-
-
-
-
0
-
-
-
Jordan Hackford
We’re sure you’ll agree when we state that receiving scam & phishing emails are almost a daily occurrence in 2019.
No matter how good your IT system is, cybercriminals are always finding better ways to bypass IT security systems.
-
-
-
-
-
-
-
26
-
-
-
Donna Aplin
As you may already be aware (and you can see from the count-down timer at the top of our website), Microsoft are ending support for many of their legacy pieces of software, including Microsoft Windows 7, Office Suite 2010, SQL 2008 and Server Standard 2008. -
-
-
-
-
-
-
0
-
-
-
Taylor Currie
Early April, the annual ‘Cyber Security Breaches Survey 2019’ was released by the Department of Digital, Culture, Media and Sport. This shows that in the last year, 32% of businesses in the UK experienced cyber security breaches or attacks, hitting 2 out of every 10 charities across the country and seemingly targeting medium to large business and high-income charities. -
-
-
-
-
-
-
26
-
-
-
Donna Aplin
An Automated Patch Management solution will fully automate the patch management life-cycle for desktops, laptops and servers on a daily basis. Nowadays, even minor software bugs can lead to major headaches so the importance of implementing a regular patching schedule can’t be underestimated! -
-
-
-
-
-
-
26
-
-
-
Matthew James
An opportunity has arisen for a skilled engineer to join our team. The engineer will be working closely with other team members, to provide class leading support to our varied customers during the installation and configuration of IT systems. -
-
-
-
-
-
-
26
-
-
-
Donna Aplin
OSSIM is an open source network security platform or SIEM (Security Information and Event Management). It is utilised by companies such as Foot Locker, Domino’s and All Pay and is by far the most popular security platform available on the market. OSSIM not only protects a network but can also be configured to help companies reach certain levels of regulation compliancy. -
-
-
-
-
-
-
26
-
-
-
Donna Aplin
Patch management is pretty much what the name suggests! It is an automated system that manages the system patches that are provided to the systems in use, be it a desktop PC, laptop or a server. An update schedule can be setup and enforced without the users or administrators having to pay granular attention to the update reminders, or chase staff to complete these. -
-
-
-
-
-
-
26
-
-
-
Donna Aplin
As network and working practices continue to develop, flex and become more fluid, time becomes our precious resource in the modern office. Staff managing large and important amounts of data across multiple sites/projects are often juggling many plates, and the requirement to reduce wasted activities is brought to the forefront. New devices can assist in reducing these challenges, but many businesses are hesitant to upgrade their core network and the end user devices. -
-
-
-
-
-
26
-
-
-
Donna Aplin
We’ve been involved in hundreds of web projects over the years, and we’ve also helped to pick up the pieces when projects have gone wrong. Here are our 7 top tips for making sure your web project is a successful one... -
-
-
-
-
-
-
26
-
-
-
Jordan Hackford
A scaffolding alarm system helps prevent theft of expensive equipment when workers are not on site, and also prevents unauthorized persons gaining access to buildings and roofs that would otherwise be inaccessible. -
-
-
-
-
-
-
26
-
-
-
Matthew James
There has been another upturn in spam activity, this time a slightly different track to our recent reports where the aim has been to harvest your log on details or infect machines with Malware, this latest round of spam takes a less technological track and flat out blackmail and/or threaten the recipient. -
-
-
-
-
-
-
0
-
-
-
Jordan Hackford
Microsoft Office 365 is used by thousands of people worldwide, professionally and personally. However, a lot of the users only touch the tip of the iceberg when using Office 365. In this blog post, ESP Projects will walk you through some of the additional applications available, covering some of the best products in the software range. -
-
-
-
-
-
-
26
-
-
-
Matthew James
Office 365 offers far more than just an industry leading email platform. In this series of articles, we seek to investigate other offerings on the platform and how they can benefit you and your organisation, starting with perhaps what is the second biggest business use behind emails – File Storage and Sharing. -
-
-
-
-
-
26
-
-
-
Jordan Hackford
You may have come across the term web applications before today, but are you aware of the many different types of web applications available and how they can benefit your business? In this blog post, we’ll cover all of the basics of what a web application actually is as well as the pros and cons that come with them. -
-
-
-
-
-
0
-
-
-
Matthew James
One of the weakest points in any security system, whether it be an IT system, or other system, is usually the human operators of that system. There is a whole subset of “hacking Techniques” dubbed “social engineering” where the goal is not to find weaknesses in the technological level of the system, it is to glean information from the end users to enable increased access, or to trick the end user into performing some task on their behalf, we have covered a couple of the methods used here and there.
-
-
-
-
-
-
0
-
-
-
Matthew James
Over the last week or so we have noticed an increase in Phishing Emails designed to illicit the Office 365 account details from unsuspecting end users. Unfortunately we have seen a couple of end users fall for these and have allowed access to their email system to an outside agent. with these details the Phisher can do anything that you would be able to do with your emails.
-
-
-
-
-
-
26
-
-
-
James Greaves
I have Office 365, do I still need to backup?
Office 365 has become more and more popular over the past couple of years and is now used in businesses all over the world. It has become increasingly beneficial to many users improving productivity, reducing costs for hardware and allowing users to access data wherever they might be.
Due to the data being in the cloud users are led to believe that there is no need to do Office 365 backups. Microsoft do have measures in place to backup and replicate data at their end but basically this is only a simple form of backup and does not actually protect you from human error such as accidental deletion or an employee maliciously deleting data.
-
-
-
-
-
-
-
0
-
-
-
Taylor Currie
Microsoft and TT-Exchange (Tech Trust) have announced in the last few days, that some changes to the Donation Programme ran by the partners will be coming into force on 1st April 2018 – just 3 weeks away!
TT-Exchange (A registered UK Charity in its own right) is the only place where registered UK charities can access donated products from the Microsoft Product Catalogue (it also provides donated and discounted products from many other software and hardware vendors)
-
-
-
-
-
-
-
0
-
-
-
Jordan Hackford
The General Data Protection Regulation was first proposed in 2012, and what followed was four years of discussions, debates, and amendments, with the regulation finally adopted by the European Parliament in 2016. Countries, companies, and organisations were given two years to comply, with the regulation being enforced from 25 May 2018. What originally seemed like a reasonable amount of time to prepare has passed quickly, and at the time of this writing, enforcement of the GDPR is barely 3-months away.
-
-
-
-
-
-
-
0
-
-
-
ESP Projects
Tech Trust has this week released a new white paper aimed at illuminating the fact that many charities have no sort of Digital Strategy in place.
What is it About?
The whitepaper provides lots of statistics that Tech Trust have generated during the creation of the whitepaper. The whitepaper is titled “No charity left behind: the need for a digital third sector” and provides information and trends surrounding the information it gathered between September and October 2017.
-
-