<img alt="" src="https://secure.hear8crew.com/200390.png" style="display:none;">

CMI Blog


A Workplace of the Future: The top modern technology tips and approaches

 

The future is somewhat unpredictable and as we have seen in 2020, the workplace can be affected dramatically overnight. However, one thing that you can always count..

Continue reading

Agile Teams: 7 Tools To Keep Your Team Staying Agile

Agile teams promote openness, wellbeing and visibility in the workplace. They encourage collaborative teamwork and often thrive off co-location environments.

So, what..

Continue reading

The Elements of Modern Workplace Evolution

Several decades ago, any businesses that shunned IT for a significant period would have either halted their progress or gone bust.

 

Not much has changed, and modern..

Continue reading

The Three Steps You'll Encounter During Business Recovery

Downtime after a disaster can cause havoc for any business. Unlike simply rebooting a computer, you can’t press a button and expect your business to return to normal...

Continue reading

Optimising Readiness and Remote Work; How Your Business’s Technology Should Change

The mandate to work from home affected pretty much every business capable of it. It also presented us with both a new normal and a stress test on workplace agility. A..

Continue reading

The key to optimising efficiency with your IT partner

Effective collaboration and partnerships are vital for every business. If your relationship with your IT partner is a good one, you will feel understood, productive..

Continue reading

CMI Webinar "Five reasons your business should cyber certify"

Cyber Essentials is a government backed scheme run by the National Cyber Security Centre (NCSC). The primary aim of the scheme is to encourage companies to adopt best..

Continue reading

CMI Webinar "How a modern workplace massively reduces disruption to your business"

The past two months has clearly demonstrated that those businesses who had already invested in modern workplace technology, were able to navigate the transition to..

Continue reading

The difference between business backup, recovery & continuity

Those responsible for protecting your data and ensuring systems are available face a broad and growing range of threats. Combine that with an ever increasing volume..

Continue reading

CMI Webinar - "Cloud phone systems Reduce cost and future proof your communications"

The telephone is still a crucial tool for business communications - especially with remote working - and a modern cloud based phone system will deliver significant..

Continue reading

CMI Webinar "Microsoft Teams Making it a safe place to collaborate"

Clearly, Microsoft Teams has seen huge growth in use over the past few weeks as remote working has been enforced. Microsoft Teams helps colleagues to collaborate, but..

Continue reading

Office 365 Backup – Why is it necessary?

What backup does Office 365 provide natively?

Office 365 does include some native capability to restore data. For example, information deleted from your mailbox goes..

Continue reading

Recorded Webinar - "You applied the remote working 'band aid' - What should your priorities be now?"

Your immediate priority at the start of COVID-19 lockdown was to resolve the remote worker challenge. This forced change, in such a short amount of time, will mean..

Continue reading

Office 365 - What you may not know

Office 365 is key to collaboration, especially during COVID-19 as teams need to remain productive whilst working from home.You will have heard of SharePoint, Teams,..

Continue reading

Top 5 Ways to Stay Secure Whilst Remote Working

The current coronavirus outbreak has resulted in many more employees working from home, however this isnʼt isnʼt a new phenomenon. Many organisations offer a flexible..

Continue reading

Why Coronavirus and Microsoft Teams might transform your productivity

 

Continue reading

Why you should move to a cloud communication system

Take a second to consider just how integral telephone communication is to the modern workplace. Along with the internet, it’s the defining technology of the modern..

Continue reading

2020 Phishing Attack Trends – Learn about your Business Risk

 

Few cyber threats are as prevalent and costly as phishing attacks. In 2019, Sonicwall documented a 27% increase in encrypted threats through email, which masquerade..

Continue reading

Improving your data improves your business

What makes a good leader? One who makes the big calls based on what we’d call gut instinct? Or one who needs to seek lots of input before they make their final..

Continue reading

CMI Recognised as a Top 50 Best Managed IT company

CMI are delighted to receive recognition as a Top 50 Best Managed IT company in the UK at the award ceremony in Pall Mall, London.

Continue reading

Tips for Detecting a Phishing Email

We recommend reading and sharing our tips for detecting a phishing email to reduce the risk of infecting your workstation or network with malicious software.

Continue reading

Simplify Your Appointment Process with Microsoft Bookings

 

Continue reading

CMI Celebrates MSP of the Year 2019 Award

CMI are delighted to receive their MSP of the Year 2019 Award at the Connect IT Europe event with Kaseya. CMI had to demonstrate excellence in a multiple of..

Continue reading

The Top 5 Business Reads

 

Warren Buffett, American business magnate and investor, said daily reading was the key to success: “That’s how knowledge functions. It accrues, like compound..

Continue reading

The Future of Google

 

For several decades, Google has dominated the world of online research. With the powerful algorithms and keyword indexes unique to this search engine, Google’s..

Continue reading

How Many Cores? Is More Always Better?

 

A big hardware buzzword is multi-core, with companies like AMD and Intel releasing processors with more cores than ever. They’re exciting, particularly in the..

Continue reading

How Will 5G Affect Your Business?

 

The emergence of 5G has been on the technological agenda for most of the last decade. There have been initial tests worldwide, and it is only a matter of time..

Continue reading

When is it time for a server upgrade?

 

Like with any piece of tech, your server is an investment that depreciates over time. On average, server performance erodes by 14% annually. By the fifth year, a..

Continue reading

Goodbye to BT's ISDN Lines

 

BT (formerly British Telecommunications) have announced their plans to switch off their ISDN network for voice calling in 2025, and will stop taking new orders from..

Continue reading

Extra defence against cybercrime: Webroot SecureAnywhere Antivirus

 

As part of our ongoing battle against cybercrime, we are continually looking at the ways we can improve, as well as expand our Security Services portfolio...

Continue reading

How To Arm Yourself Against "Human Hacking"

 

With our numerous technological advancements – AI in the home, always-on devices in our pockets, the cloud storing data in perpetuity – we are facing more..

Continue reading

How Can You Protect Your Business from Data Breaches?

 

Data breaches and Cyber Security should be big concerns for business owners. A hacked system is more than just a hassle. With the potential to destroy your..

Continue reading

The Top 5 Technology Trends of 2019

 

2019 promises to be revolutionary when it comes to technology and business. AI, Blockchain, autonomous things, digital ethics, and quantum computing are just some..

Continue reading

The Growth of IoT in Business

 

The global volume of data is increasing exponentially along the growth of the Internet of Things (IoT) and the ubiquity of connected devices. In the global IoT..

Continue reading

Making Social Media Work For Your Business

 

More companies than ever are using social media as a key strand of their customer service offer and it’s no wonder, given how social media plays an ever-growing..

Continue reading

CMI achieves ISO 9001:2015 and ISO/IEC 27001:2013 certification

 

We are proud to announce that as of September 2018, CMI has been awarded ISO 9001:2015 certification and ISO/IEC 27001:2013 certification. These international..

Continue reading

Monitor Tips For Business Productivity

 

Often taken for granted as a simple extension of our laptop display, monitors are the unsung heroes of the business world. A great monitor will not only enhance the..

Continue reading

All about IT Automation and Artificial Intelligence

 

IT Automation is key to IT optimisation and digital transformation. With our Managed Endpoint Automation service, we are harnessing the benefits of IT automation..

Continue reading

Why is SEO Important For Your Business?

SEO, or Search Engine Optimisation, is the process of optimising your website through content so that keywords and terms related to your business show up through..

Continue reading

5 Business Podcasts Worth Listening To

In this digital age, business owners can get inspiration and advice from anywhere in the world. If you have a long commute, or you’re one of those business owners who..

Continue reading

How Can a Smartphone Enhance Your Business?

 

20 years ago, we could not have imagined how natural it would be to have a device in your pocket that connects you to anywhere in the world in a matter of seconds...

Continue reading

Choosing the right hardware and software

Over the past 20 years, technology has become much more accessible and affordable.  In all industries, business operations can rarely run without either PCs, laptops,..

Continue reading

Big Data and Analytics – not just for large corporations

The explosion of data has been a constant trend in the last decade, and businesses are still figuring out what this means for them. The term ‘Big data’ is used to..

Continue reading

The Benefits of a Circular Economy

  • ..

Continue reading

7 ways to get a high quality wireless network

A high quality wireless network can make your business more agile and efficient, so it’s vital to make sure a fast and reliable network covers your offices. Wireless..

Continue reading

What's the best way to manage your passwords?

 

Password management best practice

The Facebook and Cambridge Analytica scandal and the 87 million accounts affected by privacy violation have made data privacy and..

Continue reading

8 Ways to improve your cyber security

 

Keep your business safe

Following on from BTA’s recent Cyber Essentials Plus Certification, we’d like to offer some guidance on how to improve your own cyber..

Continue reading

Get prepared for GDPR

What is the GDPR?

Following on from our September blog, here is a recap about the upcoming General Data Protection Regulation (GDPR).

The GDPR comes into force on..

Continue reading

What is Blockchain technology and how does it work?

Blockchains could be the most important technological innovation since the Internet itself. Facilitating transactions between organisations and people requires trust...

Continue reading

Cloud Computing: Feel the fear and do it anyway?

Cloud computing can make any business more responsive and efficient, but many businesses fear the cloud, citing issues surrounding data protection, security and..

Continue reading

Data Storage for SMEs: What you need to know

According to a 2017 Fujitsu study among senior finance professionals in small and medium sized businesses (SMEs) data storage requirements are predicted to double..

Continue reading

The Future of Net Neutrality

In December 2017 the United States Federal Communications Commission (FCC) voted to repeal a set of regulations that govern what has become known as net neutrality

..

Continue reading

Meltdown and Spectre: What is happening?

 

In recent news, major CPUs have been dealing with issues known as Meltdown and Spectre. These are vulnerabilities that can allow access to sensitive memory data..

Continue reading

Cloud Computing: The difference between IAAS, PAAS and SAAS

Cloud computing solutions offer a wide range of benefits to businesses, from lowered costs to better disaster recovery, and UK businesses are catching on. The Cloud..

Continue reading

This Is How The UK Intends to Plug the Cyber Skills Gap

Not too long ago, the country with the largest military and most advanced warfare technologies held all the cards in geopolitics.  But things have changed. Hackers..

Continue reading

What is Enterprise Mobility Management? CMI Explains.

Enterprise mobility management (EMM) is a set of services and technologies designed to secure corporate data on employees’ mobile devices. It generally consists of a..

Continue reading

5 Tips for Office 365 from the Business IT Experts

If your business hasn’t already moved to Office 365, it may be time you consider making the switch. Office 365 offer the most up-to-date versions of the applications..

Continue reading

Become a Presentation Pro: 5 Tips for PowerPoint 2016

Even with all the amazing technology of recent years, most of us still find ourselves having to press the little letters on our keyboard to write manuals, proposals..

Continue reading

BTA’s Top 5 Tips for Outlook 2016

Most of us live in Outlook. It controls our diaries, our email and to-do lists.  Without it, we would have to walk down the hall to verbally deliver messages and put..

Continue reading

How to Prepare for Virtual Reality in the Workplace

Virtual reality, augmented reality and mixed reality tools are coming to the workplace sooner than you think. With the launch of Apple’s iOS11 and most recent..

Continue reading

7 Free Apps You Should Get for Windows 10

There is an entire world of apps for Windows 10. Some are incredibly useful, others are fun, and a few seem to perform minor miracles (like recover deleted files from..

Continue reading

GDPR – What is it and how does it affect SMEs?

I have to start this blog article by saying I am not a lawyer and so if you are reading this I would urge you to take legal advice for your particular situation.

Continue reading

BTA Top Tip: Battery Saving Apps for Smartphones

It is the time of year for sunshine, long lunches, and a good holiday break.  But even if you plan on turning your phone off for a device-free Bank Holiday trip, you..

Continue reading

9 Tech Start-ups To Watch This Autumn

When it comes to start-up technology companies, particularly those in the business IT space, we are always watching.  Some of these companies may become BTA partners..

Continue reading

Protect Against 80% of Threats With Cyber Essentials Certification

According to the government, nearly half of UK businesses suffered a cyber-attack last year. Cyber threats are affecting businesses of all sectors and sizes, reducing..

Continue reading

IT Managers: This Is How You Can Influence Overall Business Strategy

It wasn’t that long ago that the head of IT didn’t have an office. Instead, he usually sat in a room in a remote part of the building, filled with IT equipment. He..

Continue reading

5 Must-Watch Ted Talks on Cyber Security

Even the most sceptical people can now see that cyber security is something we all need to take seriously. Whether it is as consumers, retailers, employees or..

Continue reading

Reduce Your Company’s Carbon Footprint with These 5 IT Tips

The sun is shining, the weather is sweet. Make you want to move… to more environmentally friendly IT.

The Bob Marley song may not go exactly like that, but with sweet..

Continue reading

PayPal Phishing Scam That Tries To Obtain Selfie

BTA would like to warn customers of an unusually authentic-looking phishing scam that attempts to obtain a photo of the target holding a bank card and photo ID in..

Continue reading

Mainstream Businesses Look at Adopting Blockchain Tech

The blockchain is unquestionably an ingenious invention – the brainchild of a person (or group of people) known as Satoshi Nakamoto. But what has been a way of..

Continue reading

Should Your Business Introduce Wearable Tech?

Wearable technology such as Google Glass, Apple's iWatch and Samsung's Galaxy Gear smartwatch is beginning to gain traction with consumers. What seemed too futuristic..

Continue reading

WannaCry Cyber Attack: What Happened

The WannaCry Cyber Attack has made worldwide news over the past few days. And as a Managed Service Provider with expertise in IT security, we have received a lot of..

Continue reading

Why You Don't Need 27 Passwords

This is a guest blog from Wendy Zamora at Malwarebytes, first published here.

Continue reading

Alert: Large Google Docs Phishing Scam Affects 1 Million Users

Approximately one million people have had their Gmail account accessed by a phishing scam involving a Google Docs email yesterday.

Continue reading

Businesses Are Not Taking Cyber Security Seriously – And Paying For It

It used to be that a good security system and a building with a manned gate kept businesses safe. Employees with key cards and CCTV surveillance were icing on the..

Continue reading

5 Ways Windows 10 & Android Can Work Great Together

If all your communications mediums work together seamlessly, you are more efficient.  You can work more, and with less effort. This is why businesses are investing in..

Continue reading

Look out Slack! Microsoft Formally Launches Teams

A quick little chat message vs. writing an email: which would you rather do? Most of us would rather send a chat message, especially if the messaging platform was..

Continue reading

5 Essential Tips for Microsoft Word

Most of us know how to do the basics in Microsoft Word—bold text, copy, paste, create bullet points and change font size. But few of us have ever been shown how to..

Continue reading

How to Spot a Fake App

A few weeks ago, the world celebrated International Data Privacy Day. The goal of the day is to draw attention to all the personal information you own, and make sure..

Continue reading

The Best Tech for Travel in 2017

It is that time of year when many of us begin dreaming of, or indeed preparing for, a warm weather holiday.  Short, dark days and constant drizzle is enough to make..

Continue reading

What is Encryption: This is how apps keep your data safe

You may have thought twice about the security of messages sent over WhatsApp, or about using an app for online banking. After all once you press ‘send’ or ‘transfer’,..

Continue reading

New Gadgets are Here! What to Expect This Year

They may not all be new gadgets, but they are new parts of gadgets or improvements to gadgets we already know and love. They are… (drum roll) the exciting device..

Continue reading

Banks: Too big to…. go to the Cloud?

Sure, your business uses cloud services—Microsoft Office 365 for example, or perhaps you even have StorageCraft Cloud Back up for your Office 365.  But what about..

Continue reading

Top Tips & Hidden Tricks for iOS 10

iOS 10 is filled with practical improvements that most of us would use – if we knew about them.  Some things are obvious, but others are little hidden gems that most..

Continue reading

Tech Industry Unites to Develop Crash-free IT Systems

It is the well-known organisation that you talk about frequently with your friends: the Zero Outage Industry Standard Association.  You shorten it to ZOISA in..

Continue reading

Top 5 Technology Trends to Influence Businesses in 2017

Technology evolves somewhat like a garden does—with some elements growing slowly over time, and others spreading like wildfire given the right conditions.

Continue reading

Microsoft Beat Salesforce in Battle for LinkedIn

The end game for many technology start-ups is to sell to a large company, or go public to facilitate growth. LinkedIn is hardly a start-up anymore, but it has now..

Continue reading

5 Cyber Security Trends to Watch Out for in 2017

It is a hot topic that continues to stay ‘hot’ and a growing issue for businesses worldwide: cyber security. But can we expect to see the same issues next year that..

Continue reading

Important Security Information for BTA Clients

We have noticed an increase in the number of IT security breaches lately, particularly in companies being hit by ransomware attacks like CryptoLocker. [See related..

Continue reading

Debating Between Amazon Echo and Google Home? Read this.

They both tell decent jokes, they both stream BBC4 if you ask for news, and they give recipes and random facts with ease. They can quickly tell you how to get..

Continue reading

Top 8 Reasons Your Computer is Slow – from the Business IT Experts

Most of us know the feeling: that annoying frustration that builds as you try to open documents and pages that seem to take years to finally appear. It is even more..

Continue reading

Cybercrime is Taking Nearly £150 Billion from UK

Cybercrime is a constantly evolving threat that most businesses are acutely aware of, however have not set aside adequate resources to protect against.  When it comes..

Continue reading

Build Your Own App

You no longer have to be an IT geek, trained programmer or tech engineer to create an app—and by app, we mean a real app that you could buy… one that other people..

Continue reading

Top 5 IT Terms You Should Know

There are some IT terms that are no longer “IT”. In fact, they are now mainstream words used by youth and adults alike in everyday conversations.  Some of these words..

Continue reading

Why You Should Use a Password Manager

You may have excellent passwords—varied, long and with lots of different characters.  But if you are like most people, you probably thought up a password for one of..

Continue reading

Where Is Cloud Data Actually Stored?

With the rise in popularity of cloud-based applications and data storage, you may be wondering where and how information is actually stored. Or you may be wondering..

Continue reading

The Top 9 Most Hilarious Tech Ads From Decades Past

Technology has come a long way in recent decades, and it would appear advertising has too.  IT companies, hardware manufacturers, electronics corporations, computer..

Continue reading

What Does Brexit Mean for the UK's Tech Sector?

Brexit has huge implications for almost all parts of British life and commerce, including the technology sector.  We can’t foresee exactly what a post-Brexit world..

Continue reading

Your Guide to the Top 5 Cyber Threats

This may come as a shock. There is no such thing a catch-all security software that your IT provider can implement to keep your company safe. Instead IT support..

Continue reading

Technology Fights Back: Can we stop work from taking over our lives?

It is the 10pm email that you shouldn’t have read, in which a colleague accidently gives misinformation to a client. What do you do? You do what most of us do: turn..

Continue reading

Do You Need To Add Cyber Insurance To Your IT Strategy?

Digital information is to businesses what a white water rapid is to a hydroelectric power plant.  It fuels things. Whether it be customer information, competitor data..

Continue reading

Is There a New Search Engine Smarter Than Google?

Search is now being integrated into everything—our cars, phones, homes and even glasses. As such the stakes, and rewards, for successful search engines are higher..

Continue reading

Survey Finds IT Leaders Think Their Departments are 4 Years Behind

The IT department of a company is in many ways like its heart. All other areas of the organisation depend on it for vital everyday functioning.  But in recent years,..

Continue reading

Windows 10 - Tips & Tricks You'll Love

Many people have now upgraded to Windows 10, but few are aware of everything Windows 10 can do. And it can do a lot. Windows 10 is packed with user-friendly shortcuts..

Continue reading

6 Reasons Your Network Infrastructure Needs an Upgrade

If your businesses is relying on older network hardware, it is probably time for an upgrade.

Continue reading

Why You Should Be Excited About 5G

The first 1G system was introduced by Nordic Mobile Telephone in 1982, using phones that cost around £2,000, and weighed approximately 5kg. Lucky for us, we have come..

Continue reading

Technology Trends: Goodbye Apps, Hello Bots!

If you run in techy circles, you will already know about the rise of the bot to mainstream stardom—and how apps, which have recently been all the rage, are on the..

Continue reading

Buildings of the future: Meet the world’s cleverest office

If we ask you if you’ve heard of The Edge, you might think we were talking about Microsoft Edge—the “enhanced Windows 10 search experience”. But The Edge we are..

Continue reading

The Real Reason You Need Top-Notch IT Systems and Support

We are in the midst of a major technology revolution—specifically a digital revolution. It affects businesses of all shapes and sizes, of all sectors and regions.

Continue reading

Dell is Now Accepting Bitcoins as Payment

As an IT consultancy that procures its fair share of Dell devices, we were interested to hear that Dell has recently become the largest retailer in the world to..

Continue reading

Insider Breach at Ofcom – Could it happen to you?

You may have seen the news last week about a former employee of Ofcom recently offering his new employer a significant amount of sensitive data he had stolen from the..

Continue reading

8 UK Start-ups Harnessing the Internet of Things

It is one of the most talked about spaces in technology today: the Internet of Things.

Continue reading

Japan to Open the First Farm Run By Robots

It is the stuff of Sci-Fi films, but it is happening—and soon. Next year a Japanese company is opening the first farm run almost entirely by robots.

Continue reading

The Biggest IT Disasters: Hard to Believe True Stories

Somewhere between hiring the best employees, the streamlined operations process, the carefully crafted management meetings, KPIs and customer support, lies what is..

Continue reading

New Ransomware - CryptoJoker - is Not a Joke

Beware of a new ransomware called CryptoJoker that encrypts your data using AES-256 encryption and then demands a ransom in bitcoins to get your files back...

Continue reading

The 3 Variants of Cloud Security Explained

Security is still perceived as a concern for Cloud computing. Despite the ability of the Cloud to free the limitations of infrastructure and logistics, a recent survey

Continue reading

Machine Learning is About to Change Everything

Artificial intelligence exists all around us in subtle ways, embedded in our daily activities thanks to the rise of machine learning.

Continue reading

The Human Factor: Top 4 Ways Data Security is Breached Every Day

It is hard to believe but true: 95% of all corporate security incidents involve human error. Whether deliberate or accidental, humans are the weakest link in..

Continue reading

Google to Kill the Password

Google is testing an interesting new authentication idea. In a bid to get rid of the password, Google may switch to phone authentication. Under this scheme you would..

Continue reading

6 IT Predictions for 2016

Hidden amongst the servers, shiny new laptops and other IT hardware in our tech lab, we found a small, but perfectly formed crystal ball. It was indeed a strange..

Continue reading

Y2K Wasn't a Big Deal - But This Technology Concern Is

We all remember Y2K and the global fear that digital devices would all stop working. As it turned out that fear was mostly unfounded. But now we have a very real..

Continue reading

Two Questions All IT Directors Should Ask Themselves

Ten years ago we thought we were in the midst of a digital revolution. But many would argue, if that was revolution, what we are in now is a total transformation. ..

Continue reading

The Devil Wears Gadgets: 5 Things to Consider as Wearable Devices Gain Popularity

Wearable computing may not quite rival the luxury brands yet in terms of fashion statements, but wearing devices is on the rise. In fact the IDC predicts 112 million..

Continue reading

What to do if you are a Talk Talk customer

The Talk Talk cyber attack has left many wondering how at risk they are and what they should do to protect themselves. 

BTA's inhouse technical guru, Scott Bartlett,..

Continue reading

Top 5 Security Issues SMEs Should Know About

You probably have an alarm system for your home (or at least a very good lock and a very loud dog), because you know burglars are constantly lurking.  But it is doubtful..

Continue reading

Why the Hybrid Cloud Makes Sense for SMEs

Terrestrial or cloud.  That is the question. 

The answer for most SMEs is both.

SMEs all over the world are reaping the benefits of cloud based voice and data..

Continue reading

Technical Services Update: October

Each month we share the latest updates from our technical service team, relating to trends we are seeing, new software releases and the latest technology we think is..

Continue reading

BYOD is dead - Say hello to CYOD

Remember the ‘Bring your own device’ movement? It wasn’t quite as big as the Climate Change movement, or grow-a-beard movement (thank you Hipsters), but it was..

Continue reading

Top 5 Reasons Your Internet Might be Slow

Click.

Wait, wait, wait, wait. 

Your page finally loads.

“GRRRRRRRR,” you say, “Why is the internet so slow?!”

Well we are going to tell you.  Below are the top 5..

Continue reading

4 Benefits a Managed Help Desk Brings to an SME

It goes without saying that technology is a necessary investment for all businesses. But being clever about how that investment is made is critical to ensuring pounds..

Continue reading

Tip of the Week: 3 Ways to Improve Your iPhone Battery's Life

If you are like most people you use your iPhone to… well do just about everything. You use it for work, fun, staying connected to friends and hundreds of other..

Continue reading

VoIP is the Ultimate Solution for Your Communication Woes

One major technology pain point businesses have revolves around communication. If your clients and prospects can’t effectively reach your staff, customer support and..

Continue reading

26 Billion Connected Devices By 2020 Will Dramatically Change Things

The incorporation of mobile devices into day-to-day life has changed our culture significantly. When Apple introduced “iPhone” less than a decade ago, Steve Jobs..

Continue reading

Tip of the Week: Spot a Hacker By Investigating Their IP Address

Have you ever wondered how your PC is identified from the billions of other devices out there? Just like every human being has specific physiological traits that make..

Continue reading

Two-Factor Authentication: An Easy Way to Make it Hard for Hackers

If you are up-to-speed with the latest tech news, you will already know that passwords are considered an "old-school" method of authenticating account logins. If you..

Continue reading

How You Approach Technology Affects Your Entire Budget

For most businesses, one of the largest expenses is payroll.  Good people cost money, and by hiring talented employees, a large portion of the operational budget is..

Continue reading

Administrator and Different Types of User Accounts: Explained

Most of us know what an Administrator profile is, as well as a general User profile when it comes to our PC.  Admins are liken to God and Users are liken to the..

Continue reading

Windows 10 Is Here - This is What Your Business Needs to Know

Microsoft’s latest PC operating system arrived with fanfare last week, and so far has received overwhelmingly positive reviews.  As Sophie Curis at the Telegraph..

Continue reading

Hackers Can Now Use Radio Signals to Steal Corporate Data

Hackers are always coming up with new, often ingenious methods of hacking companies around the world. Despite their best efforts, technology professionals have..

Continue reading

Upgrade to Windows 10 on Launch Day?

It is getting closer and closer to the big day - the launch of Windows 10 on July 29th! And here at BTA, we are excited. After all, Microsoft’s new OS provides..

Continue reading

What is your competition up to? Use These 6 Apps to Find Out.

If you are like most business owners, you probably find yourself checking out your competitors to get a feel for their prices and services. With these six apps, you..

Continue reading

Get Free High-Speed Internet Installation

BTA has been accepted as an official supplier of high-speed internet under the government's Connection Voucher scheme.  The scheme provides SMEs in participating..

Continue reading

Computing 101: The Difference Between Virtualisation and the Cloud

Do you know the difference between virtualisation and cloud computing? Most business owners have a hard time distinguishing between the two and find the topic to be..

Continue reading

Free Tool Connectify Turns Your PC into a Wifi Hotspot

We have all had moments where we desperately need a WiFi connection but don't have access to one. The good news is if you have a PC with a wireless card, you can take..

Continue reading

Tip of the Week: Practical Ways to Make Your Smartphone Distraction-Free

Mobile devices like smartphones and tablets are marketed as powerful productivity tools. However some workers may find their device’s apps to be more of a distraction..

Continue reading

Know someone who
would benefit from CMI?