Show

PDF Guide

Email security

Email is the one tool every business uses, which makes it the #1 starting point for cyber attacks. In fact, 90% of all attacks start with an email.

View PDF

Articles

How women shaped IT

Women represent only 16-19% of the UK’s IT workforce, but they’ve made huge contributions to the industry. Let’s celebrate a few of their achievements and inspire a more inclusive and diverse tomorrow!

View PDF

PDF Guide

The Windows 11 difference

Considering an upgrade? This jargon free guide highlights the main features of Windows 11 that aren’t included in Windows 10.

View PDF

PDF Guide

Data security threats in 2024

Stay on top of your security measures with a multi-layered approach. Find out how with our 2024 guide to cyber security.

View PDF

PDF Guide

Home office cybersecurity

Sound cyber security practices are just as important in the home office as the company office. Following our guide is a good starting point.

View PDF
decorative graphic

Articles

What’s new in Microsoft 365?

Microsoft reveals new details about pricing for MS365 Copilot, and is rolling out Sales Copilot and Bing Chat Enterprise

VIEW PDF
decorative graphic

Articles

Introducing Egnyte

We often recommend Egnyte’s cloud collaboration software. Find out what makes it our top choice and how it compares to Microsoft apps!

VIEW PDF
decorative graphic

Articles

The evolution of search

We use search all the time, and it’s constantly evolving. But do you know how it works and how it came to become so advanced?

VIEW PDF
decorative graphic

Articles

The metaverse

The term ‘metaverse’ has been around for a while now, but what exactly is it, and how can businesses take advantage of it?

VIEW PDF
decorative graphic

Articles

Cyber security training

Human error is your biggest security risk, so cyber security training is important. Learn to create a cyber security training program!

VIEW PDF
decorative graphic

Articles

What’s new in Windows (July 2023)

A Teams Payments app, a new and handy feature in the Photos app, smarter notifications, changes to the taskbar, and new options in settings!

VIEW PDF
decorative graphic

Articles

Hidden Gems of Microsoft 365

Most businesses don’t use the full potential of the 365 apps available to them, this guide introduces 20 popular 365 apps.

VIEW PDF
decorative graphic

Articles

Back up your data

Cyber-criminals steal your data and hold it to ransom, but if you’ve backed up your data, you won’t have to worry. Everything you need to know

VIEW PDF
decorative graphic

Articles

Microsoft 365 Copilot

Microsoft is says its AI assistant Copilot is “a whole new way to work”, find out what to expect in this free PDF guide!

VIEW PDF
decorative graphic

Articles

What’s new in Windows 11?

Reach new levels of productivity and keep your Windows knowledge up-to-date with these 10 new features in Windows 11!

VIEW PDF
decorative graphic

Articles

Third Party Cookies

Third-party cookies are a threat to your privacy and security. They can expose your personal data to unknown parties or malicious actors.

VIEW PDF
decorative graphic

Articles

Computer getting hot?

Don’t ignore this often overlooked killer, act before it is too late. This guide includes everything you need to know about overheating.

VIEW PDF
decorative graphic

Articles

Cyber Essentials

A comprehensive guide to Cyber Essentials certification. Find out what exactly it is, the benefits of getting certified, how it works, and how to apply.

VIEW PDF
decorative graphic

Articles

Planning a Major IT Project

A major change to your IT infrastructure or systems requires careful planning. Read this guide before getting started.

VIEW PDF
decorative graphic

Articles

Multi-factor authentication

All businesses should use MFA, without it you are vulnerable to cyber attacks. Microsoft says that 99.9% of hacked accounts don’t use MFA.

VIEW PDF
decorative graphic

Articles

What’s new in Windows 11?

We’ve selected these 5 popular new features of Windows 11 for you to try out. These tricks could change the way you use Windows forever!

VIEW PDF
decorative graphic

Articles

Understanding cloud computing

Do you know your clouds? This non-technical, 2-minute explainer examines 4 types of cloud computing: public, private, hybrid and multi.

VIEW PDF
decorative graphic

Articles

Getting to grips with email security

It’s vital that smaller businesses take email security seriously. Read our handy PDF guide full of email security knowledge and tips.

VIEW PDF
decorative graphic

Articles Blog

How can an external IT support team save you money?

As businesses start to tighten their budgets, IT is often the first thing that takes a hit. Can using an external IT team save you money?

Read more
decorative graphic

Articles Blog

How to keep your portable devices cyber safe

We are always talking about the importance of keeping your computer secure, but securing your devices is just as important…if not more!

Read more
decorative graphic

Articles Blog

5 reasons you should send links instead of attachments

Sending files as attachments is still the most commonly used method of file sharing, despite the file limitations and security risks.

Read more
decorative graphic

Articles Blog

Could EDR be the end of anti-virus?

The integration of Endpoint Detection and Response (EDR) is forecast to increase significantly over the next few years.

Read more
decorative graphic

Articles

Industries most at risk of a cyber attack

Read the predictions for the industries most at risk of a cyber attack in 2023. Could your business be in danger?

Open PDF
decorative graphic

Articles Blog

Staying protected against holiday scams

The travel industry is predicting a huge surge in holiday bookings this year as COVID-19 restrictions relax. To a cyber criminal, this has money signs written all over it!

Read more
decorative graphic

Articles Blog

10 steps towards bulletproof cyber security

Understand your organisation risks, implement appropriate mitigations and prepare for cyber security incidents.

Read more
decorative graphic

Articles Blog

5 ways to stay protected when using public WiFi

Public WiFi is the perfect attack vector for a cyber criminal, here’s how to protect yourself!

Read more
decorative graphic

Articles Blog

Major changes to Cyber Essentials

Cyber Essentials announces first major update in years!

Read more
decorative graphic

Articles Blog

Cyber Security Checklist 2022

A cyber security checklist makes it easier to protect your business from cyber criminals, using a set of procedures, standards, policies and controls.

Read more
decorative graphic

Articles Blog

Top 10 Gifts for Tech Lovers

Technology related gifts are topping the searches this year, and with millions of products on the market, it’s hard to choose favourites.

Read more
decorative graphic

Articles Blog

Keeping your data safe on Black Friday weekend

With Black Friday and Cyber Monday coming up, many of us are preparing to splash the cash and secure some bargains!

Read more
decorative graphic

Articles Blog

A chat with our cyber security expert

Today we sat down with Oscar, one of LAN Support’s IT technicians, also known as our very own cyber security expert!

Read more
decorative graphic

Articles Blog

The 3 scariest cyber attacks of all time

It’s Halloween! Do you know what that means? It’s time to talk about some of the scariest cyber attacks of all time.

Read more
decorative graphic

Articles Blog

What is dark mode and should you be using it?

Have you heard of dark mode? Dark mode can be used on several user interfaces, such as smartphones and laptops.

Read more
decorative graphic

Articles Blog

Keeping your Microsoft account safe

Check out these tips to keep your account safe, make it easier to recover and strengthen it against possible cyberattacks.

Read more
decorative graphic

Articles Blog

5 things you should know about an Office 365 backup

Office 365 backups really are an essential part of your IT security, but how much do you know about them?

Read more
decorative graphic

Articles

Usecure – the automated cyber awareness solution

How can your employees make safer everyday security decisions?

Download (PDF)
decorative graphic

Articles

O365 Monitoring Booklet

Download (PDF)
decorative graphic

Articles

Data Security

Why every business is under dual attack from both hackers and government…

Download (PDF)
decorative graphic

Articles

Email Hijack

How hackers break into your email to plunder your business bank account.

Download (PDF)
decorative graphic

Articles

Cyber Essentials: A Jargon Free Guide

Cyber Essentials is the government-backed cyber accreditation scheme that sets out a standard baseline for cyber security.

Download (PDF)

PDF Guide

Test Post

Lorem ipsum, dolor sit amet consectetur adipisicing elit. Eius dolor soluta, officiis hic quisquam explicabo, mollitia quod temporibus veritatis repellat sapiente impedit eveniet nisi? Modi aut voluptas quisquam possimus sunt.

VIEW PDF
Starter Plans Advanced Plans Not for profit
See Our Plans
X