Showing articles in 'Guides'...(« back to knowledgebase)
Showing 33 articles.
With the end of support for Windows 10 just over a year away, many business owners are starting to wonder why they haven’t upgraded to Windows 11 yet. Are you one of them? Research shows that most businesses could make the switch, but a surprising number are still holding back. This is despite the upgrade ... (Read More)
Microsoft recently announced that all Azure sign-ins will soon require multi-factor authentication (MFA) to boost security. Even if you don’t use Azure (a cloud computing platform), you should pay attention to this because MFA is one of the simplest and most effective ways to protect your digital assets. What is multi-factor authentication? Think of it ... (Read More)
Many more businesses are now making the smart decision to be proactive and invest in their cyber security defences. This is fantastic news. However, statistics show that about half of small and medium-sized businesses still lack cyber security measures. If your business falls into that category, it’s time to change. Cyber security might sound complex, ... (Read More)
A recent security report has revealed that cybercriminals are becoming more intelligent and sophisticated … leading to some concerning trends. Firstly, cyber attacks are becoming faster than ever. The breakout times (the time it takes for a criminal to move within your network after initially gaining access) have significantly decreased (from an average of just ... (Read More)
No one wants to be caught in the dreaded low-battery limbo during a crucial meeting or presentation or when you still have an hour of work and only 30 minutes left on your laptop battery. But with some know-how, you can extend your laptop battery’s lifespan and keep it running optimally for years. ... (Read More)
Recent studies have shown that employees between 16-19 are taking cybercrime for granted. What could that mean for your business? Hear the details in our latest tech update. (Read More)
Cloud computing has completely altered the way we work. But despite the undeniable security enhancements, a cloud environment can still create a long list of challenges you should be made aware of. Our latest guide shares everything you need to know. For example, what actions you can take to stay safe in the cloud … ... (Read More)
This is the time of year when most of us start planning for the months ahead. This year, rather than our usual 12-month tech forecast, we’ve ensured our December guide will help you prepare for the next decade! We wish you all a Merry Christmas and a prosperous new year, and we hope you get ... (Read More)
The quickest way to upset your staff is by giving them slow access to the internet. Bad Wi-Fi quickly creates tension in the team and is a real productivity killer. You don’t have to suffer slow Wi-Fi. Here’s our guide to making Wi-Fi faster whether you’re working in the office or from home. (Read More)
Have you participated in a video call where you’re completely distracted because another participant looks and sounds so dreadful? If you have, it’s usually one (or all!) THREE things. They’re forced to look down (never a flattering angle!) because that’s where the camera is on their laptop. They’re poorly lit and look like criminals ... (Read More)
You’ll know a little about it, no doubt – it’s where you receive an email from someone pretending to be someone else and contains a link or attachment that, if opened or downloaded, can instal malware onto your IT system. As with most things, cybercrime has evolved, and many forms of phishing now exist. This ... (Read More)
5 steps to improve your ransomware resilience Can you imagine that rather than the usual positive start to your day, you arrive at the office to discover no one can log in and your database has been locked until you hand over a ransom fee you can ill afford? Pretty worrying, you’ll agree. Ransomware is ... (Read More)
Moving your business’s data and applications over to a cloud-based solution can be complex, forcing many people to ‘throw in the towel’ at the mere thought of it! And for good reason, as plenty could go wrong: increased downtime, data loss, and things refusing to work as they should are all barriers to making that ... (Read More)
The 7 KPIs for ROI from ITOlly DenhardFounder, IT Trouble Free[post_published]Ensuring your IT spend is an investment and never an expense No matter what kind of business you run, technology sits at the heart of it today. And it’s going to become more and more important in the future. Big business thinkers see IT as a long-term investment. They understand… (Read More)
Why John’s “other” laptop could be a security riskOlly DenhardFounder, IT Trouble Free[post_published]How to keep your data super safe now working from home is‘the norm’ for many Working from home is now standard practice for many of us and is likely to remain so. It can, of course, bring many benefits to our business and our teams. However, alongside those… (Read More)
POWERPOINT: How to change your pointer to grab attentionOlly DenhardFounder, IT Trouble Free[post_published]How do you focus your audience’s attention when you’re presenting in power point? Here is how to change the standard pointer so you can keep the audience’s attention where you need it. Would you like to discuss upgrading your systems or have questions about your businesses IT security?… (Read More)
How to turn off the built-in password manager in ChromeOlly DenhardFounder, IT Trouble Free[post_published]IT Support Video Tutorial Using an external password manager is always advisable. If you do use one you may want to turn off the built-in one in chrome to stop your passwords from being saved in multiple places. Here's how to do it.Would you like to… (Read More)
Your team are your biggest cyber security threat Olly DenhardFounder, IT Trouble Free[post_published]Through no fault of their own, your team are the weakest link in your business’s data security. Here’s why – and what you can do about it.Would you like to discuss upgrading your systems or have questions about your businesses IT security? Why not give us a call? (Read More)
OneNote: The power of translationOlly DenhardFounder, IT Trouble Free[post_published]If your business works with suppliers and clients overseas, you can use OneNote to automatically translate text. Here’s how to do it.Would you like to discuss upgrading your systems or have questions about your businesses IT security? Why not give us a call? (Read More)
OneDrive saves the day as your portable scannerOlly DenhardFounder, IT Trouble Free[post_published]There you are, working from home and getting things done, until suddenly… you need to print, sign and scan a document. You’ve got a printer, so that’s OK. But no scanner. That’s annoying. How can you get this done today? Microsoft 365 to the rescue! There’s a scanner built… (Read More)
Microsoft 365: Mobile apps and business without the office Olly DenhardFounder, IT Trouble Free[post_published]Microsoft 365 literally has all the answers. There are so many different applications contained within your subscription. And it’s surprising just how many devices you can use your apps on.Would you like to discuss upgrading your systems or have questions about your businesses IT security? Why not… (Read More)
Ways password managers can improve your staff’s efficiencyOlly DenhardFounder, IT Trouble Free[post_published]The benefits in using a password manager are great indeed A password manager adds a number of levels of cyber security to your business and helps everyone in your team stick to good security practices. It gets better – here are three ways a password manager can also help… (Read More)
PowerPoint: Raising the game with audioOlly DenhardFounder, IT Trouble Free[post_published]Powerpoint is one of the most usefull tools for meetings and presentations both in person or on a video call. There are lots of little tricks hidden within PowerPoint, to give you greater communication powers. And here’s one you’re going to love.Would you like to discuss upgrading your systems or have… (Read More)
Have your emails been compromised? Olly DenhardFounder, IT Trouble Free[post_published]There are lots of different ways to communicate and collaborate. But nearly all businesses rely heavily on email. And that’s why it’s so popular with hackers. A large majority of cyber-attacks start in your email. Here are some ways to protect your business from your own inbox.Would you like to discuss… (Read More)
The data security equivalent of leaving your keys in the doorOlly DenhardFounder, IT Trouble Free[post_published]We all take great care to keep our homes secure. Yet some business owners and managers don’t have the same attitude towards their business and its data security. Which is crazy. Because there are a lot more people trying to access your business’s data, than trying… (Read More)