move to Hybrid Work
The Future is Hybrid After months of working from home, restrictions have now eased, and many businesses have implemented a hybrid work model whereby employees work both in the office and remotely. This comes as no surprise as a recent survey found that 47% of employees would be likely to look for another job if their employer failed to offer …
10 Technology Trends That Will Reshape Businesses In 2022
The past two years have been a period of immense change for all businesses, regardless of size or industry. Businesses and employees alike have adapted to these changes by harnessing technology to enable productivity, collaboration, and communication. For some businesses, this was the first time they truly embraced the cloud with Microsoft Teams, cloud storage and IT systems to enable …
How can your business stay vigilant in periods of “heightened” global cyber risk?
Following Russia’s attack on Ukraine, the National Cyber Security Centre has placed the cyber threat in the UK as “heightened”. The cyber challenge becomes increasingly complex as the hacktivists group Anonymous have become involved. Anonymous has apparently hacked into Russia’s media censorship agency and released 340,000 files in the latest undermining of Putin’s war media campaign. The reality is that …
VR charity donation
This local charity called Extra Time is expanding across Sussex and we are proud to be their IT partner of choice. We’ve donated recently, an Oculus VR bundle and the main idea is to promote the use of educational apps in Virtual Reality. No games have been installed (lets see how long that lasts!) About The Extra Time Project The …
What Azure Active Directory can do for your business
During the 2020 pandemic, there was a shift from office-based authentication to home working. Fortunately, most of our clients had already migrated to the cloud and their phones were cloud-based. If the business was not cloud-centric, they would need access to data and if the physical server was in the office, then this posed a few problems. Data needs to …
5 common Types of Phishing Attacks
We are forty years into the advent of phishing attacks! It began in the 1980s’ when a phising technique was described in detail to a HP users Group, Interex. Since then campaigns have become more and more devious. In the era of the Covid Pandemic, whilst many people were already dazed and confused by the onslaught of day to day …
15 ways to protect your business from a cyberattack
Please find our new crib sheet. 15 Ways to Protect your business from a Cyberattack. If you need help with your strategy for cyber security please contact us.
How does Cloud Technology Benefit Not For Profits
Charities and voluntary sector businesses must operate at optimum and ensure they get the best value for money. Technology has become increasingly important, and if the systems don’t operate properly, this can affect time-critical service delivery and projects. If your charity or organisation has not moved across yet, there are some key considerations to make. What is the business case …
Ukrainian Malware Attacks: Fake Ransomware Explained and why your business must be cyber-aware
Ukraine finds itself the centre of attention once more as troops from all sides gather at its borders. The Mainstream media sets about its rhetoric of subtle and persistent biases and succeeds in stoking fear and paranoia among their audiences. Western media is now focused on reporting that Russia is supposedly threatening an invasion, and that this strife between the …
- Page 1 of 2
- 1
- 2