Articles
Recent hacks: A worrying trend
Ticketmaster and Santander have leaked hundreds of millions of people’s data, its likely that you or your colleagues have been affected.
PDF Guide
Egnyte Admin Guide
This guide is intended to provide a high-level overview of Egnyte’s online file sharing and collaboration features as well as explain some of the basics every Admin needs to know to manage Egnyte successfully.
PDF Guide
Egnyte User Guide
Egnyte helps you collaborate on content with anyone inside or outside your organisation in a simple and secure way. This guide covers all the basics (and more) for storing files in Egnyte and accessing them on any device, anywhere, with ease.
PDF Guide
Cyber Attack Recovery
In this guide, you’ll find 5 steps to making a recovery from a cyber attack. Follow these and react in the best way to save your business from damage and disruption.
PDF Guide
Email security
Email is the one tool every business uses, which makes it the #1 starting point for cyber attacks. In fact, 90% of all attacks start with an email.
Articles
How women shaped IT
Women represent only 16-19% of the UK’s IT workforce, but they’ve made huge contributions to the industry. Let’s celebrate a few of their achievements and inspire a more inclusive and diverse tomorrow!
PDF Guide
The Windows 11 difference
Considering an upgrade? This jargon free guide highlights the main features of Windows 11 that aren’t included in Windows 10.
PDF Guide
Data security threats in 2024
Stay on top of your security measures with a multi-layered approach. Find out how with our 2024 guide to cyber security.
PDF Guide
Home office cybersecurity
Sound cyber security practices are just as important in the home office as the company office. Following our guide is a good starting point.
Articles
What’s new in Microsoft 365?
Microsoft reveals new details about pricing for MS365 Copilot, and is rolling out Sales Copilot and Bing Chat Enterprise
Articles
Introducing Egnyte
We often recommend Egnyte’s cloud collaboration software. Find out what makes it our top choice and how it compares to Microsoft apps!
Articles
The evolution of search
We use search all the time, and it’s constantly evolving. But do you know how it works and how it came to become so advanced?
Articles
The metaverse
The term ‘metaverse’ has been around for a while now, but what exactly is it, and how can businesses take advantage of it?
Articles
Cyber security training
Human error is your biggest security risk, so cyber security training is important. Learn to create a cyber security training program!
Articles
What’s new in Windows (July 2023)
A Teams Payments app, a new and handy feature in the Photos app, smarter notifications, changes to the taskbar, and new options in settings!
Articles
Hidden Gems of Microsoft 365
Most businesses don’t use the full potential of the 365 apps available to them, this guide introduces 20 popular 365 apps.
Articles
Back up your data
Cyber-criminals steal your data and hold it to ransom, but if you’ve backed up your data, you won’t have to worry. Everything you need to know
Articles
Microsoft 365 Copilot
Microsoft is says its AI assistant Copilot is “a whole new way to work”, find out what to expect in this free PDF guide!
Articles
What’s new in Windows 11?
Reach new levels of productivity and keep your Windows knowledge up-to-date with these 10 new features in Windows 11!
Articles
Third Party Cookies
Third-party cookies are a threat to your privacy and security. They can expose your personal data to unknown parties or malicious actors.
Articles
Computer getting hot?
Don’t ignore this often overlooked killer, act before it is too late. This guide includes everything you need to know about overheating.
Articles
Cyber Essentials
A comprehensive guide to Cyber Essentials certification. Find out what exactly it is, the benefits of getting certified, how it works, and how to apply.
Articles
Planning a Major IT Project
A major change to your IT infrastructure or systems requires careful planning. Read this guide before getting started.
Articles
Multi-factor authentication
All businesses should use MFA, without it you are vulnerable to cyber attacks. Microsoft says that 99.9% of hacked accounts don’t use MFA.
Articles
What’s new in Windows 11?
We’ve selected these 5 popular new features of Windows 11 for you to try out. These tricks could change the way you use Windows forever!
Articles
Understanding cloud computing
Do you know your clouds? This non-technical, 2-minute explainer examines 4 types of cloud computing: public, private, hybrid and multi.
Articles
Getting to grips with email security
It’s vital that smaller businesses take email security seriously. Read our handy PDF guide full of email security knowledge and tips.
Articles Blog
How can an external IT support team save you money?
As businesses start to tighten their budgets, IT is often the first thing that takes a hit. Can using an external IT team save you money?
Articles Blog
How to keep your portable devices cyber safe
We are always talking about the importance of keeping your computer secure, but securing your devices is just as important…if not more!
Articles Blog
5 reasons you should send links instead of attachments
Sending files as attachments is still the most commonly used method of file sharing, despite the file limitations and security risks.
Articles Blog
Could EDR be the end of anti-virus?
The integration of Endpoint Detection and Response (EDR) is forecast to increase significantly over the next few years.
Articles
Industries most at risk of a cyber attack
Read the predictions for the industries most at risk of a cyber attack in 2023. Could your business be in danger?
Articles Blog
Staying protected against holiday scams
The travel industry is predicting a huge surge in holiday bookings this year as COVID-19 restrictions relax. To a cyber criminal, this has money signs written all over it!
Articles Blog
10 steps towards bulletproof cyber security
Understand your organisation risks, implement appropriate mitigations and prepare for cyber security incidents.
Articles Blog
5 ways to stay protected when using public WiFi
Public WiFi is the perfect attack vector for a cyber criminal, here’s how to protect yourself!
Articles Blog
Major changes to Cyber Essentials
Cyber Essentials announces first major update in years!
Articles Blog
Cyber Security Checklist 2022
A cyber security checklist makes it easier to protect your business from cyber criminals, using a set of procedures, standards, policies and controls.
Articles Blog
Top 10 Gifts for Tech Lovers
Technology related gifts are topping the searches this year, and with millions of products on the market, it’s hard to choose favourites.
Articles Blog
Keeping your data safe on Black Friday weekend
With Black Friday and Cyber Monday coming up, many of us are preparing to splash the cash and secure some bargains!
Articles Blog
A chat with our cyber security expert
Today we sat down with Oscar, one of LAN Support’s IT technicians, also known as our very own cyber security expert!
Articles Blog
The 3 scariest cyber attacks of all time
It’s Halloween! Do you know what that means? It’s time to talk about some of the scariest cyber attacks of all time.
Articles Blog
What is dark mode and should you be using it?
Have you heard of dark mode? Dark mode can be used on several user interfaces, such as smartphones and laptops.
Articles Blog
Keeping your Microsoft account safe
Check out these tips to keep your account safe, make it easier to recover and strengthen it against possible cyberattacks.
Articles Blog
5 things you should know about an Office 365 backup
Office 365 backups really are an essential part of your IT security, but how much do you know about them?
Articles
Usecure – the automated cyber awareness solution
How can your employees make safer everyday security decisions?
Articles
O365 Monitoring Booklet
Articles
Data Security
Why every business is under dual attack from both hackers and government…
Articles
Email Hijack
How hackers break into your email to plunder your business bank account.
Articles
Cyber Essentials: A Jargon Free Guide
Cyber Essentials is the government-backed cyber accreditation scheme that sets out a standard baseline for cyber security.
PDF Guide
Test Post
Lorem ipsum, dolor sit amet consectetur adipisicing elit. Eius dolor soluta, officiis hic quisquam explicabo, mollitia quod temporibus veritatis repellat sapiente impedit eveniet nisi? Modi aut voluptas quisquam possimus sunt.