-
-
-
-
26
-
-
-
Jordan Hackford
A scaffolding alarm system helps prevent theft of expensive equipment when workers are not on site, and also prevents unauthorized persons gaining access to buildings and roofs that would otherwise be inaccessible. -
-
-
-
-
-
-
26
-
-
-
Matthew James
There has been another upturn in spam activity, this time a slightly different track to our recent reports where the aim has been to harvest your log on details or infect machines with Malware, this latest round of spam takes a less technological track and flat out blackmail and/or threaten the recipient. -
-
-
-
-
-
-
0
-
-
-
Jordan Hackford
Microsoft Office 365 is used by thousands of people worldwide, professionally and personally. However, a lot of the users only touch the tip of the iceberg when using Office 365. In this blog post, ESP Projects will walk you through some of the additional applications available, covering some of the best products in the software range. -
-
-
-
-
-
-
26
-
-
-
Matthew James
Office 365 offers far more than just an industry leading email platform. In this series of articles, we seek to investigate other offerings on the platform and how they can benefit you and your organisation, starting with perhaps what is the second biggest business use behind emails – File Storage and Sharing. -
-
-
-
-
-
26
-
-
-
Jordan Hackford
You may have come across the term web applications before today, but are you aware of the many different types of web applications available and how they can benefit your business? In this blog post, we’ll cover all of the basics of what a web application actually is as well as the pros and cons that come with them. -
-
-
-
-
-
0
-
-
-
Matthew James
One of the weakest points in any security system, whether it be an IT system, or other system, is usually the human operators of that system. There is a whole subset of “hacking Techniques” dubbed “social engineering” where the goal is not to find weaknesses in the technological level of the system, it is to glean information from the end users to enable increased access, or to trick the end user into performing some task on their behalf, we have covered a couple of the methods used here and there.
-
-
-
-
-
-
0
-
-
-
Matthew James
Over the last week or so we have noticed an increase in Phishing Emails designed to illicit the Office 365 account details from unsuspecting end users. Unfortunately we have seen a couple of end users fall for these and have allowed access to their email system to an outside agent. with these details the Phisher can do anything that you would be able to do with your emails.
-
-
-
-
-
-
26
-
-
-
James Greaves
I have Office 365, do I still need to backup?
Office 365 has become more and more popular over the past couple of years and is now used in businesses all over the world. It has become increasingly beneficial to many users improving productivity, reducing costs for hardware and allowing users to access data wherever they might be.
Due to the data being in the cloud users are led to believe that there is no need to do Office 365 backups. Microsoft do have measures in place to backup and replicate data at their end but basically this is only a simple form of backup and does not actually protect you from human error such as accidental deletion or an employee maliciously deleting data.
-
-
-
-
-
-
-
0
-
-
-
Taylor Currie
Microsoft and TT-Exchange (Tech Trust) have announced in the last few days, that some changes to the Donation Programme ran by the partners will be coming into force on 1st April 2018 – just 3 weeks away!
TT-Exchange (A registered UK Charity in its own right) is the only place where registered UK charities can access donated products from the Microsoft Product Catalogue (it also provides donated and discounted products from many other software and hardware vendors)
-
-
-
-
-
-
-
0
-
-
-
Jordan Hackford
The General Data Protection Regulation was first proposed in 2012, and what followed was four years of discussions, debates, and amendments, with the regulation finally adopted by the European Parliament in 2016. Countries, companies, and organisations were given two years to comply, with the regulation being enforced from 25 May 2018. What originally seemed like a reasonable amount of time to prepare has passed quickly, and at the time of this writing, enforcement of the GDPR is barely 3-months away.
-
-
-
-
-
-
-
0
-
-
-
ESP Projects
Tech Trust has this week released a new white paper aimed at illuminating the fact that many charities have no sort of Digital Strategy in place.
What is it About?
The whitepaper provides lots of statistics that Tech Trust have generated during the creation of the whitepaper. The whitepaper is titled “No charity left behind: the need for a digital third sector” and provides information and trends surrounding the information it gathered between September and October 2017.
-
-
-
-
-
-
-
0
-
-
-
ESP Projects
As you will have noticed, ESP Projects has been posting regular content relating to GDPR (General Data Protection). Which comes into force in May 2018. Recently, the Information Commissioner’s Office (ICO) has released new content aimed at charities. Adding to the ever-growing list of resources on its website. The documentation has been added to the Small Business advice and guidance section.
-
-
-
-
-
-
-
26
-
-
-
ESP Projects
As IT Support specialists, we provide tech support to companies of all types and sizes. With this in mind, we thought it would be interesting to end another successful year with a roundup of our 10 most common IT support questions from 2017.
1. I Need to Reset my Password
Failing to log in is among one of the most common IT support issues we are contacted with. The chances are, you’ve forgotten the password and you simply need to reset it. Our team can talk you through the process and provide step by step assistance.
-
-
-
-
-
-
0
-
-
-
Donna Aplin
In part one of this cloud solution article we introduced the the Internet of Things and explored how this concept might be used to improve processes for industry by allowing data to be transmitted between devices in several locations via the cloud. We came up with the idea of taking electronic equipment with associated data output and adding connectivity to it, enabling management and reporting of that data. It would also offer scope for control of said devices remotely, opening up possibilities for engineering support and maintenance without the need for someone to be on site. We thought that Raspberry Pis (mini PC’s) would be the ideal hardware component, that could be used alongside a controller device, adding an element of ‘Smart’ functionality to the equipment or machinery it was attached to. Here we look at the practical implementation of such a solution.
-
-
-
-
-
-
0
-
-
-
ESP Projects
In a previous article, S.O.L.I.D Principles are mentioned but offers no further explanation to what they are. Worry not, for this article aims to cover what they are and what makes them so wonderful.
S.O.L.I.D Principles are an acronym for a design pattern that is adopted in computer science. Whose aim is to make the development of software systems more readable, flexible and easier to maintain in the long run. While they apply to any object orientated language, they can also be heavily utilised in agile methodologies.
-
-
-
-
-
-
26
-
-
-
Donna Aplin
Internet of Things
Many of you will have no doubt come across the term ‘Internet of Things’ (IoT). This is the term applied for the connection of devices (not just computers) over the internet, allowing them to communicate and share information. As a concept, this is something that has been bandied about for many years but its only recently that, due to progressions in technology, has really started to gain momentum.
-
-
-
-
-
-
-
0
-
-
-
Ian Barwick
Last week, the Information Commissioner’s Office (ICO) announced that it had launched a dedicated
-
-
-
-
-
-
26
-
-
-
ESP Projects
What is TypeScript?
‘TypeScript is a typed superset of JavaScript that compiles to plain JavaScript.‘ While that all sounds very fancy, it pretty much boils down to JavaScript, but with lots of added juicy bits.
The Juicy Bits
Recently, new versions of JavaScript became available, but are not currently supported by all major browsers. TypeScript allows us to leverage all the new benefits by allowing developers to write client-side logic in a similar way to server-side logic.
-
-
-
-
-
-
-
0
-
-
-
Donna Aplin
As many of you are now aware the new General Data Protection Regulations (GDPR), which is replacing the current Directive, will take full effect for all Member States on the 28th May 2018. That’s 216 days, 17 hours, 50 minutes and 8….7….6….5….4….3….seconds away. Although there are many articles being published regarding this regulation, there are still many grey areas around GDPR compliance, what must be done, how and where responsibility lies.
-
-
-
-
-
-
-
0
-
-
-
Donna Aplin
In May 2018 the European General Data Protection Regulation will come into force. Organisations that don’t comply with these regulations could face crippling fines and very harmful publicity.
There already are regulations about how we protect sensitive data and these are wrapped up in the 1995 data protection directive, which the Information Commissioner enforces.
-
-