fbpx

A new computer is a significant investment for any business, large or small. Many companies end up using older systems for longer than they would like because they want to get their money’s worth out of the purchase.

Do you find yourself banging on your keyboard in frustration? Have you tried every tip and trick you found online, only to still struggle with a slow PC?

There are some great upgrades you can do that won’t cost as much as a new computer, and they’ll make your PC feel like new again.

Computer speed upUPGRADE TO A SOLID-STATE DRIVE (SSD)

The price of solid-state drives has decreased significantly in recent years, making them a budget-friendly upgrade that can help speed up an older computer.

HDDs have moving parts, while SSDs do not. SSDs use flash memory, which allows for quicker response time. This results in faster boot times and smoother performance when opening files and applications.

Some of the advantages of upgrading your computer’s hard drive to SSD include:

  • SSD read/write speeds up to 2500 MB/second compared to HDD at up to 200 MB/second
  • SSD access time of 0.1ms as compared to HDD at 5.5-8.0ms
  • SSDs use between 2-5 watts of energy compared to HDD at 6-15 watts

INCREASE THE RAM (MEMORY)

One low-cost upgrade that can lead to significant performance gains is a memory upgrade. If your PC only had 4GB of RAM when you bought it, you’re likely to have trouble opening too many tabs in your browser or using any graphics-heavy program.

Adding more RAM to your computer can make a big difference in its speed and performance. If your PC has available memory slots, upgrading to 8GB or 12GB of RAM can make it feel like you have an entirely new computer.

GET A PROFESSIONAL COMPUTER TUNE-UP

Online PC cleaners might not provide the same level of tune-up as a professional IT provider. We will deep clean your system by eliminating all the duplicate files, repairing internal errors, and checking the Windows Registry for any issues. This will help to speed up your system and keep it running smoothly.

We can also check for failing parts and provide guidance on your most impactful upgrade options.

GET HELP IMPROVING YOUR COMPUTER’S PERFORMANCE TODAY!

Don’t struggle with an older PC! We can help you with cost-effective upgrade options that will fit your system and budget perfectly. Call us on 01543 889 444

Protect Yourself From Phishing Attacks

Phishing attacks remain a major concern for businesses worldwide, they are the main delivery method for all types of cyberattacks. In 2020, 75% of companies experienced at least one phishing attack. 

These attacks can have devastating consequences for a business, ranging from data breaches to ransomware attacks. Businesses must remain vigilant in their efforts to protect themselves from any kind of Cyber Attack. 

Phishing is an attack that uses fraudulent emails and usually websites to trick individuals into revealing sensitive information or infecting their devices with malware.

Mobile threats have increased dramatically in recent years, with a 161% increase in 2021 alone.

Here are a few things you can do to protect yourself from this type of attack:

  • Use email filtering to screen out suspicious messages.
  • Use DNS filtering to block malicious websites.
  • Use next-generation antivirus and anti-malware software.
  • Stay up to date on cybersecurity trends and educate yourself on how to spot phishing attempts.

PHISHING VIA TEXT MESSAGE

A greater number of people are less suspicious of text messages than emails.

Although smishing attacks are increasing, cybercrime entities are still taking advantage of the easy availability of phone numbers. By using text messages to deploy phishing attacks, they are able to target a larger audience.

A popular phishing campaign in 2022 is via text messages. More people are now used to receiving text messages than in the past, especially from retailers and service businesses. They push text updates for sales and delivery notices, which has enabled people’s guard to be lowered. 

The goal of the attack is to capture personal data, when a user clicks on a link included within a text message.  The link within the message will redirect the user to a genuine looking website.

The website you’re redirected to will look official and contain a contact form. Once you submit your personal details to the contact form. The hackers have your credentials. 

EMAIL COMPROMISE IS ON THE RISE

Ransomware has become a bigger threat in recent years because it’s a lucrative source of income for criminal groups that launch cyberattacks. A new, up-and-coming form of attack is also becoming quite profitable, and so is growing in popularity.

(Business email compromise – BEC) scams are also on the rise and costing businesses millions each year. These scams typically involve attackers posing as staff members in an attempt to trick employees into making Bank Transfer requests or gift card purchases.

The danger of BEC is when criminals gain access to email accounts, they have the ability to send phishing messages that appear very convincing to employees, customers, and vendors. 

Potential victims in most cases will automatically trust the known email address, making these emails highly effective tools for cybercriminals.

SMALL BUSINESSES ARE BECOMING MORE FREQUENT TARGETS OF SPEAR PHISHING

No business is too small to be targeted by hackers. Many small businesses are targeted because they often have less sophisticated IT security systems than larger companies.

Spear phishing is a more dangerous form of attack because it’s targeted. A spear phishing attack using BEC is tailored to the specific individual or organization being targeted.

Spear-phishing used to be more commonly used against larger companies, as it takes considerably longer to set up a targeted and tailored attack. However, large criminal groups and government-assisted hackers have made their attacks more efficient, they are now able to target most businesses with ease. 

Small businesses are becoming targeted more frequently by these types of attacks that are more difficult for their users to identify as scams.

MORE BUSINESSES ARE BEING IMPERSONATED RECENTLY

Attackers have become increasingly skilful at impersonating businesses in order to dupe users into clicking on malicious links or attachments. The most popular method is, sending emails that appear to come from legitimate companies that the user may be familiar with.

Amazon is a common target for business spoofing, but it also happens to smaller companies. There have been examples of website hosting companies having client lists breached, and the cybercriminals have then sent emails impersonating the hosting company. 

The emails asked users to log in to an account to fix an urgent problem.

IS YOUR COMPANY’S DATA PROTECTED FROM THIS STYLE OF ATTACK?

When it comes to protecting your business, it’s important to use a multi-layered approach. Start with a cybersecurity audit to review your current security measures and identify ways to improve.

We’ve done this for numerous companies within Staffordshire, please get in touch with us today to find out how we can help. 

Call us today on 01543 889 444 to see how we can protect your business.


Cyber Security Staffordshire

The 3 Cyber Security Vulnerabilities You Need to Ensure Your Business Doesn’t Have

You need to take cyber security seriously, regardless of the size of your business. Criminals are targeting both small and large businesses, and you need to check for any weaknesses in your security regularly. Here are 3 Cyber Security Vulnerabilities you need to ensure your business doesn’t have.

Summary

  • Check your Antivirus software regularly and keep it up to date
  • Do you have Weak Login Credentials / have any of your accounts been compromised
  • Lack of Ransomware Protection

VULNERABILITY #1 – LACK OF ENDPOINT SECURITY

Many businesses don’t have or regularly check their endpoint security solutions such as antivirus programs. This leaves their business susceptible to cyber attacks such as ransomware and malware.

Some endpoint solutions rely on virus definitions or signatures to detect an attack. Some out of date software is often inadequate.

Many cyber criminals can bypass definitions quickly and undetected. Some solutions don’t monitor for unexpected and unusual behaviour that typically happens during a cyber attack.

The best way to combat these issues is to invest in an endpoint solution that involves next-generation antivirus, response and behavioral analysis.

What is Endpoint Security?

Endpoint security Is when you secure the endpoints and / or entry points of devices such as desktops, Laptops and mobile devices etc. It has evolved a lot since the more traditional anti virus solutions of the past. It provides a more sophisticated approach when it comes to malware and ransomware.

As virus threats get more sophisticated, it’s good practice to implement this level of protection. The new systems are designed to detect, analyse and block suspicious activity while they are in progress.

Please get in touch if you would like to know more or have any questions about Endpoint Security.

VULNERABILITY #2 – COMPROMISED OR WEAK CREDENTIALS

Cyber Security Staffordshire

Cyber criminals can easily compromise your Username and Password if you haven’t got the right protection in place. For instance, an unsuspecting team member may fall victim to a phishing email and enter their login information into a fake website.

With these compromised credentials, an attacker can gain access to your business data.

There are a number of ways to combat this, such as by enabling MFA (Multi Factor Authentication) on your systems. MFA provides an extra layer of security.

It ensures that users are who they say they are by requiring two pieces of information in order to sign in. This is usually their password and an additional verification, such as a one time access code, in order to login.

Even if the password is compromised, the chances of the additional verification factor also being compromised is very low.

What is Multi Factor Authentication?

When you sign into any account online, you usually go through a process called authentication. Effectively proving your identity to the website you’re logging into. For many years this has been achieved by using a username and a password.

This is however a very insecure method of authentication. That’s why now almost every bank, some social media websites and online stores use additional authentication.

You may hear Multi Factor Authentication called Two-Step verification or Multifactor authentication. They all work the same way. You still login using your username and password but there is an additional layer of security. This can be a pin number text to your mobile phone or a unique code generated by a separate application.

VULNERABILITY #3 – LACK OF RANSOMWARE PROTECTION

Ransomware is the name given to a cyber attack, where the cyber criminals attack your system and network and encrypt your files making them inaccessible.

This can cause chaos for small and large businesses. In 2017 a notorious ransomware attack called “WannaCry Outbreak” cost the UK £92 million and global costs in the region of 6 billion. This also affected the NHS and all of their computer systems were brought to a standstill.

Even though victims paid the ransom all of the data was virtually unrecoverable. So it’s not just ransomware protection you need. It’s a redundancy plan to make sure all of the data is backed up elsewhere and is accessible in the event of a cyber attack.

The majority of victims in these types of attacks are told to pay the ransom using a crypto currency such as bitcoin. They will then send a passcode, allowing you to get back into your system and files.

Make sure you have software and processes in place to prevent these kinds of attacks. Ensure your systems are up to date with the latest updates installed, ensure you are using a modern endpoint security solution and a working backup solution to ensure you’ve got something to fall back to if the worst should happen.

What is Ransomware?

Ransomware is a type of Malware that adds encryption to a victims files and information. Any data on your computer or network can be compromised. This then stops the IT admin or users from being able to access any critical data.

You wouldn’t be able to access any files, databases or programmes on your devices. It does this by using asymmetric encryption. This is a type of cryptography that generates a pair of keys allowing you to encrypt and decrypt files. The hacker generates a unique key which is given to the victim when the ransom has been paid.

Most ransware is distributed via emails or more targeted attacks. In most cases, once your computer has been compromised. It will give you between 24/48hrs to pay the ransom allowing you to gain access to your data.

HERE TO HELP

Anyone running a successful company should have the steps above in place. To ensure your business isn’t a sitting duck for cyber criminals, by implementing reliable defense strategies and keep. So if you’re looking for assistance with your Cyber Security and based in Staffordshire. Reach out to us for a quick, no obligation chat to see how we can protect your business from cyber attacks. Call us on 01543 889 444


Windows 11 – Your questions answered

Microsoft’s latest operating system is here. But before upgrading your current systems, read this first.

After six years, Microsoft has released it’s new operating system, Windows 11. With technology playing an important role in our lives and businesses, Microsoft’s answer to this growing demand for better technology at home and in business is Windows 11.

We’ve compiled a list of five frequently asked questions about Windows 11 and set about answering them.

1. What’s the difference between Windows 10 and Windows 11?

Windows 11 gets a major boost in performance, functionality and style compared to previous versions of Windows.

  • A new makeover: If you’ve used macOS before, you may see some similarities between Windows 11 and macOS. The taskbar is now centered, tightly rounded corners and new icons just to name a few.
  • New Teams integration: With hybrid working becoming normal, Microsoft integrated Teams into the operating system, making it easier for you to communicate with family, friends and colleagues.
  • Android apps on your PC (coming soon):  Microsoft has announced native support for Android apps within Windows 11. However, this feature will not be available until 2022.

2. What are the system requirements to run Windows 11?

To run Windows 11, you need:

  • At least a 1GHZ dual-core processor
  • 4 GB of RAM
  • At least 64 GB of storage
  • A graphics card compatible with DirectX 12 or later, with a WDDM 2.0 driver
  • 720p display, at least 9” diagonal size, with 8 bits per colour channel
  • TPM version 2.0
  • UEFI, Secure Boot capable firmware

Your processor also needs to be on the supported hardware list, which can be found here.

3. Does it come with Microsoft Office?

No, you will need a valid Microsoft Office license.

But if you have an existing Microsoft 365 subscription, then you are ok. You just need to install Office after upgrading to Windows 11.

Side note: support for older versions of Office, such as Office 2010, ended last year. So if you are still using an older version of Office, we suggest you upgrade to Microsoft 365.

4. How can I upgrade to Windows 11?

If you want to upgrade to Windows 11, you have nothing to worry about. Simply go to Windows Update section within Settings and click check for updates. If your PC is compatible with Windows 11, it’ll be available in the upgrade section. Click ‘download and install’, and then sit back and wait.

5. Do I really need to switch to Windows 11?

If your PC or laptop isn’t compatible, then you don’t have to upgrade, Windows 10 will be supported by Microsoft until 2025.

If on the other hand, your PC is compatible with Windows 11, the choice is yours. Some people like change, while others hate it. We personally love Windows 11.

If you need help understanding the pros and cons of switching to Windows 11, give us a call on 01543 889 444 or contact us here


Your Never Too Small for Managed IT Support

A small to medium size business may only have a handful computers and having an in-house person dedicated to IT support may be overkill. Everything is working fine at the moment but is it performing at its best, but at some point, things will crash and stop working. That’s why it can be beneficial to outsource IT.

Having someone who knows technology working for your team can pay huge dividends and add value by:

  • Providing knowledgeable support and IT help
  • Identifying where you can be more efficient with the tools you already have which can save money
  • Learning business needs and making recommendations about the best IT needs for your company
  • Helping you avoid bad tech purchases or buying software you don’t need
  • Protecting your business technology and ensuring your computers are up to date with the latest security

Small business Breaches

You don’t have to have a large business to attract the unwanted attention of cyber-criminals, in fact a small business can be a particularly appealing target.

According to Accenture 43% of cyber-attacks were aimed at small businesses and only 14% of small businesses were prepared for these attacks on their networks and sensitive data. In fact hackers will exploit a small business as part of their campaign to attack a larger business, as they know the smaller business is less likely to have the same level of security as the bigger businesses. According to insurance carrier Hiscox the average cyber-attack costs a business £200,000 which can be a killer blow for a small business. Some 60% of small businesses that are hacked go out of business within six months, even if they can survive the financial damage along with brand reputation and customer goodwill is devastating.

Outsourced ITAdvantages of Outsourced IT

You may not have a clear picture of your cyber-security status right now but by working with a SJH Computing & Technical Services you will get one. We will conduct an informal audit of your current technology and needs.

For instance, your business may not have a data protection procedure or you may think you don’t have a lot to back-up. Can you recover if your business losses an email chain it was keeping for legal or compliance reasons? What would happen if the computer holding all your accounting suddenly died? We can identify all these problem areas and recommend appropriate solutions.

We will make an inventory of all your tech assets and ensure you are compliant with protecting your customers data, employee records, confidentiality, availability, and ensure the security of the business’s intellectual property.

The cost of outsourcing can be a stumbling block to a small business but managed IT services can often lower costs by streamlining processes and ensuring that the business technology is best suited to current needs and if the worst does happen they are only a phone call away to help.

If you would like to know more about outsourcing your IT needs give us a call on 01543 889 444


IT Support Lichfield – Managed IT Support Lichfield

Need IT Support and based in or around Lichfield? We provide fantastic IT Support for small & medium businesses.

IT Support LichfieldAny business operating in this modern world will fail to stay competitive if it ignores technological advancements. For small and medium sized companies, hiring a team of IT employees does not fit with their budget constraints. When it comes to IT support for small businesses we offer a solution.

We’ll discuss your current IT Support, your business goals and how we can help you maximise your technology solutions investment. We can setup a solution so you can continue working as normal, even in the event of a crisis.

We provide on-going support for businesses in many different sectors with flexible support options including on-line remote support, telephone calls and being local, good old fashioned site visits! We pride ourselves on solving problems so quickly; it’s often before they arise thanks to our system and machine monitoring and update services. You can find out more about our company by visiting our about us page.

Just a handful of the services we offer are;

  • Business IT Support
  • Office 365 setup / management
  • IT Security
  • Cloud backup
  • Operating System Upgrades

You can see a full list of our IT services here.

We are an IT company focused on not just fixing your IT problems, but on helping you achieve your business goals – whether that is to grow your business, increase efficiency, or reduce risk.  Get clear, plain language explanations and not the techy jargon which may cause clarity issues, We’ll never try to baffle you with science.

Cyber Security

What is Cyber Security? It’s the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyberattacks.

The threat of virus, malware and ransomware is real, and the effects can be devastating to any business. A single infection can bring down an entire business causing loss in revenue and productivity.

To protect you and your business, we can deploy and configure the latest cutting-edge cyber security technology and monitor and manage any threats to your systems. A robust cyber security strategy is the best defence against attack, but many organisations don’t know where to begin. There is no need for you to worry about whether it’s working, up to date and performing regular scans, we’ll do all that for you.

View more information on our Cyber Security page by clicking here.

Disaster Recovery

If you value your data, you should be backing up. For businesses, this could mean everything from invoices to marketing materials to your customer database. What would happen if come tomorrow all these were gone? Could your business operate?

We offer two types of backup solution; cloud backup and local backup. Cloud backup is something worth looking into; your files are stored on the cloud, in a secure environment and if something should happen to your premises (such as fire, flood, etc), you can quickly recover those valuable documents. Once installed on your office computer or server, our software will take it from there.

Automated disaster recovery failover and failback strengthens business continuity strategies. Get always-on accessibility without adding infrastructure silos, operational complexity or cost.

View more information on our Cloud Backup page by clicking here.

Client Testimonial

“We have been using SJH Computing now for over 2 years due to problems with our previous IT company. The service provided is excellent and whenever we have a problem they are on hand to fix it without delay meaning minimal disruption to the business. I would highly recommend SJH Computing”

Gareth Curtis

Get In Touch

Speak to one of our experts today and see how we can help your business grow through fully managed IT support.

Call us on 01543 889 444 to see how we can help your business


Are You Still Using Office 2010? Then It’s Time To Upgrade

Software manufacturers usually give their software a time limiting lifespan and turn their resources to supporting more recent releases. This is the case with Office 2010 when support ended on October 13th 2020 and Microsoft no longer provides tech support, bug or security fixes. There’s now no protection from harmful viruses, spyware or other malicious software and more important no more phone or chat support when things go wrong.

Cyber criminals are on the lookout for businesses relying on this non supported software as they know they are open to exploitation and on their own if the worst happens.

What Can You Do?

You can move your computers to one of the more recent Microsoft software packages such as Office 2019 as a onetime purchase for each machine you operate or buy a Microsoft 365 subscription which gives the latest security updates.

Beware of Microsoft 2019 however, as it came out in September 2018 and is due to be succeeded by Office 2022 in the second half of 2021, and you will only get support and fixes during its lifecycle period and new features are not offered.

Before deciding to wait until later in 2021 and leaving yourself vulnerable you could consider Microsoft 365, this gives you access to Office’s cloud connected features across devices plus 1TB of OneDrive storage, Office mobile apps, Skype minutes and access to support and latest features.

If you have a business account your administrator can ensure you are receiving all new features and everything is up to date.

Is Microsoft 365 For You?

Microsoft 365 can be on premises, on the cloud or both. Employees can use tools they are used to such as Word or Excel installed on your desktops then, save their work to the cloud and log on via mobile devices such as tablets or laptops and work remotely, ideal in today’s situation.

You can also enjoy video conferencing, screen sharing, group chats and calling with Microsoft 365 Teams and you will always have the latest versions of Office, SharePoint, Exchange and Skype.

Microsoft 365 comes in several business packages. The basic version gives you free Web and Mobile only along with Exchange, OneDrive, SharePoint and Teams.

Continuing with Office 2010 could prove costly if the worst happens so now is the time to upgrade.

Need help upgrading your existing software for your business? Our IT experts can help. Contact us today on 01543 889 444


Microsoft 365 Bookings – Manage Your Appointments Online

Are you always answering the phone taking new bookings and appointments, chasing and answering emails for your business and find you don’t have time to actually carry out those jobs, that’s where Microsoft 365 Bookings comes into its own and is the App you need.

Bookings is an add-on to your Microsoft 365 Business plan. It allows you to manage appointments online with a custom web page which you can integrate with Facebook.

If you are getting bogged down by:

  • still doing paper bookings
  • double booking or getting times wrong
  • regularly having to interrupt your work to make new appointments
  • your client contact list is a mess

Then you seriously need to consider Bookings.

How Does Bookings Work?

Bookings is easy to use and will take the stress and time out of managing your appointments. It will:

  • Create a custom branded public facing calendar (or calendars if needed)
  • Customers can find and book appointments by accessing your site 24/7
  • Bookings will send a confirmation email and calendar invitation
  • Customers can reschedule or cancel if they need, again 24/7
  • Bookings will track all confirmations, reminders and changes for you

By adding custom fields you can also request and manage deposits, manage internal and external calendars or set up different staff details.

Added Benefits of Bookings

There are many additional benefits and features as Bookings is an extension of Microsoft 365 and include:

  • Bookings easily syncs with Outlook calendars helping to avoid double bookings
  • Bookings can help you avoid last minute cancellations as you are able to control how much advance notice is required to cancel
  • Appointments booked as online meetings create a link to enable virtual meetings via Skype or Microsoft Teams
  • The Facebook integration allows you to accept bookings from your page via a “book now” button and Facebook will fill in their contact information automatically making it easier for customers
  • There is also a mobile App for Android and iPhone so you can manage your appointments on the go
  • Bookings can also build your company’s database. The appointments manager gathers data such as names, phone numbers and postal and email addresses all in one place.

Bookings is one of many online scheduling tools available however its integration with other Microsoft tools gives it a big advantage and it’s affordable.

Don’t waste time managing your appointments the old way every week, get online with Bookings 365 today.

Don’t want to take the time to upgrade and integrate Bookings then call SJH Computing & Technical Services on 01543 889 444 and out IT experts can do it for you.


Don’t be Afraid of the Cloud

Although the public cloud service is expanding some businesses are reluctant to migrate their IT to this service for a number of reasons. This article addresses the common myths to this highly scalable and cost effective solution.

Fear of Change

The old saying of “why try to fix it if it’s not broke” is often banded about especially when it comes to business computing, and moving all your data from one data center to another takes planning and effort.

The greater flexibility when it is done will make it all worthwhile. Cloud technology offers:

  • Increased effectiveness
  • Mobility
  • Faster implementation
  • Scalability
  • Disaster recovery

The Cloud allows you to store data, deliver content, run applications and other IT functions all online, plus you don’t have to invest in the necessary hardware or networking technology on site.

Fear of Losing Control

Most IT departments want full control of their domain and can be reluctant to hand this over to a third party as moving to the public Cloud means partnering with this other third party. Some of your existing technology can move however some may need to be replaced or redesigned.

One solution is to migrate to a private Cloud. This will allow you to control the data and software but will be more costly than a public Cloud. When going into partnership with a public Cloud service provider make sure who is responsible and accountable for what.

Fear of Cost Increases

Cost is always a concern to businesses especially IT costs and although it may seem costlier by moving to the Cloud, first take stock of your existing IT operating budget. The time and money saving could be surprising as the software provider will take charge of updates, patching and new capabilities which can increase IT productivity in other areas.

With Cloud technology you know your tools are always evolving plus you can quickly add or reduce licenses for data storage and you don’t need to wait for hardware to arrive and be installed by your IT team.

Fear of Data Security

This is probably the biggest fear when moving to a third party, just how secure is your data. Also of concern is any downtime for a data breach and the resulting cost in lost production, business revenue and brand. You don’t want to move to a solution that increases your vulnerability.

There are two ways you can be attacked; digital or physical. A Cloud provider is always focused on security, they do not want an attack as much as you do as their reputation would be in tatters. They know the mitigations and counter measures for cloud computing capabilities. They know the frameworks, architecture and approaches to best protect against digital attack. Azure, which is Microsoft’s cloud offering, has a budget of $1 billion to prevent such cyber attacks. Very few IT budgets can compete with that.

As for physical security your own business premises is probably less secure than a data center. They have patrolled, fenced perimeters, guards, keycard only access, power backups and server redundancy.

Conclusion

With cloud migration you also avoid training employees to support the technology, freeing up office space and paying less for power and cooling to house your equipment. The cloud provides end users with immediate access from almost any device.

The one challenge is migrating to the cloud securely so contact us today on 01543 889 444 to get you migrated swiftly and ensure you’re using cloud computing safely.


Are your Business Continuity Plans up to date?

Business continuity is preparing for the unexpected and plans ensure you can maintain operations during unexpected disruptions. Such disruptions can include:

  • national emergencies
  • sabotage
  • natural and man-made disasters
  • utility failures
  • data breaches or cyber-security attack

There is however a new threat that not only threatens individual businesses but whole economies – COVID-19.

The situation with COVID-19 has shown to be extremely fluid and can change in an instant so what do you need to do?

Prepare for the Unexpected

A business continuity plan tries to anticipate the worst that could happen without knowing what is going to happen; nobody saw a world pandemic coming.

You may never need to use your plan but taking the “it`ll never happen to me” approach is playing a dangerous game and could leave you up the creek without a paddle so to speak.

When COVID-19 hit many governments required businesses of all sizes across many industries to migrate to remote working or “working from home”. Those businesses with business continuity plans were able to respond with great agility whereas those without a plan would have floundered and found it very difficult and rushing to set up the required hardware and software which could lead to costly mistakes.

Now, many countries are starting to reopen for business albeit with constraints and now is the time to see how your business continuity plan coped and look for any weaknesses. Look back at what worked and what didn`t and ensure you are better prepared for the future.

Planning with a Managed Service Provider (MSP)

COVID-19 is not over yet and you could find yourself having to go back to remote working as spikes in the virus occur and local lock downs are forced back upon businesses. Your business continuity plan will lay out how to proceed but beware there can be many pitfalls and security issues with working remote and working with an MSP can enable you to ensure you have the correct hardware and software, set up data protection and develop a backup setup amongst other things.

If you would like to know more give us a call on 01543 889 444.