Skip to page content
Client Hub Tel 01892 830111

Blog

Filters:

How Microsoft 365 changes your approach to business change

Everywhere you look these days you see posts, articles and books about how you need to change your business. While for people who have spent a lifetime building a business that’s not always an easy message to hear, I think 2020 has showed that increased agility, productivity and mobility will be important. As we normalise life after COVID-19, or perhaps live permanently with it, the changes it forced upon us will have a long impact.

Read More

How Microsoft Teams has changed in 2020

We are all adapting to working remotely and we’ve seen a number of new phrases enter the language this year – “Work from anywhere” is one we like a lot, and one you’ll be seeing more of next year is the “virtual commute”, the time in the morning preparing for work and in the evening winding down.

Read More

Cyber Security: Playing the Blame Game

I was talking with a colleague the other day about security breaches and in particular business email compromises. Just to set the scene, a business email compromise is where a criminal (or threat actor as they're called in the infosec world) gets in the middle of a chain of email communications to divert funds. There are several ways this can happen and I'll cover those as we go, but in this instance a user had received an email notifying them of a change of bank details so they could pay an outstanding invoice. The email came from a known contact and followed an existing thread.

Read More

Common phishing types

Cybercrime is on the rise and the types of phishing scams are evolving, our ability to identify them has never been more important in both protecting ourselves, but also the organisations that we are part of. There are many types of phishing scams with many different tactics employed, in this article we look at some of the main phishing scams used by the criminals, the intent or nature them and advice on how to deal with them.

Read More

What IT do I need to work from home?

The times they are a-changin', and they certainly are. As we are pushed out of the office for the second time, we must accept that working from home is likely to be the new normal for much longer. Having the right IT equipment at home will allow you to continue to be as productive as possible and having the wrong or outdated IT is only likely to slow you down, reduce morale and will cause you to become disgruntled.

Read More

Wi-Fi: Are you getting the best coverage?

Wi-Fi is an interesting beast in that it has become ubiquitous in its presence and our desire to consume it. Wherever we go we are either looking out for free Wi-Fi or the businesses we visit are actively promoting we use it. In our homes it fuels most of our devices (I dare say there will be some like me who own a comms cabinet full of tech but it's pretty rare) and should it fail it can (according to my children) be like falling back in time.

Read More

Spotting a phish

Phishing is the most popular form of cyber crime. It’s scam form that has been around for years from the comical prince to the current COVID-19 disguise.

Read More

Worlds Best SMB Managed Service Provider

We are proud to announce that Select Technology have been named as one of the world’s best SMB Managed Service Providers on the new annual Channel Futures SMB Hot 101 rankings for 2020.

Read More

Let’s all be friends: A referral program

Select Technology has been providing IT Support for over 25 years and in that time, we have grown through word of mouth. The recommendations that we have been given by our customers has allowed us to grow, expanding the team and our services.

Read More

Microsoft Business Voice: VoIP calls from Teams

Business Voice is an add-on for Microsoft 365 and Office 365 plans available for SMEs. Suitable for all companies with up to 300 users, this enterprise-grade solution combines audio conferencing, call plans (Microsoft’s or import your own) and a complete phone system.

Read More

Why do SMEs need to automate?

Everywhere we look these days, automation is making a mark. From Alexa and Google Home in our homes to ‘big data’ and the ‘internet of things’, smart automation is transforming our world...

Read More

Choosing an MFA Solution

By now I'm sure you're all familiar with the terms "MFA (Multi Factor Authentication), 2FA (Two Factor Authentication) or Strong Authentication" over the last few years, for those of you that aren’t these are largely the same thing (there are some technical & semantical differences but for simplicity let's not get into those) in that they support your traditional Username & Password

Read More

Contact us

Get in touch with us