Blog

GDPR & Email Encryption

  I have been fielding a number of requests for information with regards to email “encryption” and "how can we encrypt our emails". Of the 261 pages of GDPR, the word 'Encryption' appears just 4 times as follows "...implement measures to mitigate those risks, such as encryption." (P51. (83)) "...appropriate safeguards, which may include encryption"…
Read more

Does your practice need a Dedicated Server?

Does your practice need a Dedicated Server? Having spent some time over the last few days trying to help a potential new client out of a tricky situation due to failed hard drive in their “server” computer I thought about why we generally recommend using a dedicated server over a computer acting as a server…
Read more

The Number 1 question we get asked

The Number 1 question we get asked When speaking to potential clients, their favourite question is often "What is your Unique Selling Point?" So how do we differentiate ourselves, stand out from the competition, and why should people choose us over other IT companies? It's a question I struggle with because, although we offer a…
Read more

What is a Phishing Scam?

What is phishing? Phishing is a way for hackers to gain protected information, tricking people into giving away bank credentials, passwords, and more. That’s why phishing emails are considered a main vehicle for identity theft. They look legitimate, and most people don’t realize it’s a scam until it’s too late. Phishing can be categorised in…
Read more