Hosted Exchange White Paper
Many clients have asked us the pros and cons of an in-house hosted exchange vs. a cloud based system, so we have put together a whitepaper outlining the main differences.
Many clients have asked us the pros and cons of an in-house hosted exchange vs. a cloud based system, so we have put together a whitepaper outlining the main differences.
Put simply Cloud Computing is just computing based on the internet, via remote servers. This means that the power of your computer at home or work has no limiting effect on what software you can use. It also means that rather than downloading and installing programs and applications directly to your computer, they are stored on servers which are accessible through the internet.
As we enter the New Year there is always a rush to establish what we learned from the previous year and report it. 2015 is no exception and a recent report on the BBC newsbeat website gives a stark warning to all IT professionals about allowing users to set their own passwords as they have published the 2015 most popular passwords list.
As we start the new year, we’ve been taking a look through the technical press to see what the key predictions are for IT security this year.
We’re all coming up to our Christmas shutdown and so we thought it would be a good idea to recap some suggestions for IT security over the holiday. Here are some important things you need to think about before you lock the door and head off home:
If you’ve recently started having problems with your email and are running Microsoft Outlook 2010 then it may be because they had a product update on the 8th December {December 8, 2015, update for Outlook 2010 (KB3114409)}.
It may not be obvious to everyone, until they stop and think about it, but the PC market is contracting. Some news portals are giving figures of a contraction of 11% in the 3rd quarter of 2015.
Every now and then something happens that proves all of the warnings IT suppliers make about back-ups and data protection are not just overblown efforts to sell their IT support services. A burglary last week proved to be one of them.
This week we take a look at some recommendations received from two trusted sources to see how they are helping with the fight against Cyber Crime.