ESP Projects is Sheffield’s leading IT Support provider. We provide IT Support to businesses of all sizes throughout the UK. With engineers based in many different locations, we are well-placed to be able to deliver the high-quality IT services that you need, wherever you are based. Our customers range in size from multi-national private sector customers with 500 staff, through to small charities and other third sector organisations. Our IT Support packages are provided on an unlimited basis, meaning we’ll always work with you until your problem is solved.
More About IT SupportWe’re here to help.
Has your provider been slacking during the coronavirus outbreak? Here’s what some customers have said about us during this time.
“We couldn’t have continued to operate without ESP’s support. I would appreciate it if you could pass this on to the MD, so that he can thank all of your staff who have ‘made it happen’”
“Thank you all from me and all my colleagues for all of your support at this difficult time. I do appreciate the demands you have and will continue to have during this somewhat challenging time. We all very much appreciate your help and advice and your patience addressing our IT problems especially during our remote working arrangements.”
Find out more about IT Support here
Find Out More About UsWe’ve developed a range of ‘off-the-shelf’ applications to assist with your day to day operations, designed to refine processes and improve productivity and efficiency, saving you time and money. Our solutions can also be tailored to specific business needs with the scope to add or refine functionality with additional bespoke development from ESP or by activating additional available modules. All our solutions are hosted and supported by us, at our GDPR and ISO accredited data centre here in Sheffield.
I just want to say how fantastic your chaps are. I’m always thanking them but I just wanted to let you know as well!
Manager, Childcare Provider
In this article, we look at the rules, policies and guidance around what types of content is – and isn’t – allowed on social media websites.
Social Media Platforms
Social media platforms reflect many different views and motivations and can be used for harm (as well as good) e.g., cyberbullying, hate speech, grooming and more. With social media forums positioning themselves as platforms rather than publishers, they are currently protected from the same regulation that publishers are subject to. Given that there are now vast quantities of rules and guidelines introduced and published by the social media platforms themselves to show that they can work without the need for regulation or other intervention, this article focuses mainly on Facebook and Twitter as examples.
The Shift Online
The pandemic has prompted a huge shift online this year for work and now, with the second wave in full flight, for online shopping. Back in June, an Alvarez & Marsal and Retail Economics survey showed that 17.2 million British consumers (25 per cent of the population) were planning to make permanent changes to the way they shop i.e., by shopping more online. This Christmas, this trend is now becoming a reality as online sales surge as well as an extra forecast surge of online purchases on Christmas Day as soon as retailers lower prices on Christmas Eve.
The fact that websites continue to be hacked and passwords are frequently stolen (and that a computer recently set a record by guessing 100 billion passwords per second) calls in to question how passwords can still be used safely and what lies ahead for them. This article looks at password security now and the progress being made towards a ‘passwordless’ future.
In this article, we look not just at data breaches but also at the impact of data breaches on business and organisations.
Data Breaches
A personal data breach, as defined by the UK’s data watchdog and regulator, The Information Commissioner’s Office (ICO), is “a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data.” This definition highlights, therefore, that a breach could be accidental or deliberate, and could be more than just about losing personal data. For example, data breaches could occur through third-party access, accidentally sending data to the wrong recipient, devices being lost or stolen, altering data without permission or losing the availability of personal data.