Latest News

      • What should I do about a data breach? 

        • 0
      • Donna Aplin

      What should I do about a data breach? GDPR came into force back in 2018 (on the 25th of May actually!).  Data breaches were still ‘a thing’ before that of course, but the GDPR requirements mean that businesses need to do much better at protecting the personal data that they store about people.  Of course, data breaches are still going to occur, in both small businesses and huge enterprises.  If governments and massive, multi-national conglomerates can’t protect their networks 100% of the time, then of course small businesses in Sheffield and around the whole UK have a difficult job! 

      • What is MFA? 

        • 0
      • Jason Francis
      Multi-factor authentication (MFA) is an important security measure for all businesses whether large or small. It adds an extra layer of protection to your login process by requiring users to provide two or more forms of identification before accessing sensitive information or systems. 
      • What’s Changing in the Cybersecurity Insurance Market?

        • 26
      • Donna Aplin

      Cybersecurity insurance is still a pretty new concept for many SMBs. It was initially introduced in the 1990s to provide coverage for large enterprises. It covered things like data processing errors and online media.

      Since that time, the policies for this type of liability coverage have changed. Today’s cyber insurance policies cover the typical costs of a data breach. Including remediating a malware infection or compromised account.

      • What are the best practices for password policies?

        • 26
      • Matthew James

      What are the best practices for password policies? Security Policies – and the eventual demise of the password 

      I did something unusual (for me) the other day – I went out for a drink in Sheffield city centre. Why does that matter to you? And why would I write about it here?  Well it was while I was out mingling with actual real live people that a conversation arose about security and passwords (seriously, I’m an absolute blast when I am out on the town, honestly) and what the best policies are around passwords. It came to my attention that there are still a lot of people still following best practices from a decade ago… 

      • Don’t Set Yourself Up to Fail: Tips for Safer Home Security Setups

        • 26
      • Donna Aplin

      The global home security market has been growing by leaps and bounds. By 2026, experts expect the market to expand at a rate of 20.1%. This is on top of an expected increase of 21.6% from 2021 to 2022.

      • ESP Achieves Microsoft 365 Solutions Partner for Modern Work 

        • 26
      • Jason Francis
      ESP Projects achieved this new designation in January 2023, meaning we are one of the first Microsoft Partners in Sheffield to gain the accreditation, showing our commitment to making sure that we are best placed to advise all our customers on all things Microsoft Cloud related.
      • Who are the best IT Support Providers in Sheffield, Yorkshire?

        • 52
      • Donna Aplin
      Who are the best IT Support Providers in Sheffield, Yorkshire?
      • What Cybersecurity Attack Trends Should You Watch Out for in 2023?

        • 26
      • Donna Aplin

      The new year has just begun and it’s a time of renewal as we plan for the possibilities to come in 2023. It’s also a time when you need to plan for resiliency in the face of ever-present cyberattacks.

      Sixty-eight percent of surveyed business leaders feel that cybersecurity risks are getting worse. They have a good reason. Attacks continue to get more sophisticated. They are also often perpetrated by large criminal organizations. These criminal groups treat these attacks like a business.

      • 5 Ways to Balance User Productivity with Solid Authentication Protocols

        • 0
      • Donna Aplin

      One constant struggle in offices is the balance between productivity and security. If you give users too much freedom in your network, risk increases. But add too many security gates, and productivity can dwindle.

      It’s a fine balance between the two, but one you can achieve. Organizations need to recognize the importance of both. And not sacrifice one for another.

      • Copper networks switch off in 2025 

        • 26
      • Jason Francis
      BT Openreach is intending to close off many copper connections by 2025. The idea is to bring consumers and businesses forward, into the SuperFast, UltraFast and HyperFast broadband spaces by forcing them onto Fibre based products.
      • IT Security. Why does my Sheffield business need to worry about IT Security? And how do I stop getting hacked?

        • 26
      • Jason Francis
      IT Security in Sheffield from ESP Projects. You need to ensure that your business is better protected than most. Find out how here.
      • What Are the Advantages of Implementing Conditional Access?

        • 0
      • Donna Aplin

      It seems that nearly as long as passwords have been around, they’ve been a major source of security concern. Eighty-one percent of security incidents happen due to stolen or weak passwords. Additionally, employees continue to neglect the basics of good cyber hygiene.

      • Tips for Overcoming Barriers to a Smooth BYOD Program

        • 0
      • Donna Aplin

      Bring your own device (BYOD) is a concept that took hold after the invention of the smartphone. When phones got smarter, software developers began creating apps for those phones. Over time, mobile device use has overtaken desktop use at work.

      According to Microsoft, mobile devices make up about 60% of the endpoints in a company network. They also handle about 80% of the workload. But they’re often neglected when it comes to strong cybersecurity measures.

      • What is the #ESPDuck all about? 

        • 26
      • Donna Aplin

      Firstly, what is the duck and where did it come from? Well, we decided that we should have a pet, here at ESP Headquarters.  Unfortunately, we’re always very busy delivering best in class IT Services to businesses in and around the Sheffield area to be able to look after a real-life one properly.  So, we decided that we should pick one that is a little more simple in the effort stakes (no need to feed or walk!).  

      • Simple Setup Checklist for Microsoft Teams

        • 0
      • Donna Aplin

      Microsoft Teams is a lot of things. It’s a video conferencing tool, a team messaging channel, and a tool for in-app co-authoring, just to name a few. During the pandemic, the popularity of Teams skyrocketed.

      User numbers for MS Teams jumped from 20 million in November 2019 to 75 million in April 2020. As of this year, Microsoft reports a user count of 270 million for the platform. This makes it the most popular business tool for team communications.

      • 7 Things to Consider When Getting a New Computer to Avoid Buyer’s Remorse

        • 26
      • Donna Aplin

      Have you ever bought a new computer and then had buyer’s remorse a few months later? Maybe you didn’t pay attention to the storage capacity and ran out of space. Or you may have glossed over memory and experienced constant freeze-ups.

      An investment in a new PC isn’t something you want to do lightly. Doing your research ahead of time and consulting with a trusted friend or IT shop can help. It will keep you from making major mistakes that could come back to haunt you later.

      • Simple Guide to Follow for Better Endpoint Protection

        • 0
      • Donna Aplin

      Endpoints make up much of a company’s network and IT infrastructure. This is a collection of computers, mobile devices, servers, and smart gadgets. As well as other IoT devices that all connect to the company network.

      The number of endpoints a company has will vary by business size. Companies with less than 50 employees have about 22 endpoints. Small businesses with 50-100 employees have roughly 114. Enterprise organizations with 1,000+ employees average 1,920 endpoints.

      • Insider Threats Are Getting More Dangerous! Here’s How to Stop Them

        • 0
      • Donna Aplin

      One of the most difficult types of attacks to detect are those performed by insiders. An “insider” would be anyone that has legitimate access to your company network and data. This would be via a login or other authorized connection.

      Because insiders have authorized system access, they bypass certain security defenses. Such as those designed to keep intruders out. Since a logged-in user isn’t seen as an intruder, those security protections aren’t triggered.

      • Everything You Need to Know About Microsoft Viva Sales

        • 26
      • Donna Aplin

      Data entry can be a real drag for salespeople. The time they spend on administrative tasks is time away from customer interactions. But that data is vital.

      It’s important to capture customer orders, quotes, needs, and more. Lead and sales reporting help sales managers know where to direct their attention. Analytics also help drive more efficient ways of closing the deal.

      • Introducing Microsoft’s New Surface Pro 9

        • 26
      • ESP Projects
      Surface Pro 9 gives you the tablet flexibility you want and the laptop performance and battery life you need to move through your day — all in one ultra-portable device.