Why Microsoft have recently disabled basic authentication

Published 2 years ago

Keep your security up to date To stay secure online outdated authentication has been disabled for modern authentication. During October 2022 Microsoft disabled basic authentication in Exchange Online. Our Pisys engineers have seen a rise in customer queries regarding the ability to carry out basic work functions with applications and scripts. So, why have Microsoft… Read more »

What is the Big Switch Off?

Published 2 years ago

BT Openreach Announcement BT Openreach have announced by 2025 old analogue PSTN and ISDN services will be switched off by 2025. Find out if the Big Switch Off will affect you and your business. By 2025 old analogue PSTN, public switched telephone networks are to move to a fully digital network. The Big Switch Off… Read more »

What is Cyber Hijacking?

Published 2 years ago

Protect your business Be aware of cyber hijacking. All businesses are at risk of facing data risk through malicious actions by cybercriminals. Hackers are breaking into business emails to cause damage and gain control over information. Cyber Hijacking threatens computer systems by taking over IT infrastructure which can cause damage to communications via the network.… Read more »

What is SaaS Protection?

Published 2 years ago

Is your data protected? SaaS, software as a service maintains, monitors, and protects your Cloud storage which maximises data protection, improves efficiency, and grows profits. If your data is in the cloud, it still requires protection to which our Pisys engineers can help with. Moving into the Cloud can be scary and challenging to some… Read more »

What is SaaS Defence?

Published 2 years ago

What does SaaS Defence do? Software as a Service Defence is an advanced threat protection to prevent threats from occurring which is shared in the cloud. SaaS Defence is Software as a Service defence which is advanced threat protection with spam filtering solutions. A monthly subscription for software such as Microsoft 365 developed by security… Read more »

What is Business Continuity?

Published 2 years ago

Importance of Business Continuity Business continuity is the businesses level of readiness to maintain critical business functions after a major disruption or incidents. These events include power outages, security breach and incidents. Equipment and hardware failure as well as natural disasters. Downtime is not only disruptive to business continuity infrastructure but can also be costly… Read more »

What is Broadband?

Published 2 years ago

Broadband has changed how we work, study, play, shop, and even socialise. Our Pisys engineers can help with your broadband connection and can recommend the best match for your working environment. Broadband is how we access the internet which has transitioned from dial up to 5G. It has become part of our everyday lives and… Read more »

What is the Dark Web?

Published 2 years ago

The Dark Web explained The Dark Web is a series of encrypted networks which hide the identity of the users. At Pisys we can advise you on best practices to stay safe online. It has since grown into a platform of dark and illegal activities along with a common visiting ground for cybercriminals and hackers… Read more »

Want Faster Wi-Fi for your office and remote workers?

Published 2 years ago

Get faster Wi-Fi for your workers in office & remote Fast Wi-Fi isn’t just essential to keep our family happy. The reality is without fast Wi-Fi many businesses simply couldn’t operate. We rely on Wi-Fi every day for: Basic communication Accessing our applications Storing and accessing data Keeping our devices up-to-date and safe Giving customers… Read more »

Return on investment (ROI) from your IT

Published 2 years ago

Make your IT Spend an investment, not an expense. Two Different Ways that Owners and Managers Buy IT and Technology. The second group benefit more! All businesses have moments where every last penny counts. BUT… when all spending decisions are made by asking… “what’s the cheapest way to do this?” That’s when problems develop. Our… Read more »

Everything you need to know about password managers for your business

Published 2 years ago

DO YOU FIND PASSWORDS AN ANNOYANCE? Everyone knows they should try harder with their passwords. But everything about them seems like effort we could do without. SUCCESSFUL PASSWORDS ARE: Difficult to think up Even harder to remember Highly frustrating when you get them wrong (and have to reset them) This is what encourages people into… Read more »

What is a cyber security attack?

Published 2 years ago

A cyber security attack is a strategic malicious manoeuvre made by hackers to compromise data and gain access to sensitive data. Cybercriminals use different methods such as malware, phishing, ransomware, and more to breach privacy through computer systems and networks. Cyber attacks can be damaging for the reputation of companies and individuals and can jeopardise… Read more »

Ready to discuss your IT needs and how we can grow your business?

Call us Message us Get in touch