Q&A session addressing SMB cybersecurity concerns.

Cybersecurity for Small and Medium Businesses – Q & A time

It is no surprise that the past 2 years of remote and hybrid working has significantly accelerated digital transformation for most small and medium businesses. Although the implementation of new technologies has changed the way that these businesses function, it may have also created many potential security risks. As businesses move into 2022, it is important that all small and …

Endpoint protection - what is it and how does it work.

Key challenges of endpoint security

  The rise of hybrid working has forever changed how businesses must view their security posture. As employees are now working between multiple locations, the risk of data breaches, cyberattacks and network intrusion has grown exponentially. With employees working from home, it is more difficult for IT teams to ensure employees are following best practices to avoid an attack, and …

Why should businesses migrate to sharepoint online?.

Why should businesses migrate to SharePoint Online?

Why businesses should migrate to SharePoint Online Microsoft SharePoint was launched 2001 and over the past   20 years has massively grown in popularity with over 200 million users relying on the product in 2020. SharePoint Online is a cloud-based content management tool that enables users to store files online for sharing and collaboration. A well-designed SharePoint site also reduces the …

2021: the year of cyber attacks.

2021.. the blockbuster year for Cyberattacks

2021 has been a year of digital transformation for all businesses. The widespread adoption of remote and hybrid work has resulted in employees being more reliant than ever on technology. A consequence of this reliance on technology has been a massive rise in the frequency and severity of cyberattacks, across all industries and business sizes. Many of these attacks were …

A group of soldiers forming a human firewall around an email symbol.

The Human Firewall: 6 steps to design effective cybersecurity training using your staff

The cybersecurity threat landscape is constantly evolving, and cyberattacks becoming more common with 4 in 10 businesses reporting having cybersecurity breaches or attacks in the past 12 months. There are many cybersecurity solutions available to strengthen a business’s security posture, including firewalls, endpoint protection and email security. However, for a business to safeguard themselves from a potential attack they must …

Benefits of implementing single sign on for businesses.

Why businesses should implement Single Sign-On (SSO)

Businesses typically have subscriptions to many different cloud services, everything from Microsoft 365 to Client Relationship Management software. With so many services requiring unique login credentials, employees often reuse passwords between multiple applications. This poses a significant security risk – if one cloud service suffers a data breach, cybercriminals may be able to access all other accounts with the same …

What do you do if you experience a cyber attack?

What do you do if you fall victim to a cyberattack?

Between 2020 and 2021, 4 in 10 businesses and a quarter of charities reported some form of cybersecurity breach or attack. These figures are increasing year-on-year as cybercriminals innovate with new attack vectors to infiltrate businesses for profit or to steal valuable data. For a business owner, if you have not already, now is the time to invest in a …

Thinking of implementing BYOD? Some key tips on getting it right.

8 steps to successfully implement a BYOD programme

As employees return to the office, many businesses will be implementing a Bring-Your-Own-Device (BYOD) programme. There are many potential benefits of introducing a BYOD programme, including substantial cost savings, convenience for employees, and flexibility in work location. However, if your programme is not well planned, it carries a significant security risk. Employees may be using an unsecured device on a …

2021 guide to hybrid working: keep your business safe from anywhere.

The 2021 Guide to How to keep your business safe from anywhere, on any device – Hybrid Working – Cyber Security

After months of working from home, restrictions have now eased, and many businesses have implemented a hybrid work model whereby employees work both in the office and remotely. This comes as no surprise as a recent survey found that 47% of employees would be likely to look for another job if their employer failed to offer flexible working arrangements. Hybrid …

Work smarter in excel with these 13 tips.

Work smarter in Excel with these 13 tips

Microsoft Excel has been a mainstay in the Microsoft Office suite of products for over 30 years.  It’s a powerful program that can be used for everything from simple graphs and charts to fully-fledged traffic and leads calculators. The primary limit to what can be done within Excel is the users’ knowledge of the product and its features. In this …

Our top 10 nuggets microsoft ignite.

Top 10 Golden nuggets from Microsoft Ignite November 2021

Microsoft Ignite is Microsoft’s biggest conference where the tech-giant announces new features, capabilities and innovations across their ever-expanding product portfolio. This November’s event did not disappoint with exciting announcements across AI, security, the Metaverse and more. At the virtual Ignite conference 2021, Microsoft chief Satya Nadella made exciting new announcements and innovations across artificial intelligence (AI), security, enterprise collaboration, Metaverse …

Tips

10 tips to get the most out of Microsoft OneNote

Microsoft 365 is the gift that just keeps giving. There is a smorgasbord of cool apps. Notably this feature is about OneNote. This great app is a digital notebook that’s  great for legal eagles, students and basically everyone else. Microsoft OneNote is a digital note-taking app that is packed full of features. It is easy to use and can be …

Two individuals using Facebook's Wi-Fi while seated at a table.

Facebook WI-FI for your clients and customers.

ABCOM are now rolling out Facebook Wi-Fi to help businesses attract and retain customers by providing guest Wi-Fi. Facebook Wi-Fi helps small and medium-sized businesses attract and retain customers by providing a seamless guest Wi-Fi experience. From coffee shops to event venues, customers can easily connect to the internet using their Facebook or Instagram accounts and engage with the business’ …

Guard, organization, cyber attacks

What is Cyber Essentials and why does my business need it?

Cyber attacks come in many shapes and sizes, but the vast majority are very basic in nature, carried out by relatively unskilled individuals. They’re the digital equivalent of a thief trying your front door to see if it’s unlocked. Our advice is designed to prevent these attacks. All businesses will hold and access some form of data. These can include …

Using the charity cloud to enable resident services for charitable organizations.

Cloud computing for charities

The role that not-for-profit businesses play in society has evolved significantly over the years. In the past decade, the number of charities in the UK & Ireland has grown by 10,000, with many of the newer ones looking to fill gaps in the countries’ mental health and social support systems. Unfortunately, the level of public trust in charities has not …

6 ways to improve your it security now.

 6 ways to improve your IT security and avoid a ransomware attack NOW

The recent ransomware attacks on the Irish Health Service show that, regardless of size or industry, any business can be targeted by cybercriminals. It can be difficult to stay up to date with all the new attack vectors and methods that hackers are using to gain access to sensitive data or lock businesses’ IT networks. However, there are policies and …

Work smarter with Microsoft Outlook tips.

Work smarter in Outlook with these tips

The amount of emails sent and recieved around the world are growing day by day. There in 2021 are approximately 4.147 billion email users in 2021 Microsoft first released their email client known as Microsoft Internet Mail and News in 1996. Since then, Outlook has gone through many changes and is now one of the Microsoft applications that most people use …

A hoodie-wearing man displaying expertise in social engineering techniques.

Hacking the Humans: close protection tips against social engineering attacks

Most of us are familiar with the traditional way of hacking such as cracking passwords, hacking computers or exploiting software vulnerabilities. However, when businesses are trying to increase their security, one of the most dangerous methods is often not given enough attention, these are social engineering attacks. What is social engineering? Social engineering attacks rely on human interaction to manipulate …

Virtual desktop

Is the future of the computer experience virtual?

As the UK stutters and stumbles towards a post-freedom day “full reopening”, companies across the land are still struggling with changing regulations. Peoples’ expectations also change in regards to remote work, safe workplaces as COVID continues to spread, and productivity in this new hybrid model of employment. Another significant factor many companies will have to contend with is the question …

Whatsapp scam - how to get rid of whatsapp scam.

Whatsup with WhatsApp

WhatsApp Messenger, or simply WhatsApp, is an American freeware program owned by Facebook, Inc. It’s a cross-platform centralised messaging and voice-over-IP service package. It allows users to send text and voice messages, make voice and video calls, share images, documents, user locations, and other content. In recent years it has become very popular and is increasingly used for business communication. …

Six interesting new features of windows 11.

Get The Most Out of Windows 11

6 years ago, Microsoft released Windows 10, the successor to relatively short-lived Windows 8. Microsoft has just announced the next major release of the Windows operating system, Windows 11. This release has a new user interface and aims to increase productivity and provide a seamless experience for those working both in the office and at home. We’ve compiled a list …

Time to update security updates for adobe acrobat and reader.

Adobe Acrobat and Reader threat advisory

Cybersecurity Threat Advisory: Recent Security Updates for Adobe Acrobat and Reader THREAT UPDATE Critical security updates for many Adobe products have recently been released for both Mac OS and Windows. These updates are extremely important as they could lead to potential machine and network compromise. The most popular Adobe products, Acrobat and Reader, have particularly critical vulnerabilities. We recommend applying …

How to make the new hybrid workplace work more effectively..

How to make the new hybrid workplace work  moreeffectively Introduction A recent study has shown that 70% of employees are wanting flexible work options to continue once restrictions ease, and 65% are craving more in-person time with their teams. This combination of statistics show that business leaders would be wise to listen to employees and start planning for a hybrid …

Azure Active Directory powered by Acomm IT Solutions.

10 reasons why you should be using Azure Active Directory

What’s all the fuss? Microsoft’s Azure Active Directory (Azure AD) is a cloud-based directory and identity management service. Its anb impiortant platform when a company whants to engage Cloud services and offers many security benefits. Azure AD includes:  multi-factor authentication, device registration, self-service password management, auditing, security monitoring and alerting. This product is cost-effective and easy to use. Azure AD …

A man wearing a vr headset is writing in front of a window.

Introducing Microsoft Mesh

At the recent Microsoft Ignite conference, the company’s Alex Kipman unveiled a new hologram-based mixed-reality communication platform called Microsoft Mesh. This new blend of technology is potentially game changing.  It  will allow people in different physical locations to join a shared virtual environment. Using 3D capture technology a process Microsoft call “holoportation” . This will create a live hologram of …