Optimising IT logo

Year: 2021

We love blogging about Cyber Security, take a look through the posts below and feel free to comment and share!
Blog posts
Sending encrypted E-Mail protection secure mail internet symbol blue computer keyboard
Cyber Security

The Growing Threat of Email Hijacking

We asked Todd Gifford, our resident Information Security expert, for his take on the risks posed to small and medium-sized businesses (SMEs) from email system hijacking (Otherwise known as Business Email Compromise). Here’s what he had to say on this growing security threat:

Read More »
Protecting information in mobile devices. Hacking mobile devices by hackers. Data protection in the cloud.
Cyber Security

Mobile Device Management Security

There are increasingly new ways to work “mobile”, especially as remote working is on the rise. So what precautions should you take to protect your data? We explain where you may find your devices vulnerable and how to prevent risks to your security.

Read More »
Microsoft Power BI logo shown by apple pencil on the iPad Pro tablet screen. Man using application on the tablet
Cyber Security

The Beginners Guide: What Is Microsoft Power BI?

This beginners guide will give you all the information necessary to understand the basics of business intelligence and how it works. We’ll also define what Microsoft Power BI is and explain how Optimising IT’s team of experts can help you make the most of it. Let’s dive in!

Read More »
A close up shot of LAN cables and blue network servers with a man standing in background.
Cyber Security

Local Area Network Trends – The End of LAN ?

This blog posted is aimed at IT Managers, Heads of IT, IT Directors and other senior leaders with responsibility for IT. Whilst there is some technical content, this isn’t a technical post and is designed to prompt thought and discussion with your IT teams and partners about the future direction of IT within your organisation.

Read More »
Optimising IT

OPTIMISED – September 2021

[et_pb_section fb_built=”1″ _builder_version=”3.22″ global_colors_info=”{}”][et_pb_row _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_image src=”http://optimising-it.onyx-sites.io/wp-content/uploads/2021/09/Newsletter-Sept-202110241024_1.jpg” title_text=”Newsletter Sept 202110241024_1″ _builder_version=”4.10.4″ _module_preset=”default” global_colors_info=”{}”][/et_pb_image][et_pb_image src=”http://optimising-it.onyx-sites.io/wp-content/uploads/2021/09/Newsletter-Sept-202110241024_2.jpg” title_text=”Newsletter Sept 202110241024_2″

Read More »
What’s Included in Managed IT Services
Cloud Services

Cloud Storage Security: Can Cloud Storage Get Hacked?

[et_pb_section fb_built=”1″ admin_label=”section” _builder_version=”3.22″ global_colors_info=”{}”][et_pb_row admin_label=”row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text admin_label=”Text” _builder_version=”4.11.1″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” hover_enabled=”0″ global_colors_info=”{}” sticky_enabled=”0″] Cloud

Read More »