Blog

The Golden Triangle: How to use Active Directory on Macs

Have you heard of the tech golden triangle?

Do you want to use Active Directory on Apple Workstations?  

Well you can do just that.

In this article our tech guardians will take you on a step by step process to demonstrate how to integrate Windows Active Directory (AD) and Apple’s Open Directory (OD) into one

April 24th, 2016|News|

Hung up on Google Apps? Here are 5 features to make you go gaga

Google Apps is an awesome cloud platform for enterprise. Designed with team engagement in mind and with security tight as a tight thing, it’s no wonder Google Apps are so popular with cloud aficionados.

Our TechGuardians spent the last week playing around with some of the hidden features that can take workplace productivity to from

April 6th, 2016|News|

Tech Guardians tips to spring clean your IT System

Have you been bogged down with slow starting computers?

Is your inbox filling up faster than the M25?

Perhaps your server has given up the ghost?

Spring is a great time to start afresh. Whether you want to sanitise your workstation or de-clutter unwanted files. Time to get the duster and mop out and give the

March 21st, 2016|MS Office 365|

Microsoft Office 365: Deploying Exchange Online Protection (EOP)

Is Email security water tight at your organisation?

Do you want to eliminate potential threats on your system?

Criminal are becoming ever more sophisticated with their methods of invading complicated organisational networks and systems. Email is a prime tool for any criminal who wants to access vital data. After all data is the lifeblood of any

March 7th, 2016|News|

Love a freebie? Try before you buy technology

We all love a freebie. New vanilla syrup on your regular hot chocolate? Yes please. The chance to chuck yourself around that new state of the art gym next to your office?  Oh go on then.

We all know it’s a promotion and advertising game. Companies pushing a new product. Guinea pigs getting first dibs.

February 29th, 2016|MS Office 365|

Data Protection: Why businesses should adopt modern encryption capabilities

Is data protection at the forefront of your business priority?

Do you want better protection for sensitive data?

Businesses are under pressure to minimise holes that may compromise the security of sensitive data. Customers demand it. Industries demand it. Government demand it.

Where to begin with data protection?

A good place to start is the government Data Protection

February 8th, 2016|News|