Why Using Gmail’s Confidential Mode Is Not a Good Idea for Businesses

Posted by Ben Spector on 06-Sep-2018 20:21:39

Gmail_Free_Email_Service_logo-56a2899d5f9b58b7d0cbe675

 

As part of Gmail’s redesign in 2018, Google introduced the Confidential Mode to protect sensitive information sent by email. Learn how it works and why you should avoid using it in your business.

Read More

Topics: email, google, gmail, google mail

Business Email Scammers Put Behind Bars

Posted by Ben Spector on 09-Jul-2018 12:21:36

shutterstock_583338262

Read More

Topics: cybersecurity, Disaster Recovery, Business operations, cyber crime, IT Support, phishing, ransomware, anti virus, business, computers, cyber, cyber attacks, cyberattack, cybercrime, email, fraud, london, office 365, security, small business

Windows 10 - Focus Assist

Posted by Ben Spector on 09-Jul-2018 10:51:21

4 Ways to Improve Productivity in Your Business

Read More

Topics: windows 10, Email Solutions, email, office 365, productivity

GSuite for Business - 4 Gmail Enhancements That Can Help Your Business

Posted by Ben Spector on 28-Jun-2018 01:38:26

shutterstock_695926525

4 Gmail Enhancements That Can Help Your Business

Google is totally revamping Gmail. Here are four enhancements that can help you and your employees be more secure and work more productively when using Gmail.

Read More

Topics: cloud computing, Business operations, business, cloud, email, small business, gsuite, gmail

What is Phishing?

Posted by Ben Spector on 20-Jun-2018 15:22:48

3 Ways Small Businesses Can Take Advantage of Artificial Intelligence

What is Phishing and How to Keep Your Company Safe From Phishing Attacks

Phishing is a type of cyberattack in which criminals essentially trick users into disclosing their personal information such as passwords, credit card numbers and so on. This is becoming an increasingly popular attack vector, with more than 3 in 4 (76 percent) organizations in the UK saying they experienced a phishing attack in 2017, according to figures collated by Wombat Security.

Read More

Topics: cybersecurity, phishing, cyber attacks, cybercrime, email, security, computer security

How do i use One Drive?

Posted by Ben Spector on 02-May-2018 13:45:12

How do i use One Drive? How to Share Files and Folders in OneDrive

Many businesses use Microsoft’s free OneDrive accounts to store their data, but businesses can also use those accounts for file sharing. Learn about the two ways to share files and folders, including when to use each method.

Read More

Topics: cloud computing, Collaboration, Data, business, cloud, email, microsoft, onedrive, data storage, files, file sharing

Should I put files in the Cloud?

Posted by Ben Spector on 02-May-2018 12:20:24

Should I put files in the Cloud?

Get Your Documents out of the File Cabinet and into the Cloud!

With cloud storage, your business’s files will always be backed up and easily accessible regardless of where you are. Find out what you should consider when making the transition to storing documents in the cloud.

Read More

Topics: wi-fi, cloud computing, virtual desktops, Data, cloud, email, G Suite, software, folders, file share, files, filing system

Business Email Scams Are on the Rise

Posted by Ben Spector on 19-Apr-2018 14:37:09

Sophisticated email scams designed to con companies out of money and sensitive data are on the rise. Learn how to avoid falling victim to these scams.

Read More

Topics: cybersecurity, data breach, Email Solutions, servers, solutions, Data, phishing, ransomware, service, theft, anti virus, email, protection, security, small business, websites, scams

8 Policies to Protect Your Business’s IT Assets

Posted by Ben Spector on 05-Apr-2018 12:38:19

IT policies are important to have because they can help ensure that your company’s IT resources are being used appropriately and productively. Here are eight IT policies often found in companies.

Read More

Topics: data breach, Disaster Recovery, firewall, Business operations, IT, IT Support, support, anti virus, Backup, business, Communications, email, google, IT Services, london, managed, office 365, passwords, security, small business, technology

What You Need to Know about Fileless Attacks

Posted by Ben Spector on 23-Feb-2018 14:04:26

Fileless attacks are on the rise. However, many people are unfamiliar with them. Learn what they are and how to protect your business from them.

Read More

Topics: windows 10, cloud computing, cybersecurity, fileless attacks, firewall, network, solutions, Business operations, cyber crime, Data, helpdesk, IT, News, phishing, ransomware, support, theft, anti virus, business, cloud, computers, cyber threat, cyberattack, email, office 365, passwords, protection, security, small business, websites, windows

Welcome to our Blog

We post new content every week!

Hopefully you will find it interesting and useful. We post on a variety of IT related topics including Best Practise advice, Top Tips and How To's.

At SpecTronics we've helped lots of small and medium sized businesses with their IT & Telecoms. Here's just some of the ways we could help you!

  • IT Support including Helpdesk and Onsite engineers
  • Cloud Telecoms/VoIP & Unified Comms solutions
  • A good cuppa and a chat if you just want some impartial IT advice!

So, if IT and all things tech leave you scratching your head, or you simply just don't have the time to manage it yourself Contact us and we can schedule in some time to plan a solution.

Subscribe Here!

Recent Posts

Posts by Tag

See all