Blog

Have I been pwned?

(Pronounced poned or pawned) Want a fright? Go to Have I Been Pwned and enter your email address. Click “pwned”? Take a deep breath and don’t panic because most, if not all, of your email addresses will result in, “Oh no — pwned!”, which means your email address has been compromised in a data breach … Read more

Own a domain?

(And you almost certainly do!) Make sure you have control… Your domain is the most important aspect of your online presence. It controls who can get to your website, your email and your blog! It is your address on the web and ‘points’ to your website just as your physical address points to your premises. … Read more

Benefits of Contract Hire

I think it’s safe to say that every business requires help with services which they themselves aren’t specialists in! For instance, most businesses have both an outsourced legal and financial services contact – and trust, competence and respect is vital for these supplier relationships to continue. As an IT engineer I’ve worked in the business … Read more

Understanding VoIP…

VoIP is an acronym for voice over internet protocol, so a VoIP phone call is made and received over the internet instead of traditional analogue lines. When I talk about VoIP to people they often have two impressions: either Skype (or a similar ‘free’ internet app), or a pricey Cisco or Avaya system that costs … Read more

Keep IT Simple, Stupid!

When we think about the word ‘simple’ we often think of easy, or not particularly functional. But when it comes to your computer system, this definition is most definitely a misnomer because keeping it simple can greatly improve efficiency and overall productivity. The key to simplicity is not to reduce the functionality of a system … Read more

Communication or obfuscation?

Technology has changed our lives immeasurably, especially in the way we choose to communicate with each other because, yes siree, we have so very many choices to choose from. 100 years ago most people would send letters, which could take days, to communicate with one another. Even 20-30 years ago the phone call was the … Read more

Breach? What breach?

Let’s start off with a quiz. What software version of your email server do you use? Is it the latest? What remote access do you provide? Do you keep track of who logs in and when? Do you know what virtual doors you have open to the outside world? I think by now we’ve all … Read more