Call us: 0121 784 0077

RSS
05

Defence in Depth - Part 2

posted on
95% of security breaches involve human error. Two of the biggest mistakes a company can make according to Ashley Schwartau of The Security Awareness Company are "assuming their employees know internal security policies" and "assuming their employees care enough to follow policy".
Read More
| Categories: SMB, Managed IT Services, IT Support, Mobile Device Management, BYOD, Security, Cybercrime, Malware Alert, Malware Alert | Tags: IT Security , Malware , Cybercrime , Protection , SMB , Outsourcing | View Count: (96)
05

Defence in Depth - Part 1

posted on
In the 1930's, the French built a trench called the Maginot Line to rebuff any invasion. The philosophy was simple: if you map out all the places an enemy can attack, and lay down a lot of men and fortifications, you can rebuff any attack. Read on.....
Read More
| Categories: SMB, Security, Cybercrime | Tags: IT Security , Cybercrime , Protection | View Count: (123)
11

Microsoft choose Microtrading

posted on
As one of the UK's top Microsoft partners, Microsoft have selected Microtrading as a case study, showcasing our commitment to developing skills and staff training. This investment ensures our customers receive the full value from their investment in Microsoft technologies.
Read More
| Categories: Office 365, Cloud Computing, SMB, Outsourcing, IT Support, Microsoft, Microsoft Azure | Tags: Microsoft , Cloud Computing , Office 365 , Azure , EMS , IT Support , SMB | View Count: (130)
On Wednesday we ran the second in our series of the Secure, Productive Enterprise workshops at Adam's restaurant in Birmingham. This event focused on tackling the UK's productivity challenges and how the Cloud and Office 365 can be a significant enabler for companies of all types and sizes.
Read More
| Categories: Office 365, Cloud Computing, SMB, Microsoft, Security, Data Centre, Microsoft Azure, Remote Working, Enterprise Mobility | Tags: Microsoft , Azure , Cloud Computing , Office 365 , Business Growth , Security , Productivity , Mobility | View Count: (210)
15

It'll never happen to me!

posted on
We all like to think we are invincible and not vulnerable to those reports about crime or disasters we hear on the news or read in the papers everyday. I'm a positive guy and like to believe in the best of people - that is until I got burgled and realised the simple truth that we are all susceptible to bad things happening.
Read More
| Categories: Managed IT Services, IT Support, Security, Cybercrime, Business Continuity, Backup and Recovery | Tags: IT Security , Managed IT Services , Managed Security , Antivirus , Malware , Phishing , Backups , Business Continuity , Disaster Recovery , Cybercrime , Data Loss | View Count: (278)
08

Is that email a phishing scam?

posted on
The goal of a 'phishing' email is to gather personal information about you, generally related to your finances. The most common reason for the large number of people falling for fraudulent emails is that the phishing attempts are often so well-disguised that they escape the eyes of a busy email reader.
Read More
| Categories: SMB, Managed IT Services, Outsourcing, Security, Cybercrime, Malware Alert | Tags: IT Security , Cybercrime , Malware , Anti-virus , Web Protection , Managed Services | View Count: (192)
Ten business owners and senior managers enjoyed great hospitality and some practical advice at our Cyber Security Workshop on 15th February. Supported by Microsoft, the attendees learned what they could and should do to help protect their companies from cybercrime and data loss.
Read More
| Categories: Office 365, Enterprise Mobility, Cloud Computing, SMB, IT Support, BYOD, Microsoft, Security, Cybercrime, Business Continuity | Tags: IT Security , Workshop , EMS , Cloud Computing , BYOD , Cybercrime | View Count: (216)
In recent years, many large companies have moved their servers and storage to a virtualised environment, but very few small-to-midsize businesses have followed the trend. Significant cost savings and efficiency's can be made by virtualising your IT infrastructure that make this move a must for any SMB who wants a cost effective, high performing IT system.
Read More
| Categories: SMB, Microsoft, Security, Business Continuity, Backup and Recovery, Data Centre, Hardware, Software | Tags: SMB , Virtualisation , Reduce Costs , Efficiency , Servers , VDI | View Count: (276)
Small and medium sized businesses face many challenges today, particularly things like increased mobile device use and unexpected network growth. While every business wants to grow, the problem with unplanned growth is that it can quickly turn chaotic from a technology standpoint and leave your IT system exposed.
Read More
| Categories: SMB, Managed IT Services, Outsourcing, IT Support, Mobile Device Management, BYOD, Security, Cloud Computing | Tags: Business Growth , Managed IT Services , Outsourcing , Security , IT Support , SMB , Cloud Computing | View Count: (312)
It's natural for owners of small-to-medium sized businesses to try and emulate the success of a competitor or like-minded entrepreneur. It's always wise to model business practices after those worth imitating, assuming you're also picking up on areas of potential weakness that you can capitalise on for a competitive gain.
Read More
| Categories: Enterprise Mobility, Cloud Computing, SMB, Managed IT Services, Outsourcing | Tags: Business Growth , SMB , Outsourcing , Technology , Managed Services , IT Support | View Count: (342)
Page 1 of 7 FirstPrevious [1]2345 Last

Get In Touch

Show form

Hide form

Please complete the form below and a Microtrading representative will contact you shortly