• BONGO IT BLOG

What’s New in Window’s 10 - 1809

win10blacktheme

So here we are, waiting for Microsoft to iron out the bugs before we delve into the new exciting features Windows 10 brings to us. Here are those new features in an easily digestable format...

Continue reading
  265 Hits
  0 Comments

The Latest Windows 10 update (1809) - Issues And Features

windowsupdate To Update Or Not To Update

Before going into detail about these bugs the first thing to know is the lifecycle and nomenclature of Windows 10 products. When we talk about updates, we use numbers to identify which one we are talking about, the “code” is a simple one.

Spring update “1803” means March 2018, “1809” is September 2018. You can check which “build” you have in the About section of Settings, under Windows Specifications, Version.

Continue reading
  124 Hits
  0 Comments

Do I Need A Centralised System?

unity

You have been running your business / charity / CIC on mostly free software and are getting by, so do you really need to invest in a "centralised system"?

 

Nb: centralised system in this context means a CRM or suite like Office 365 or G-Suite

 

Does this sound like you?

We run a small charity / business which has organically grown in size to 15 (or more) people. Staff / volunteers all work remotely, use their own computers, and email addresses, to do their work and send us data about our clients. We are worried about compliance with GDPR, and what we can do when we don't own the computers.

Continue reading
  657 Hits
  0 Comments

Having A Bad Week? Have A Bit Of Fun...

Dollarphotoclub_66864404

Try Out These Deliciously Entertaining Google Easter Eggs

 

What Is An Easter Egg, Andrew?

Good question. An Easter Egg is not only a timely chocolate confection but also a hidden or secret area in a game or program, left there for us to stumble upon and amuse ourselves. Google has a few of these dotted around, and here's how to find them...

Continue reading
  358 Hits
  0 Comments

Business Leaders Masterclass: 5 Secrets For Sales Growth by Sandler Training

sandler_training

Business Leaders Masterclass: 5 Secrets For Sales Growth by Sandler Training

 

Last Thursday we were privellieged enough to attend one of Sandler Training's taster sessions. We spend two hours looking at the slaes process, and much of that from the customer perspective.

Continue reading
  377 Hits
  0 Comments

What is PCI Security and why is it important?

What is PCI Security and why is it important?

Payment Card Industry Security is an essential for any online business that uses any kind of debit or credit card to make transactions. The PCI Data Security Standard (or PCI DSS) is a standard for companies that handle (or store) customer credit card details and bank details. In this blog we will explain the benefits of PCI DSS and how you and your company can reach the standard.

Continue reading
  757 Hits
  0 Comments

What Is Cyber Essentials and How can I get secure?

What Is Cyber Essentials and How can I get secure?

The Cyber Essentials scheme was set up by the government and a group of cyber security experts to help many small to medium sized companies become digitally secure against 80% of known cyber threats. In this blog we will explore how Cyber Essentials could help your business, point you to several ways of implementing it, and suggest other things you can do to make your network secure.

Continue reading
  1053 Hits
  0 Comments

What is PCI-DSS Consultancy?

Payment Card Industry Data Security Standard (PCI-DSS)

The Payment Card Industry Data Security Standard (PCI-DSS) is an information security standard for organizations that handle cardholder information. All merchants, whether small or large, need to be PCI compliant. The burden of compliance can be daunting at first, but at Bongo IT we are here to help.

You may have noted that in 2018 some of the Payment Service Providers e.g. Barclacard have tightened their regulations and are now providing more difficult questionaires. If you now find yourself stuck, please speak to one of our team.

 

What is involved

Our first step is to document the cardholder data flow. This allows us to understand how sensitive data flows through your systems, and which parts of those systems need to be scanned. We will then look at reducing the number of systems involved in the flow of cardholder data, to lessen the compliance task.

After filling in the correct questionnaire for your level of interaction with cardholder data, we initiate the scan. The scan tests all the systems through which data flows for basic security vulnerabilities. After rectifying any vulnerability, and re-running the scan until no vulnerabilities remain, compliance is achieved. We will then inform your Payment Service Provider (PSP) that you are compliant. The scan will automatically run every 3 months, and will inform you if you ever drop out of compliance.

Continue reading
  3055 Hits
  0 Comments
  • FREE IT STRATEGY SESSION

  • At Bongo IT, we know that technology is increasingly dominant and crucial to maintaining business performance and productivity.

    Organisations should make sure they are making the right IT decisions for their current needs, whilst also planning for the future with flexible and scalable solutions.

  • As a special offer, we are offering a FREE one hour consultation to address your current IT setup and recommend an effective strategy for your future requirements.

    Addressing issues such as computer hardware, broadband, data security, file sharing, compliance and more, we’ll help you build a plan and ensure you deploy the most cost-effective IT strategy for your company’s needs.

CONNECT WITH US

READ OUR BLOG

So here we are, waiting for Microsoft to iron out the bugs before we delve into the new exciting features Windows 10 brings to us. Here are those new features i...
Before going into detail about these bugs the first thing to know is the lifecycle and nomenclature of Windows 10 products. When we talk about updates, we use n...
You have been running your business / charity / CIC on mostly free software and are getting by, so do you really need to invest in a "centralised system"? ...
As you are probably aware, new laws under the general data protection regulation (or GDPR) are now in full force. In our previous blog we covered two-facto...
Two Factor Authentication (2FA) is a quick and easy way to greatly increase your level of security when logging into your systems. Two factor authenticatio...