Blog

Top 5 computer Pranks to play in the office | April Fools

April Fool's the day where employees everywhere put aside their daily tasks to partake in a bit of office banter and pranks of all different natures. Since we are a technology-focused company we thought it'd be improper of us if we didn't arm you with five of our best computer pranks to play in the office.

How core values can improve your business

I was asked recently what core values are.

Core values for ATG-IT are the guiding beliefs of its employees and organisation. Once you have defined your company’s core values, you can refer to them to guide every decision your company makes on a day to day basis.

Mark wins Inspirational SMB Leader of the year 2019! | Network Group Awards

We are thrilled to announce that our CEO, Mark Matthews has been awarded 'Inspirational SMB Leader of the Year' by the Network Group at their annual awards show.
"I'm very humbled to win Inspirational SMB leader of the year 2019 at the NG awards. As a CEO I think its important to share your experiences, the wins and the losses.

Modern Password Guidelines w/ Steve McGowan

In our new column, Steve McGowan our Security, Risk and Compliance Director takes you through some guidance on how to stay safe from cybercriminals. This time it’s covering his trip to a security event and what he learned from some of the world’s best Security Experts.

Do I need Cyber Essentials for Defence Contracts?

Every business in the UK has a legal responsibility to protect any data they hold on individuals, a requirement which has become more important since the introduction of the GDPR legislation last year.

Cyber Essentials is a government-approved certification scheme, which tests your data security system, helps you identify and fix any gaps you may have, and shows you’re committed to best practice.

ATG-IT re-certified as Cyber Essentials Assessors for 3rd year in a row.

Adhering to the annual protocol we have re-assed our own security; and we are proud to announce that we continue to be IASME, Cyber Essentials and cyber essentials + certified. This achievement further demonstrates our commitment to cybersecurity, further reinforcing our commitment we have to our clients.

The Importance of a Disaster Recovery Strategy

Disaster recovery is ensuring that all of your data can be restored in event of anything going wrong. This includes outside factors such as hacking or malware, internal problems such as server failure, and human error, including staff mistakes.

You can arrange your own data storage, but using a third-party IT services partner is a better idea.

5 Features of Office365 you may not be aware of

Yes, before you ask Office365 is more than just email. Office365 is a cloud-based suite of crucial Microsoft applications such as Word, Excel, Powerpoint and more. It was designed to enhance productivity and collaboration through an integrated experience of apps and services.

Why Your IT Support Company Shouldn’t Just be Reactive

IT support is a necessary part of running a business, but one which most owners don’t tend to think about until there’s a problem. Even in larger organisations with an in-house team, it’s easy to overlook the valuable job it does.

You want the reassurance of having someone at the end of the phone or chat window, who can quickly fix a computer or network problem when it happens.

Five Key Controls of Cyber Essentials w/ Pre-Self Assessment Checklist Copy

Cyber Essentials tests a company’s IT systems and any device (including desktop, tablets and mobiles). which connects to the internet against five key controls, and the certification process is designed to be straightforward.
What are the key controls? 

Boundary firewalls and internet gateways
Malware protection
Patch management
Secure configuration
Access control

Boundary Firewalls and Internet Gateways

You should protect your internet connection with a firewall.