Skip to main content
Vincent Sharp
Written byVincent Sharp
Modern Workplace

Closing the chapter on Windows 10 and upgrading to Windows 11

Once upon a time, Microsoft promised that Windows 10 would be ‘the last version of Windows’ but alas, it was not to be.  October 14, 2025 marks the end of Windows 10 support, meaning…

Andrew Quinn
Written byAndrew Quinn
Managed IT Monitoring and Management

5 Lessons Skydiving Teaches Us about IT Maintenance

Several years ago, before kids consumed my spare time, I used to hurl myself out of moving aircraft for fun. A lot of people think of skydivers as risk-taking adrenaline junkies, but I found them…

Andrew Buckels Headshot
Written byAndrew Buckels

Digital twins in social housing: How can they work for you?

A digital twin is a virtual representation of a physical object, system, or process, and accurately mirrors the real-world counterpart throughout its lifecycle by using real-time data, simulations…

Neil Headshot
Written byNeil Robertson

What is vCISO and it's benefits

A Virtual Chief Information Security Officer (vCISO) focuses on providing leadership, strategic direction, governance and compliance for companies. They give an informed view of the information…

Headshot
Written byOliver Baverstock
Cyber Security Strategy

How a SOC Can Help SME’s Punch Above Their Weight in Cybersecurity

In this must-read breakdown, discover why hackers are targeting SMEs, the high price of unprotected data, and how a 24/7 Security Operations Centre could be the game-changer your business needs to…

Headshot
Written byDan Morrison
Cyber Security Strategy

What does Security Architecture do?

It’s hard to be confident that not only is your business protected, but that you’re protecting the right things, making the right security decisions, spending your security budget in the right…

Billy Pickin
Written byBilly Pickin

A guide to Microsoft Teams templates and teams

Microsoft Teams can be an extremely valuable collaboration and communication tool, with a key feature being the ability to create a ‘team’.

Cyber Security Strategy

Five penetration testing myths

According to the NCSC, penetration testing is “a method for gaining assurance in the security of an IT system by attempting to breach some or all of that system's security, using the same tools…