What is two-factor authentication?
Security remains the number one priority for IT users and high profile breaches, such as those encountered by Facebook and Apple, continue to dent user confidence. Increasingly, there is a[…]
Mobile data – how to keep a check on what you’re using
Data is used every time we send or receive information via our mobile phones and for many of us that occupies a large part of the day. But do we[…]
XP was a game changer but the game has changed
By now, you will know that Microsoft withdrew support for Windows XP on April 8th and the software giant is as aware as we are of the column inches that[…]
Avoiding stress and downtime when you move office
It’s strange how you can wait ages for one office IT relocation project to come along and then 5 suddenly arrive at once. Since Christmas, the phone has not stopped[…]