Knowledge Centre Videos
Monthly videos to help you navigate your IT systems better.
Find out how it feels to be hacked!
See how common hacks work so you know what to look out for.
Plan ahead now if you need new hardware later this year
Did you know we’re right in the middle of a global chip shortage? A number of different things have come together to create the perfect storm. And it’s restricting some technology supplies. Our new video explains why you should plan ahead and order early, if you need any new hardware in the next 6 months.
So you’ve tapped a bad link on your phone
We’ve all done it – tapped a link, realised it’s not what we thought it was, and then wondered what damage it might cause to our phone. First of all, don’t panic. But then, take action. There are two things you need to be aware of now. And our new video tells you what they are.
OneDrive saves the day as your portable scanner
There you are, working from home and getting things done, until suddenly… you need to print, sign and scan a document. You’ve got a printer, so that’s OK. But no scanner. That’s annoying. How can you get this done today? Microsoft 365 to the rescue! There’s a scanner built into an app you may already be using. Here’s everything you need to know.
The data security equivalent of leaving your windows open
We all take great care to keep our homes secure.
Yet some business owners and managers don’t have the same attitude towards their business’s data security.
Which is crazy. Because there are a lot more people trying to access your business’s data, than hoping to steal your TV.
Here are four key ways to improve your business’s data security.
How to spot a ransomware attack before proper damage is done
One of the most terrifying things that can happen to your business is a ransomware attack.
This is where hackers take control of your network and encrypt all your data, making it unusable. They won’t undo the damage unless you pay a big fee – a ransom fee.
The reason they can do so much damage is they secretly break in to your system a long time before the attack is launched. The one upside of this is you can keep an eye out for symptoms you’ve been breached.
Here are three ways you can see if hackers are already in your system.