Microsoft is warning business owners that trusted cloud storage services are being hijacked to trick you into handing over your data. Here we tell you what you need to know.
News
How to choose the right new hardware for your business
Deciding on new hardware for your business can be overwhelming. The process often starts with problems. Maybe your team’s frustrated with slow computers, or your office printers keep jamming. When...
Start it on your phone… finish it on your PC?
If you work on your phone while you’re on the move, it can be a hassle to find the right file once you’re back at your PC. Here we tell you about a cool new feature coming to Windows 11 that will help.
If it ain’t broke… Windows update makes signing out simple again
Having trouble finding the sign out button in Windows 11? You’re not the only one! Luckily, Microsoft have listened… find out more here.
Beware this malware: It “annoys” you into handing over login details
A sneaky new malware wants to annoy you into giving up your login details. It locks your browser in full screen mode, making you think you’re trapped… But you can easily escape and we’ll tell you how…
Microsoft’s browser takes back the Edge with streamlined settings
Trying to find your way through the Settings menu in Microsoft Edge might leave you overwhelmed but a new update is about to make it easier. Here we tell you how.
Cloud Telephony vs. VoIP – which is best for your business?
If your employees – or worse, your customers – have started to complain about your phone systems, it’s time to look at a new solution. Something that works well for everyone, whether that’s making...
A third of all data loss is caused by problems with backups
Your business data is backed up and recovery tools are in place. So, your data is safe, right? Sadly… not always. Here’s why we recommend backups are checked regularly..
Reverse image search makes purchasing and marketing easier
Think the Windows 11 Photo app has little use in your business? Visual Search with Bing is about to change that, with some very useful new functionality… Find out more here.
A free tool for more polished communication
You’ve hit send on an important email – then you notice a typo. Windows 11 lets you spellcheck and autocorrect across most of its apps. Here we help you to set it up
Unlock your potential with Copilot
Tried Microsoft Copilot yet? It’s a smart tool baked into the applications you use every day, that could save you time. Here we tell you some cool ways it can help.
Data loss? Save yourself a mighty headache
What would you do if all your business data just… disappeared? Our latest guide explains everything you need to know about data backup, including how to make sure it’s working as it should be.
You’re ready for the upgrade… what’s holding you back?
Still not upgraded your business to Windows 11? You’re missing out, and what for? It’s free to upgrade and easy. Find out more here.
How to cheat (the Blue Screen of) Death
The dreaded Blue Screen of Death makes you panic about what happened, how much work you’ve lost, and how long it’ll take to fix. But a lot of the time it’s avoidable… We’ll tell you how.
Don’t sleep on this simple, effective security booster
Microsoft’s enforcing an extra layer of security for logins to one of its tools. Even if you don’t use it, you should follow their lead and implement this security booster in your business.
Microsoft takes the pain out of updates
Updates are a pain, right? Time consuming and disruptive. Not anymore… Here we tell you how Microsoft’s latest Windows 11 update is making things quicker and easier.
Lost for words? Draft with Copilot can help
If you struggle to find the right words in an email or post, you’d probably love a little help. Draft with Copilot is exactly that. Here we tell you how it works.
Heads up: You need to update Windows 11 by this deadline
Have you updated to the latest version of Windows 11 yet? If not, it’s time to act – Microsoft has announced when it will end support for older versions (and it’s soon!).
How to avoid Phishing Attacks
Phishing attacks are one of the most common and dangerous cyber threats faced by businesses of all sizes. Our free guide is designed for your team to help them know what to look out for.
Email Cyber Attack Guide
90% of cyber security attacks start with a simple email. Why? Get our email security guide and find out how to identify suspicious emails.
Cyber Crime Security Training
Cyber crime is always evolving. You should be too with Cyber Security Training. Get our free guide here.
Cyber extortion: What is it and what’s the risk to your business?
Have you heard of cyber extortion? It’s a very real threat to your business. Here we explain what it is and how to stay safe.
Slow PCs? Manage which applications launch at startup
Your PC might be frustratingly slow because too many applications are starting up when you hit the power button. Windows 11 has a new solution to tell you when new apps are added to your startup list. We have all the details.
PING, WHOOSH, or BEEP? Now you can decide with Teams
Is the sound of yet another Teams notification about to drive you crazy? A new update will put a stop to that… and it’ll help you prioritize your tasks too. We have all the details here.
Recent CrowdStrike Incident and How to Stay Prepared
Read about the recent issue involving CrowdStrike’s Falcon Sensor security software that led to widespread crashes of Windows computers globally and how you can protect your organisation from similar issues.
Is that Chrome extension filled with malware?
Chrome extensions are great for boosting productivity and saving time. But if they’re not the real deal, you could be at risk from malware. We tell you how to stay protected.
Save time by accessing your Android phone’s files with File Explorer
A new feature in Windows 11 may make accessing files on your Android phone much quicker. We have all the details.
Protect your business from a data leak with Microsoft Edge
Keeping your data away from the wrong hands is a big challenge. But thanks to Microsoft Edge for Business, it’s just become easier. Here we tell you why.
Windows 10 is reaching end of life
Windows 10 is saying its goodbyes in October 2025. No more free updates, patches, or security fixes. If you’re still using it, what does that mean for your business?
Ransomware threats are surging – here’s how to protect your business
After years of decline, ransomware attacks are on the rise again. And more businesses are being targeted. It’s time to protect your data. Here we explain how.
Are your employees reporting security issues fast enough… or even at all?
The faster your employees report a potential cyber security issue, the less damage is done to your business. But how can you encourage quick reporting? Here we share some solid ideas.
Now Copilot’s going to make your team work better together
Microsoft isn’t happy just boosting individual productivity. Now it’s set its sights on helping your team work better together. We’ll tell you how.
5 steps to recover from a cyber attack
The worst time to decide how to deal with a cyber attack is when you’re right in the middle of one. Our latest guide highlights 5 steps to stop a cyber attack causing the downfall of your business.
More businesses are proactively investing in cyber security defences
Cyber security: More and more businesses are making the smart business decision to invest in it. Find out why you should join them.
You might hold the secret to data security in your finger
Is your password keeping your data as safe as it could be? Maybe not. And there are new, safer alternatives to try. Here are all the details.
Say goodbye to video call pop-ups (and Teams meeting blushes)
Has a pop-up notification ever embarrassed you while you were on a video call? Microsoft may finally have a feature to stop that happening. Learn more here.
The secrets to make your laptop battery live longer
Ever been caught out by a low laptop battery at the worst possible time? Here’s our professional advice to prolong your laptop battery’s lifespan.
Our Best Support Package Yet
Enhanced IT Support and Cybersecurity Solutions Introducing Deycom RMM Express and Deycom RMM Professional We are thrilled to launch our latest support offerings, Deycom RMM Express and Deycom RMM...
1 in 4 people struggle with password overload. Here’s the answer
Struggling from password overload? You’re not alone, and it’s putting your business at risk of data theft. Good news: There’s a very simple solution and we’ll tell you all about it.
Deycom Support Team Stopped a Crafty Email Scam
How vigilance and the Deycom Support Team Stopped a Crafty Email Scam As we often advise, scammers will sometimes use a free email account to impersonate the owner of a business and they will...
Top Tech Trends for 2024
The Top Tech Trends Poised to Shape 2024 for SMEs As we approach 2024, the technological landscape is poised for an exciting transformation, promising to bring innovative tools and systems that SMEs...
Enhancing Phone Communication and Collaboration with the 3CX VoIP System
In today’s fast-paced business landscape, effective communication and collaboration are essential for success. Traditional phone systems no longer suffice, especially as remote work and global teams...
How to protect your employees from Phishing Emails
Phishing is when cyber criminals try to trick an email recipient into thinking the email they have received is from someone else, and they will then try to get that user to reveal sensitive...
Backing Up Your Data – Best Practices
Backing Up Your Data – what are the best practices How to protect your valuable data Data loss can happen at any time. Someone might inadvertently delete some files on their computer, a hard disk...
RMM – Minimizing Downtime, Maximizing Profits
Deycom offers essential IT hardware, ensuring cost-effective solutions with tailored options. Consider factors like size, mobility, and specs, including processors, RAM, storage, and graphics cards. Prioritize desk comfort and ergonomics.
Thinking of Changing Broadband Provider – here are some things to consider
It makes sense to change broadband provider if you can get a faster internet connection, or you can get a better price from your new service provider. However, there are some technical...
Remote Managed Monitoring Updates
New Security Options available with Deycom Remote Managed Services Remote Managed Monitoring (RMM) is an incredibly powerful application with a range of security features designed to help protect...
Remote Managed Monitoring Updates
Choosing the right IT hardware is crucial for a robust infrastructure. At Deycom, we excel in IT solutions and managed provision, tailoring options to meet your specific needs. Whether it’s screen size, mobility, or technical specs like processor and RAM, we simplify the jargon. Desk comfort, or ergonomics, is vital for efficiency. Acquire your computer or laptop from us for optimal tools at competitive prices.
Changing Broadband Provider
Choose Deycom for tailored IT solutions and hardware. We simplify complex specs, ensuring your computer meets your unique needs without breaking the bank. From screen size to mobility, we’ve got you covered.
The Lenovo ThinkBook 15 G2 featuring Windows 11
If your are looking for a professional high-performing laptop that combines a 11th Gen Intel® Core™ processor with powerful graphics, the ThinkBook 15 G2 is the choice for you. This stylish, secure...
Lenovo ThinkBook 15 G2
The Lenovo ThinkBook 15 G2 featuring Windows 11 If your are looking for a professional high-performing laptop that combines a 11th Gen Intel® Core™ processor with powerful graphics, the ThinkBook 15...
3CX VoIP Phone Technology
3CX, World leading VoIP technology Voice over IP phone systems are far from new, but the technology in this field means that the best VoIP systems on the market today are miles ahead of the more...
Zero Trust Network Access (ZTNA) the better alternative to VPN?
3D illustration of a blue network with icons and the text zero trust written on the front. Black background. Concept of secured network.
Video Conferencing and Digital Whiteboards for a new way of working
Video conferencing and digital whiteboards for a new way of working In a recent Linkedin post, I shared an article that looks at the Zoom v Teams debate – it probably will become as marmite as macOS...
Migrating from on premise servers to cloud servers
Migrating from on premise servers to cloud servers, not the challenging task you might imagine. For as long as there has been cloud storage, we have been strong advocates for the benefits of cloud...
The Cost and Impact of Human Error and what to do about it?
Human Error and the simpler side of the spectrum None of us are perfect, and mistakes happen but when we review some of the most common IT issues we encounter, we are seeing a pattern. Simple errors...
The Ever Evolving Nature of Cyber Crime – Are you adopting best practices ?
Constantly evolving and ever prominent, the latest trends in cyber security and what that means for your business, especially with a notable increase in a flexible workforce.
In this article, we summarise the four most pertinent areas of cyber security and why you need to give each of them consideration in respect of your own business environment.
Office 365: A guide to the recent updates that were rolled out by Microsoft.
Office 365: A guide to the recent updates that were rolled out by Microsoft On April 26th, Microsoft rolled out an update for Office 365 / Microsoft 365 for Windows, and today we will share with you...
IT Solutions for your hybrid workforce
Post-remote work, companies embrace flexibility with hybrid models. We empower seamless transitions from office to remote work by extending robust IT infrastructure beyond physical boundaries. Our win/win solutions prioritize security, continuity, and a smooth experience for clients.
Employee cyber security awareness
Employee cyber security awareness Employee cyber security awareness In Deycom we see a lot of attempted Phishing attacks, where someone has tried to send a scam email to the employees within an...
Recycling your old computer hardware (and paper!)
Recycle your old IT equipment Remember to remove all data from old hard disk drives Overtime most organisation can build up quite a collection of older IT equipment including desktops, laptops, old...
What is Cyber Security
What is Cyber Security When you think about home security you can appreciate that you have multiple options to keep your house secure. You can have a simple lock on your front door, you can install...
Business Continuity and Disaster Recovery (BCDR)
Business Continuity and Disaster Recovery (BCDR) What is BCDR and why is it important? The majority of organisation's know they should be backing up their critical data. What is sometimes forgotten...
RMM Software, What is it and why you need it?
RMM Software - What is it and why you need it? Prevention is better than the crash! It is nearly impossible in this day and age to work without technology. Individuals expect an instant response to...
Microsoft patch update and printing issues
Microsoft patch update and printing issues Microsoft Windows 10 is a very robust operating system and it rarely has any issues, especially the famous Blue Screen of death. It is considered best...
Ransomware, the one IT issue you cannot ignore
We take IT security very seriously in Deycom and our number one concern is stopping Ransomware attacks. Thankfully, a lot of the security measures that most businesses have in place such as...
Targeted Ransomware Attacks on the Increase
Targeted Ransomware Attacks on the Increase In today’s computer-driven business environment, Ransomware remains the single greatest threat facing any business that relies on its IT infrastructure....
3CX in the Cloud
3CX in the Cloud - Take back control of your Phone System. 3CX is an open-platform, software VoIP phone system that works with popular IP Phones and SIP trunks. Offering a complete Unified...
Backing Up Your Data – what are the best practices
Backing Up Your Data – what are the best practices How to protect your valuable data Data loss can happen at any time. Someone might inadvertently delete some files on their computer, a hard disk...
ESET DESlock Encryption
Don't Risk Data Breaches DESlock Encryption by ESET : Your best choice Data security has always been important and with the new GDPR regulations coming into force in May 2018 it is more essential...
Lenovo V330 Notebook
Lenovo V330 laptop Thin and stylish with a 180-degree hinge With the Lenovo V330 laptop, you can stay value-focused without sacrificing performance and reliability. It features a simplified...
SSL Certificates
What is an SSL Certificate? And if you own a website why you should care? Have you ever noticed in the address bar of your browser that some websites start with the letters HTTPS:// and they have a...
GDPR Event
Getting Ready for GDPR Deycom Computer Services was delighted to host a successful GDPR Event on the 29th of March aimed at helping organisations prepare for the new data protection regulations that...