The "secure" Wi-Fi standard has a huge flaw making millions of people at risk, including you! WPA-2 is the defacto standard security protocol for wireless devices like your phone, and router. If you have ever set up a Wi-Fi network you will have ticked the WPA2 box, either by default, or by recommendation.
Office 2019 was announced on the 26th of September during Microsoft Ignite at the most recent TechEd event. New features were advertised and improvements to PowerPoint and Excel were revealed. We predict that Office 2019 will include a few or even many features of EMS, Microsoft Enterprise Mobility and Security.
If you're buying a new PC or laptop for the first time in a while, then you may need to look out for a few things. Buying online from "Build your own PC" websites can seem like a daunting task if you're not used to them but you should also be aware when buying in store.
Phishing is one of the most common and consistently used forms of online scams. These scams target users and attempt to find out their personal data. This kind of personal attack is based on deception, much like many real-life scams and frauds. Often no viruses are used and it all falls to the fault of the user, which makes them particularly dangerous.
With the idea of having a "Smart Home" becoming ever more popular, many businesses are looking to modernise their offices into "Smart Offices". The level of convenience at home that is created by products such as Google Home and Amazon's Alexa makes many wish for a more automated and up to date working environment. In a 2016 Study by Dell more than 50% of employees questioned said that they expect to be working in a smart office in the next five years. 82% of millennials questioned in the same study said that the level of workplace tech influences the chance that they'll take the job. So what is a Smart Office and how does it have such an effect?
Windows 10 is a great operating system for both personal and business use. But if you are using an older machine or even one upgraded from Window's 7 it may slow down over time. The more software, documents, images, etc. that are added onto your machine the more weighed down it will become. If you want to try to avoid buying a whole new machine, then follow this guide on simple tips and tricks for how to improve your computers performance.
For every operating system there comes a time in its life where Microsoft deems it too old for continued support. This is called "End Of Life" (EOL) for an operating system. Operating systems often last a very long time, compared to the average computer and so you may find that even after a new OS has been released you still prefer your older one. This is perfectly fine but after two or three operating systems have been released since the release of your currently used one, then it may be nearing its EOL.
Outlook Customer Manager is being released worldwide in the coming months, or sooner for Office 365 Premium users who opted into it. Free for Office 365 Premium users, this new addition to Outlook makes it easier to manage the relationships you have with your customers. Outlook Customer Manager shows you all your business dealings, meetings, e-mails and conversations organised by contact. This addition to Office 365 comes in the form as an addition to Outlook, therefore only needing an update, not an install of additional software. This will allow you to quickly pick up the addition to Outlook and work with it without having to learn any new tools.
Payment Card Industry Security is an essential for any online business that uses any kind of debit or credit card to make transactions. The PCI Data Security Standard (or PCI DSS) is a standard for companies that handle (or store) customer credit card details and bank details. In this blog we will explain the benefits of PCI DSS and how you and your company can reach the standard.
The Cyber Essentials scheme was set up by the government and a group of cyber security experts to help many small to medium sized companies become digitally secure against 80% of known cyber threats. In this blog we will explore how Cyber Essentials could help your business, point you to several ways of implementing it, and suggest other things you can do to make your network secure.
Voice over IP (VoIP) telephony has been gaining traction for some years now, but many businesses have yet to take advantage of SIP trunking, a technology essential for the full realisation of the benefits of VoIP and other tools.
SIP (Session Initiation Protocol) is a communications protocol designed specifically for multimedia communications running over Internet Protocol (IP) networks, such as the typical company network, and the Internet itself. It is most commonly used to underpin VoIP, video call and instant messaging applications.
With the end of the final TV debate of the 2016 US election, what is left that could change the results of the November vote? Analysts claim that Facebook’s "I Voted" button could have a potential influence over voter turnout. The so-called "Voter Megaphone" allows you to show that you have voted and see if your friends on Facebook have also voted. But by how much could it change the Presidential race in the US and its polls?
Millions of people have recently found out that they not only have a Yahoo account but also that it has been hacked. Many large companies such as BT use Yahoo to base e-mail accounts for their customers. Anyone with an email address ending with "@btinternet.com", "@btopenworld.com" or "@talk21.com" could have been indirectly hacked and their details leaked.
"Without the superb help I recieved from Justin and Andrew at Bongoit, I would not have been able to regain ownership of my businesses online presence."
"6 months ago a contractor who worked at my family business attempted to steal it from me. By the time we caught him out and involved the police he had stolen our domain name, goode review account authority, controlled a website in my business name and was passing himself off online as the business owner. This had a devastating effect on my customer retention and the ability for prospective customers to even find my phone mumber.
Without the superb help I recieved from Justin and Andrew at Bongoit, I would not have been able to regain ownership of my businesses online presence. At every stage they were key in providing the help and support I needed. No matter how busy they were, what time of day or how little notice they recieved, they were there, on the phone and ready to talk my solicitors through aburdly complicated internet/legal jargon and provide expert testimony that without doubt was the deciding factor ond turned the tide.
At Bongo IT, we know that technology is increasingly dominant and crucial to maintaining business performance and productivity.
Organisations should make sure they are making the right IT decisions for their current needs, whilst also planning for the future with flexible and scalable solutions.
As a special offer, we are offering a FREE one hour consultation to address your current IT setup and recommend an effective strategy for your future requirements.
Addressing issues such as computer hardware, broadband, data security, file sharing, compliance and more, we’ll help you build a plan and ensure you deploy the most cost-effective IT strategy for your company’s needs.