Improve Staff Productivity with Technology

June 13th, 2019

The pace of change in technology over the last three decades has been staggering. We can now carry thousands of books on a device the size of a slim paperback, and the smartphone in our pocket does everything, from playing music and films, to on- the-go-emails and document editing through to a travel agent and a real-time map.

What are 2-step and 2-factor authentication?

May 31st, 2019
What are 2-step and 2-factor authentication?

In the digital age, cybersecurity should be one of the top priorities for anyone who goes online. One way is to vet those who are trying to access your systems. But when it comes to verifying users’ identity, many are unaware of the two kinds of authentication measures available.

IT Security Terms You May Need to Know

May 25th, 2019
IT Security Terms You May Need to Know

Jargon can be intimidating if you’re dealing with IT issues and you’re anything but techy. Running an anti-malware scan can generate auto pop-ups that leave you clueless with IT terms that sound Greek. Learning the basic concepts listed here will help you move on and not be surprised the next time that happens.

Improve Cyber Defences and Grow Sales with Cyber Essentials Certification.

May 20th, 2019
Improve Cyber Defences and Grow Sales with Cyber Essentials Certification.

What is Cyber Essentials?
Here at ATG, we always recommend businesses look into achieving either Cyber Essentials or Cyber Essentials Plus accreditation, and we have both a Plus certificate and the IASME standard, based on backup and security best practice.

Which Office 365 Plan is Best for Your Business?

May 16th, 2019
Which Office 365 Plan is Best for Your Business?

With its state-of-the-art tools and features, Office 365 helps businesses manage data, share files, and improve team collaboration. You might be thinking of using this tool to improve your operations, but with the different Office 365 plans available on the market, how can you make sure that you’ll get your money’s worth? This article will […]

Public WiFi Security – How safe is it and how to protect yourself

December 5th, 2018
Public WiFi Security – How safe is it and how to protect yourself

In today's modern IT world with the advancement in cloud technologies and improved connectivity, we have the flexibility to work from anywhere. So why not work from your local independent cafe while eating your favourite cake, or sitting on a beach in The Caribbean?

Working on public wireless networks has its dangers, the problem with open networks is you can’t be entirely sure that the network is actually a legitimate public Wi-FI network and not one set up by a cybercriminal in an attempt to trick people into connecting.

Why a technology business review is vital

November 6th, 2018
Why a technology business review is vital

Identifying opportunities in all areas of business is vital for growth, but one area that’s often overlooked is technology. Although it’s easy to adopt an “if it ain’t broke, don’t fix it” attitude with IT, conducting regular technology business reviews is a must.

Which Business Computers are Best?

October 9th, 2018
Which Business Computers are Best?

Business Computers We know that IT plays a big role in reaching your small- and medium-sized business (SMB) milestones. When it comes to hardware, you don’t need to be an IT expert to find the best possible solution. Here’s a concise and helpful guide to the best hardware for your SMB. Portability Laptops allow you […]

Forget these disaster recovery myths

October 4th, 2018
Forget these disaster recovery myths

Disaster recovery (DR) isn’t what it used to be. Long gone are the days when a DR solution cost over a hundred thousand dollars and relied predominantly on tape backups. Cloud computing has dramatically changed the DR landscape. Unfortunately, there are still many misconceptions about DR. Here are a few of the myths that no […]

4 Social engineering scams to watch out for

September 25th, 2018
4 Social engineering scams to watch out for

Experts are constantly creating new security systems to protect individuals and businesses from hackers. From those who want to attend popular events like the Olympics to avoiding an angry boss, hackers are preying on gullible victims to circumvent network security systems and steal sensitive information.