Category: Office 365

Providing IT support and solution to small and medium businesses. Servicing Edinburgh, Livingston, Fife and surrounding areas. Responsive, Flexible, Professional and friendly local support.

Hybrid Working Results In Move Off-Premise For Tech Infrastructure

Research by Zen Internet has revealed that hybrid working is causing businesses to question whether they now need enough on-premise tech infrastructure to support a full capacity office. Most Business Have Hybrid Working Plan The research conducted by Vanson Bourne on behalf of Zen Internet showed that 93 per cent of businesses already have a hybrid…
Read more

Facebook (Meta) To Integrate Workplace With Microsoft Teams

Facebook/Meta has announced that it is integrating Workplace with Microsoft’s collaboration app Teams to enable users to share information more easily between the two platforms. What Is Workplace? First announced in 2016, originally Facebook’s internal messaging board, and formerly known as ‘Facebook At Work’, Workplace is the work-focused version of Facebook’s social app. The app…
Read more

Microsoft Unveils ‘Loop’ Collaborative App

Microsoft has unveiled the new ‘Loop’ collaborative app which it describes as “a flexible canvas with portable components” designed for assisting with new hybrid working patterns. Background Microsoft says that the new app is part of a “reimagining” of Office, and a response to the new opportunities created by new (hybrid) working patterns that can make Office more of…
Read more

Guess What Most Web Traffic Is Made Up Of?

In this article, we look at how a surprisingly large proportion of Internet traffic is made up of bots, how many of these can be ‘bad bots’, and what businesses can do to keep enjoying the benefits of good bots while guarding against the threats of bad bots. Two-Thirds of Internet Traffic is Bots The…
Read more

Featured Article : New 365 “Cloud PC” From Microsoft

Microsoft has announced its new hybrid Windows 365 cloud service where the operating system is stored in Microsoft’s Cloud and which securely streams each user’s apps, data, and settings to personal or corporate devices, acting as a full Windows desktop PC in the cloud. New Era of Hybrid Personal Computer Microsoft is calling the new subscription…
Read more

Here’s Windows 11

With the launch of Microsoft’s Windows 11 recently announced in an online event, we take a brief look at what’s new with this new OS, how it challenges Apple, and when it’s available. Early Preview + Free Update An early preview version of the new Microsoft Windows 11, next generation OS will be released for…
Read more

How Secure Is Your Software/Digital Supply Chain?

It is easy to think that cyber-attacks are likely to come from outsiders unconnected to the business, but how much do you know about the security of your digital supply chain? Software Supply Chain Risks Businesses use many different third-party software tools as part of their day-to-day transactions and for organisations in the public sector,…
Read more

Featured Article : Image Optimisation

In this article we look at image optimisation, the different types of compression and image files, and how files different file formats can be compared and best used. Vectors or Bitmaps? Raw, digital image files start as either vectors or bitmaps/rasters/pixel maps. Bitmaps are made from pixels whereas vectors are made using mathematical formulas, co-ordinates…
Read more

Emotet: A Million Bucks per Incident

In the light of a reported recent victory by Europol in trying to stop the particularly dangerous Emotet malware, we look at what it is, how it is spread, and how to try and guard against it. What Is Emotet? Emotet is a computer malware program, believed to be Russian in origin, that was originally…
Read more

What Is Zero Trust?

With mobile computing, software-as-a-service (SaaS), and now remote working moving the focus of IT security away from the traditional perimeter, this article looks at what a Zero Trust approach is and how it can help. More Complex Demands The belief among many IT security experts is that a traditional perimeter-based security approach may no longer…
Read more