For a while now, we have been thinking a lot about what makes a good IT support provider. Not from our view but from our client's perspective. What is important to them in an IT support provider.
On Tuesday Kent Online announced the finalists for this year's KEiBA Awards. It is with great pride that we can say we have been selected as a finalist for the Customer Service Award.
New figures have shown a dramatic increase in business email hacks. The report by Beazley has shown an increase of 133 per cent in what they call 'business email compromises'.
It's an exciting week for us at InfoTech. We are delighted to announce that Darren Strong has been appointed the new Managing Director of InfoTech Solutions (UK) Limited.
As buyers, we like to know the cost of something before we start to buy it.
Usually, that information is readily available, and we know what that cost means. By understanding that cost, we can make an informed decision.
But for a buyer, it's hard to know what a reasonable cost of IT support should be because there isn't the information available to help you make an informed decision.
What is the best way to meet a lot of businesses all at the same time?
Not only do you get to meet all these different businesses you have the opportunity to build a relationship with an actual person.
We are fortunate in the fact that the Kent networking scene is very strong and there are plenty of Kent networking events to choose from.
Businesses have been using Microsoft products for decades. We still rely on Word, Excel and even PowerPoint just as much as we used to years ago.
But in recent years Microsoft has added more products to their office suite. Because of that you now have a choice between the relatively new Microsoft Office 365 and the latest version of the traditional office suite, Microsoft Office 2019.
Social engineering is now the third most common form of business fraud in the UK.
This cybercrime tactic is becoming more popular because in many cases it is easier to manipulate human behaviour than it is to hack into a system. You don't have to be a sophisticated hacker to be able to get someone to click on a link they shouldn't click.
Technology products work in cycles, so as a new product arrives the older version begins to be phased out. That can be hard on a business that is using a product that works perfectly well for them but has to replace it because it has reached end of life.
Please leave your comments below