Latest News

      • Why should you secure your scaffold?

        • 26
      • Jordan Hackford
      A scaffolding alarm system helps prevent theft of expensive equipment when workers are not on site, and also prevents unauthorized persons gaining access to buildings and roofs that would otherwise be inaccessible.
      • More Spam news, Threatening and Blackmail based extortion

        • 26
      • Matthew James
      There has been another upturn in spam activity, this time a slightly different track to our recent reports where the aim has been to harvest your log on details or infect machines with Malware, this latest round of spam takes a less technological track and flat out blackmail and/or threaten the recipient.
      • Office 365, Moving Beyond Email – Part 2

        • 0
      • Jordan Hackford
      Microsoft Office 365 is used by thousands of people worldwide, professionally and personally. However, a lot of the users only touch the tip of the iceberg when using Office 365. In this blog post, ESP Projects will walk you through some of the additional applications available, covering some of the best products in the software range.
      • Office 365, Moving Beyond Email – Part 1 File Storage and Sharing

        • 26
      • Matthew James
      Office 365 offers far more than just an industry leading email platform. In this series of articles, we seek to investigate other offerings on the platform and how they can benefit you and your organisation, starting with perhaps what is the second biggest business use behind emails – File Storage and Sharing.
      • What are Web Applications?

        • 26
      • Jordan Hackford
      You may have come across the term web applications before today, but are you aware of the many different types of web applications available and how they can benefit your business? In this blog post, we’ll cover all of the basics of what a web application actually is as well as the pros and cons that come with them.
      • Email best practices.

        • 0
      • Matthew James

      One of the weakest points in any security system, whether it be an IT system, or other system, is usually the human operators of that system. There is a whole subset of “hacking Techniques” dubbed “social engineering” where the goal is not to find weaknesses in the technological level of the system, it is to glean information from the end users to enable increased access, or to trick the end user into performing some task on their behalf, we have covered a couple of the methods used here and there.

      • Phishing for Office 365 logon details

        • 0
      • Matthew James

      Over the last week or so we have noticed an increase in Phishing Emails designed to illicit the Office 365 account details from unsuspecting end users. Unfortunately we have seen a couple of end users fall for these and have allowed access to their email system to an outside agent. with these details the Phisher can do anything that you would be able to do with your emails.

      • Do I need to backup in Office 365?

        • 26
      • James Greaves

      I have Office 365, do I still need to backup?

      Office 365 has become more and more popular over the past couple of years and is now used in businesses all over the world. It has become increasingly beneficial to many users improving productivity, reducing costs for hardware and allowing users to access data wherever they might be.

      Due to the data being in the cloud users are led to believe that there is no need to do Office 365 backups. Microsoft do have measures in place to backup and replicate data at their end but basically this is only a simple form of backup and does not actually protect you from human error such as accidental deletion or an employee maliciously deleting data.

      • TT-Exchange & Microsoft Donation Programme Changes

        • 0
      • Taylor Currie

      Microsoft and TT-Exchange (Tech Trust) have announced in the last few days, that some changes to the Donation Programme ran by the partners will be coming into force on 1st April 2018 – just 3 weeks away!

      TT-Exchange (A registered UK Charity in its own right) is the only place where registered UK charities can access donated products from the Microsoft Product Catalogue (it also provides donated and discounted products from many other software and hardware vendors)

      • The Ultimate GDPR Guide

        • 0
      • Jordan Hackford

      The General Data Protection Regulation was first proposed in 2012, and what followed was four years of discussions, debates, and amendments, with the regulation finally adopted by the European Parliament in 2016. Countries, companies, and organisations were given two years to comply, with the regulation being enforced from 25 May 2018. What originally seemed like a reasonable amount of time to prepare has passed quickly, and at the time of this writing, enforcement of the GDPR is barely 3-months away.

      • No Charity Left Behind: The Need for a Digital Third Sector

        • 0
      • ESP Projects

      Tech Trust has this week released a new white paper aimed at illuminating the fact that many charities have no sort of Digital Strategy in place.

      What is it About?

      The whitepaper provides lots of statistics that Tech Trust have generated during the creation of the whitepaper.  The whitepaper is titled “No charity left behind: the need for a digital third sector” and provides information and trends surrounding the information it gathered between September and October 2017.

      • GDPR FAQs for Charities

        • 0
      • ESP Projects

      As you will have noticed, ESP Projects has been posting regular content relating to GDPR (General Data Protection). Which comes into force in May 2018. Recently, the Information Commissioner’s Office (ICO) has released new content aimed at charities. Adding to the ever-growing list of resources on its website. The documentation has been added to the Small Business advice and guidance section.

      • ESP Projects 10 Most Common IT Support Questions of 2017

        • 26
      • ESP Projects

      As IT Support specialists, we provide tech support to companies of all types and sizes. With this in mind, we thought it would be interesting to end another successful year with a roundup of our 10 most common IT support questions from 2017.

       

      1.   I Need to Reset my Password

      Failing to log in is among one of the most common IT support issues we are contacted with. The chances are, you’ve forgotten the password and you simply need to reset it. Our team can talk you through the process and provide step by step assistance.

      • Internet of Things – Cloud Solutions for Industry Part 2

        • 0
      • Donna Aplin

      In part one of this cloud solution article we introduced the the Internet of Things and explored how this concept might be used to improve processes for industry by allowing data to be transmitted between devices in several locations via the cloud. We came up with the idea of taking electronic equipment with associated data output and adding connectivity to it, enabling management and reporting of that data. It would also offer scope for control of said devices remotely, opening up possibilities for engineering support and maintenance without the need for someone to be on site. We thought that Raspberry Pis (mini PC’s) would be the ideal hardware component, that could be used alongside a controller device, adding an element of ‘Smart’ functionality to the equipment or machinery it was attached to. Here we look at the practical implementation of such a solution.

      • S.O.L.I.D Principles

        • 0
      • ESP Projects

      In a previous article, S.O.L.I.D Principles are mentioned but offers no further explanation to what they are. Worry not, for this article aims to cover what they are and what makes them so wonderful.

      S.O.L.I.D Principles are an acronym for a design pattern that is adopted in computer science. Whose aim is to make the development of software systems more readable, flexible and easier to maintain in the long run. While they apply to any object orientated language, they can also be heavily utilised in agile methodologies.

      • Internet of Things – Cloud Solutions for Industry Part 1

        • 26
      • Donna Aplin

      Internet of Things

      Many of you will have no doubt come across the term ‘Internet of Things’ (IoT). This is the term applied for the connection of devices (not just computers) over the internet, allowing them to communicate and share information. As a concept, this is something that has been bandied about for many years but its only recently that, due to progressions in technology, has really started to gain momentum.

      • New GDPR Helpline Launched

        • 0
      • Ian Barwick

      Last week, the Information Commissioner’s Office (ICO) announced that it had launched a dedicated

      • TypeScript: What is it and do I need it?

        • 26
      • ESP Projects

      What is TypeScript?

      TypeScript is a typed superset of JavaScript that compiles to plain JavaScript.‘ While that all sounds very fancy, it pretty much boils down to JavaScript, but with lots of added juicy bits.

      The Juicy Bits

      Recently, new versions of JavaScript became available, but are not currently supported by all major browsers. TypeScript allows us to leverage all the new benefits by allowing developers to write client-side logic in a similar way to server-side logic.

      • GDPR Compliance – Are You Ready?

        • 0
      • Donna Aplin

      As many of you are now aware the new General Data Protection Regulations (GDPR), which is replacing the current Directive, will take full effect for all Member States on the 28th May 2018. That’s 216 days, 17 hours, 50 minutes and 8….7….6….5….4….3….seconds away. Although there are many articles being published regarding this regulation, there are still many grey areas around GDPR compliance, what must be done, how and where responsibility lies.

      • GDPR 2018 – What You Need To Know

        • 0
      • Donna Aplin

      In May 2018 the European General Data Protection Regulation will come into force. Organisations that don’t comply with these regulations could face crippling fines and very harmful publicity.

      There already are regulations about how we protect sensitive data and these are wrapped up in the 1995 data protection directive, which the Information Commissioner enforces.