Complete I.T. Blog
Incident Management: Safeguard Your Business From Future Breaches
By Matt Riley, Quality and Compliance Director at Complete I.T., Data Protection Lead at Sharp When people think of Information Security, it’s assumed that it is all IT related. While IT teams/partners have a part to play in the cyber security element of this, there...
Leaving the EU 1st January – Is Your Opera Ready?
The leaving date for the EU is fast approaching and to be ready to continue to trade with the EU there are some things that need to be done. HMRC has put together a lot of excellent guidelines on trading with the EU after the treaty expires and it is recommended to...
The Excel Effect: Why Do Businesses Use Excel?
Microsoft Excel has become the software of choice for businesses for analysing and storing data. It’s been around since 1985 and is a second home to Finance and Accounts professionals. We’ve got an opportunity as Technology Professionals to extol the virtues of such...
How Will the Pandemic Affect Businesses in 2021?
It’s safe to say that the Covid-19 pandemic has forced many businesses to quickly make significant changes to how they operate this year. Now that it’s 8 months after the beginning of the first lockdown and we’re almost at the end of 2020 with promising news about...
How to Host a Virtual Christmas Party
Although lockdown restrictions appear to be loosening for Christmas, the advice still remains to work at home when you can. Our Christmas Parties may have to be virtual but that doesn't mean we can't have a boogie! Whatever platform you currently use, from Microsoft...
5 Types of Phishing You Should Know About
Phishing scams are designed by criminals to imitate a reputable person or organisation in order to coax their victims into sharing confidential or sensitive information. Phishing scams have been around since at least the mid-1990s and as new technology has become...
Why Should SMEs Get Cyber Essentials Plus Certified?
Cyber Essentials is a government backed scheme which helps you to protect your organisation against cyber attacks. Cyber crimes come in many forms and it's important you are taking action to help protect your organisation. The certification is split into 2 levels,...
Watch Out for Fake Competitions on Social Media Channels
Fake competitions on social media platforms are on the rise and are a great way for cyber criminals to make money and harvest your information. Once you like the page, your information gets shared with the person running the group and hitting the “Share” button helps...
How to Set up Two-Step Verification on Your LinkedIn Account
Enabling two-step verification (also known as two-factor authentication - 2FA) for every account you have is highly recommended. Whether it's your Microsoft 365 account, banking or LinkedIn profile. 2FA offers a secondary level of protection to help secure your...
7 Tips for Remote Working on Personal Devices
First things first, before using personal devices for work, you must check your employers bring your own device (BYOD) policy, you must be aware that using your own personal devices without security measures in place puts company data at high risk. Do you have the...
What Are Microsoft Teams Breakout Rooms?
Microsoft Teams empowers you to collaborate and communicate from anywhere, at any time. From sharing files within the “Team tab” and answering quick questions within the chat function, to conducting important business meetings over video call, Teams is a great...