Unleashed IT Consultancy Blog

/Unleashed IT Consultancy Blog

Unleashed Guide to Virus Attacks

Why is it that computer users are getting virus attacks by cyber criminals? The short answer is because they can and we make it easy for them. In this article I want to concentrate on Malware or Ransomware attacks. The days of simple malware being developed to cause a bit of mischief have long gone. [...]

IT for Joint Ventures

The construction industry isn't exactly well-known for innovation and technology, certainly the formative years of my career were spent fighting getting technology into my employers. These days' things have changed and even the most modest of site cabins have server rooms, IP telephony and fully-fledged networks which has been fuelled in part by the rise [...]

By | March 15th, 2016|Managed Services, Uncategorized|0 Comments

Secret brain slugs killing businesses

Working in IT, you’re not short of the odd frustration – password resets, telling people to turn it off and on again BEFORE they call you, the worrying trend that people seem to think the IT Department is the ‘operate the IT for you department.” However, my frustrations are starting to be felt in any sector of life, whether buying some furniture or simply dealing with a Tesco delivery. […]

  • Share on Tumblr
By | February 25th, 2016|Grinds my Gears|0 Comments

Help to mitigate cyber attacks

What are cyber attacks? We keep hearing the words, cyber attacks, hacking, viruses, worms and malware. What does it all mean? More importantly, what can be done to help you to mitigate cyber attacks? By taking some simple steps you can  protect your business, protect your data and take steps to prevent these attacks happening to you? [...]

By | February 1st, 2016|Security|0 Comments

What does Brexit mean for UK Data Protection?

Brexit.  Leaving the EU and it’s laws.  As a long time geek I’ve had the principles of the UK Data Protection Act drummed into me since I studied GCSE IT. It is the foundation of how we lay out the responsibility and liability for the care of the personal data we share with companies and other organisations – the data controllers. I should say, I’m not a lawyer, I’m an IT guy come Information Security Practitioner, so I’m trying to get my head around this from a business and technology perspective… […]

  • Share on Tumblr
By | January 13th, 2016|Security|0 Comments

Strange start to 2016! Cyber Essentials and more.

I would like to wish all our regular and new readers a very Happy New Year. It has been a strange start to 2016, we finished off last year relatively quiet, which was nice, but 2016 has gone off like a rocket and long may it continue. Yes, we are still working on a lot [...]

By | January 12th, 2016|Security|0 Comments

Do you value IT?

I have been advising SME's on IT for many years now and from experience, I know they can be split into two categories - Companies that value IT and companies that don't. So the question to you Mr/Mrs Business owner is - Are you realising the investment you have made it IT? or to put [...]

What Makes an IT Strategy Template Effective?

Whether you're a technical luddite or a computer whiz, your business needs an IT strategy. It's just common business sense to outline your plans when it comes to IT in advance, so you're not running around like a headless chicken when it eventually comes to putting elements of your strategy into action. So what can [...]

By | December 7th, 2015|Managed Services, Smarter Working|0 Comments

What are the Benefits of a Data Archive?

We have all heard and probably used the colloquialism “how long is a piece of string,” but in a similar vein we often get asked “how long should we archive data for?” This is a really difficult question and the only answer we can give is “for as long as you're likely to need it.” At [...]

By | December 2nd, 2015|Disaster Recovery|0 Comments

The Importance of Internet Connectivity

Over the last few months, I have done quite a few posts about the benefits of IT Managed Services, Data Storage and Archiving, Disaster Recovery and Backup. But what do all of these solutions have in common, and without such a thing nothing in the wonderful world of IT will work? Very simply, it is your [...]

By | November 26th, 2015|IT Consultancy|0 Comments