Latest News

      • Too many emails? Here’s four helpful efficiency hacks.

        • 0
      • Jordan Hackford

      If your anything like me your inbox is cram-packed and emails eat up a good portion of your day.  In this post, you’ll learn four efficiency hacks that will help you manage your inbox.  

      • 1 thing your IT backup system could be missing

        • 0
      • Jordan Hackford

      In this day and age backing up your IT system is crucial to the success of your business.   

      There are several reasons you should ensure you have a working backup solution in place for your business’s IT. 

      • Are your employees the biggest threat to your organisation?

        • 0
      • Jordan Hackford

      The weakest link in the chain of a resilient and secure IT system is your employees.

      We’ll be looking closely at why this is and how you can ensure your staff are aware of today’s cyber threats.

      • The biggest Cyber-attacks of 2019 so far

        • 0
      • Jordan Hackford

      Data breaches and cyber attacks are the new normal.

      What can you, as a business owner, learn from some of the biggest companies that have had data breaches?

      In this article, we will be outlining some of

      • The 3 most common email phishing techniques

        • 0
      • Jordan Hackford

      We’re sure you’ll agree when we state that receiving scam & phishing emails are almost a daily occurrence in 2019.

      No matter how good your IT system is, cybercriminals are always finding better ways to bypass IT security systems.

      • Microsoft Software – End of extended support

        • 26
      • Donna Aplin
      As you may already be aware (and you can see from the count-down timer at the top of our website), Microsoft are ending support for many of their legacy pieces of software, including Microsoft Windows 7, Office Suite 2010, SQL 2008 and Server Standard 2008.
      • Cyber Security Breaches: Causes, Effects and Future Planning.

        • 0
      • Taylor Currie
      Early April, the annual ‘Cyber Security Breaches Survey 2019’ was released by the Department of Digital, Culture, Media and Sport. This shows that in the last year, 32% of businesses in the UK experienced cyber security breaches or attacks, hitting 2 out of every 10 charities across the country and seemingly targeting medium to large business and high-income charities.
      • Automated Patch Management from ESP

        • 26
      • Donna Aplin
      An Automated Patch Management solution will fully automate the patch management life-cycle for desktops, laptops and servers on a daily basis. Nowadays, even minor software bugs can lead to major headaches so the importance of implementing a regular patching schedule can’t be underestimated!
      • ESP Projects are now hiring.

        • 26
      • Matthew James
      An opportunity has arisen for a skilled engineer to join our team. The engineer will be working closely with other team members, to provide class leading support to our varied customers during the installation and configuration of IT systems.
      • What is OSSIM?

        • 31
      • Donna Aplin
      OSSIM is an open source network security platform or SIEM (Security Information and Event Management). It is utilised by companies such as Foot Locker, Domino’s and All Pay and is by far the most popular security platform available on the market. OSSIM not only protects a network but can also be configured to help companies reach certain levels of regulation compliancy.
      • What is Patch Management?

        • 26
      • Donna Aplin
      Patch management is pretty much what the name suggests! It is an automated system that manages the system patches that are provided to the systems in use, be it a desktop PC, laptop or a server. An update schedule can be setup and enforced without the users or administrators having to pay granular attention to the update reminders, or chase staff to complete these.
      • The Hidden Cost of Ageing IT Hardware on your Network

        • 27
      • Donna Aplin
      As network and working practices continue to develop, flex and become more fluid, time becomes our precious resource in the modern office. Staff managing large and important amounts of data across multiple sites/projects are often juggling many plates, and the requirement to reduce wasted activities is brought to the forefront. New devices can assist in reducing these challenges, but many businesses are hesitant to upgrade their core network and the end user devices. 
      • 7 Tips for Successful Web Design Projects

        • 26
      • Donna Aplin
      We’ve been involved in hundreds of web projects over the years, and we’ve also helped to pick up the pieces when projects have gone wrong. Here are our 7 top tips for making sure your web project is a successful one...
      • Why should you secure your scaffold?

        • 26
      • Jordan Hackford
      A scaffolding alarm system helps prevent theft of expensive equipment when workers are not on site, and also prevents unauthorized persons gaining access to buildings and roofs that would otherwise be inaccessible.
      • More Spam news, Threatening and Blackmail based extortion

        • 26
      • Matthew James
      There has been another upturn in spam activity, this time a slightly different track to our recent reports where the aim has been to harvest your log on details or infect machines with Malware, this latest round of spam takes a less technological track and flat out blackmail and/or threaten the recipient.
      • Office 365, Moving Beyond Email – Part 2

        • 0
      • Jordan Hackford
      Microsoft Office 365 is used by thousands of people worldwide, professionally and personally. However, a lot of the users only touch the tip of the iceberg when using Office 365. In this blog post, ESP Projects will walk you through some of the additional applications available, covering some of the best products in the software range.
      • Office 365, Moving Beyond Email – Part 1 File Storage and Sharing

        • 26
      • Matthew James
      Office 365 offers far more than just an industry leading email platform. In this series of articles, we seek to investigate other offerings on the platform and how they can benefit you and your organisation, starting with perhaps what is the second biggest business use behind emails – File Storage and Sharing.
      • What are Web Applications?

        • 26
      • Jordan Hackford
      You may have come across the term web applications before today, but are you aware of the many different types of web applications available and how they can benefit your business? In this blog post, we’ll cover all of the basics of what a web application actually is as well as the pros and cons that come with them.
      • Email best practices.

        • 0
      • Matthew James

      One of the weakest points in any security system, whether it be an IT system, or other system, is usually the human operators of that system. There is a whole subset of “hacking Techniques” dubbed “social engineering” where the goal is not to find weaknesses in the technological level of the system, it is to glean information from the end users to enable increased access, or to trick the end user into performing some task on their behalf, we have covered a couple of the methods used here and there.

      • Phishing for Office 365 logon details

        • 0
      • Matthew James

      Over the last week or so we have noticed an increase in Phishing Emails designed to illicit the Office 365 account details from unsuspecting end users. Unfortunately we have seen a couple of end users fall for these and have allowed access to their email system to an outside agent. with these details the Phisher can do anything that you would be able to do with your emails.