BTA has been accepted as an official supplier of high-speed internet under the government's Connection Voucher scheme. The scheme provides SMEs in participating cities..
The Benefits of Virtual Desktops
Discover everything you need to know about virtual desktops and the many significant benefits of implementing these solutions within your business.
Continue your modernisation journey with Virtual Desktop Solutions
Since the dawn of time, technology has had a vital role to play in every facet of life. The development of tools and techniques has seen hurdles overcome, processes..
The Future of Work is Here: Modern Desktops
Cloud adoption is soaring and shows no signs of slowing down. On average, 92% of organisations host at least some of their IT environment in the Cloud. Modern desktops..
Finding Your First Cloud Service: Six Steps for Success
In recent years, the daily morning commute to office blocks has been replaced with the luxury of working from the comfort of our own homes – the modern workforce has..
Your Digital Transformation is a Cloud Journey, not a Destination
One of the main conversations that we have with business is about moving to the Cloud, some of the key concerns of our clients have initially been about cost, downtime,..
8 Cloud Security Features Financiers Should Look For
The world of Fintech (financial technology) has changed dramatically in recent years due to the benefits of online and mobile solutions. But with most of our..
4 Ways Cloud Computing Can Save You Money
For those entrusted with managing or leading a business, cutting costs and saving on unnecessary expenditure is at the forefront of the decision-making process. No..
Explaining the Microsoft NCE price increases
As of July 2022, all new and renewing Microsoft subscriptions must be purchased through the New Commerce Experience (NCE), with all incentives on Microsoft’s legacy CSP..
How the Cloud is Conquering the Finance Industry’s Challenges
The finance industry faces many challenges, from costs, to competition and from customer service to Covid. How can utilising Cloud services conquer these issues?
12 Best Password Practices for World Password Day 2022
As the business world modernises, operating a successful business without using technology is practically impossible. While innovative technical solutions are..
For Financiers, the Smart Money’s in the Cloud
Like many other industries, the financial services sector has changed drastically over the past years. That’s why many financial services and wealth management companies..
Spoofing Emails: What are they, and how do businesses combat them
Our inboxes are bombarded with hundreds of emails on a day-to-day basis – important business emails, event invites, etc. And there’s risky emails like spam and a myriad..
Crazy Enough to Work: Outlandish Phishing Techniques
Most businesses are aware of the increasing threat of phishing attacks. Plus, with the shift to remote working, more end-users are exposed, and more likely to fall for..
The Why and How of Managed Print Security
With cyber security, most businesses – quite understandably - tend to focus on computers. But one major security gap businesses overlook is their printers - they can..
What Do Hackers Do With Stolen Data?
A business’s data is typically a lot more valuable than bank details. This is because, as we’ll see below, data can be used for a number of different activities, each..
Is Your Supply Chain Resilient?
The major upheavals of the last couple of decades, such as the global recession and the COVID-19 pandemic, have demonstrated that firms will suffer severe setbacks if..
7 Common Cyber Security Myths Debunked
Cyber Security is one of the biggest risks for businesses currently, as the threat landscape is not just continuously developing, but the attacks are getting more..
Major commercial changes to Microsoft 365. What do they mean for you?
There are a couple of commercial changes coming to Microsoft 365 that you need to be aware of and prepare early for. If you’re a managed services client of CMI’s, then..
Here Are Some of the Biggest Cyber Crimes of 2021
2021 hasn’t been short of cyber security breaches with the pandemic ushering in a new era of cyber-crime. What’s more, as the world gets more digital and remote, these..
The Latest Trends in Cyber Security to Watch Out For
Whether it’s phishing emails exploiting the current COVID vaccine situation, or the recent rise in ransomware, cyber-crime seems to be in the news and more prevalent..
What Is Windows 365 and What Does It Mean for Your Business?
Microsoft wants us to use and remain productive with their products as much as is humanly possible. So, to add to their recent flood of new software, they’ve brought..
Everything You Should Know About the New Windows 11
Microsoft is always improving on its product. And with their software being a full-time contributor to most businesses’ productivity, any new operating system from..
Why Cyber Security Training Is Important During These Unprecedented Times
COVID-19 showed us just how easily criminals could jump on an opportunity. Phishing rose by 67% since the start of the pandemic, with many of these attacks directly..
What is RaaS and How Do I Protect Against It?
Ransomware is a form of cyber-attack designed to encrypt a victim’s data until they pay a financial reward to the attacker - i.e. a ransom. In recent years a business..
RPO and RTO: What Are They and What Should You Do About Them?
There are all sorts of areas businesses overlook on the cyber security front. And with cyber security being of particular importance in the current climate, we should..
The 5 Most Common Gaps in Your Business Cyber Security
Time, experience and some eye-watering headlines have helped to hammer it home: your business needs adequate Cyber Security. The business world is arguably more aware..
How to Use Microsoft 365 as Productively as Possible
Combining a wealth of familiar apps and collating them under a single software suite, it’s no wonder Microsoft 365 is the industry leader in office software. For a..
What is Zero Trust Security – and Do You Need It?
There’s no such thing as too secure – not when your business, your users and your clients are at risk. In a year that saw our working and online lives unavoidably..
What is a SOC – and Why Does Your Business Need One?
‘It’s not a case of if, but when…’ It’s a phrase quoted regularly by cybersecurity experts to confirm the possibility of a cyber-attack on organisations, and while the..
What You Should Know About the Windows 10X Release
This Spring, Microsoft is launching a new operating system, Windows 10x. Upon its launch, it will only run on low cost, low end devices. However, the long-term goal is..
Why Every Modern Workplace Needs Cyber Security Training
Your employees are your first and your weakest line of defence. Cyber criminals know this, hence why they’re always targeting businesses with phishing emails. To fight..
A Modern Workplace Means Modern Types of Phishing. Know Them to Avoid Them
Phishing attacks are becoming more and more popular. This means cyber security has never been more important. To quickly recap, phishing is the use of a fake domain,..
How to Ensure Secure Collaboration in the Modern Workplace
This time last year our workplace looked very different. We were all in offices. Most businesses have had to embrace the Modern Workplace far faster than they’d..
How and Why CMI strives to be the industry's premiere business IT experts
Recently we had the honour of being named IT superhero at IT Europe's Techie Awards. This award was created to acknowledge the IT experts that rose to the challenges..
5 Cyber Security Essentials for Every Modern Business
Cyber security has always been smart. But in 2020, it’s more important than ever. Let’s assume that you’re covering the basics. Top of the cyber security essentials..
Why is cyber security important in the current climate?
Pretty much since the dawn of the internet, companies and their data have been at risk. But now, in 2020, cyber security has become more necessary than ever.In the fol..
A Workplace of the Future: The top modern technology tips and approaches
The future is somewhat unpredictable and as we have seen in 2020, the workplace can be affected dramatically overnight. However, one thing that you can always count..
Agile Teams: 7 Tools To Keep Your Team Staying Agile
Agile teams promote openness, wellbeing and visibility in the workplace. They encourage collaborative teamwork and often thrive off co-location environments.
So, what do..
The Elements of Modern Workplace Evolution
Several decades ago, any businesses that shunned IT for a significant period would have either halted their progress or gone bust.
Not much has changed, and modern..
The Three Steps You'll Encounter During Business Recovery
Downtime after a disaster can cause havoc for any business. Unlike simply rebooting a computer, you can’t press a button and expect your business to return to normal...
Optimising Readiness and Remote Work; How Your Business’s Technology Should Change
The mandate to work from home affected pretty much every business capable of it. It also presented us with both a new normal and a stress test on workplace agility. A..
The key to optimising efficiency with your IT partner
Effective collaboration and partnerships are vital for every business. If your relationship with your IT partner is a good one, you will feel understood, productive and..
CMI Webinar "Five reasons your business should cyber certify"
Cyber Essentials is a government backed scheme run by the National Cyber Security Centre (NCSC). The primary aim of the scheme is to encourage companies to adopt best..
CMI Webinar "How a modern workplace massively reduces disruption to your business"
The past two months has clearly demonstrated that those businesses who had already invested in modern workplace technology, were able to navigate the transition to..
The difference between business backup, recovery & continuity
Those responsible for protecting your data and ensuring systems are available face a broad and growing range of threats. Combine that with an ever increasing volume of,..
CMI Webinar - "Cloud phone systems Reduce cost and future proof your communications"
CMI Webinar "Microsoft Teams Making it a safe place to collaborate"
Clearly, Microsoft Teams has seen huge growth in use over the past few weeks as remote working has been enforced. Microsoft Teams helps colleagues to collaborate, but..
Office 365 Backup – Why is it necessary?
What backup does Office 365 provide natively?
Office 365 does include some native capability to restore data. For example, information deleted from your mailbox goes..
Recorded Webinar - "You applied the remote working 'band aid' - What should your priorities be now?"
Your immediate priority at the start of COVID-19 lockdown was to resolve the remote worker challenge. This forced change, in such a short amount of time, will mean that..
Office 365 - What you may not know
Office 365 is key to collaboration, especially during COVID-19 as teams need to remain productive whilst working from home.You will have heard of SharePoint, Teams, and..
Top 5 Ways to Stay Secure Whilst Remote Working
The current coronavirus outbreak has resulted in many more employees working from home, however this isnʼt isnʼt a new phenomenon. Many organisations offer a flexible..
Why you should move to a cloud communication system
Take a second to consider just how integral telephone communication is to the modern workplace. Along with the internet, it’s the defining technology of the modern age...
2020 Phishing Attack Trends – Learn about your Business Risk
Few cyber threats are as prevalent and costly as phishing attacks. In 2019, Sonicwall documented a 27% increase in encrypted threats through email, which masquerade as..
Improving your data improves your business
What makes a good leader? One who makes the big calls based on what we’d call gut instinct? Or one who needs to seek lots of input before they make their final decision?
CMI Recognised as a Top 50 Best Managed IT company
CMI are delighted to receive recognition as a Top 50 Best Managed IT company in the UK at the award ceremony in Pall Mall, London.
Tips for Detecting a Phishing Email
We recommend reading and sharing our tips for detecting a phishing email to reduce the risk of infecting your workstation or network with malicious software.
CMI Celebrates MSP of the Year 2019 Award
CMI are delighted to receive their MSP of the Year 2019 Award at the Connect IT Europe event with Kaseya. CMI had to demonstrate excellence in a multiple of disciplines..
The Top 5 Business Reads
Warren Buffett, American business magnate and investor, said daily reading was the key to success: “That’s how knowledge functions. It accrues, like compound interest”.
The Future of Google
For several decades, Google has dominated the world of online research. With the powerful algorithms and keyword indexes unique to this search engine, Google’s reach..
How Many Cores? Is More Always Better?
A big hardware buzzword is multi-core, with companies like AMD and Intel releasing processors with more cores than ever. They’re exciting, particularly in the gaming..
How Will 5G Affect Your Business?
The emergence of 5G has been on the technological agenda for most of the last decade. There have been initial tests worldwide, and it is only a matter of time before..
When is it time for a server upgrade?
Like with any piece of tech, your server is an investment that depreciates over time. On average, server performance erodes by 14% annually. By the fifth year, a..
Goodbye to BT's ISDN Lines
BT (formerly British Telecommunications) have announced their plans to switch off their ISDN network for voice calling in 2025, and will stop taking new orders from..
Extra defence against cybercrime: Webroot SecureAnywhere Antivirus
As part of our ongoing battle against cybercrime, we are continually looking at the ways we can improve, as well as expand our Security Services portfolio. Recently,..
How To Arm Yourself Against "Human Hacking"
With our numerous technological advancements – AI in the home, always-on devices in our pockets, the cloud storing data in perpetuity – we are facing more challenges..
How Can You Protect Your Business from Data Breaches?
Data breaches and Cyber Security should be big concerns for business owners. A hacked system is more than just a hassle. With the potential to destroy your company’s..
The Top 5 Technology Trends of 2019
2019 promises to be revolutionary when it comes to technology and business. AI, Blockchain, autonomous things, digital ethics, and quantum computing are just some of..
The Growth of IoT in Business
The global volume of data is increasing exponentially along the growth of the Internet of Things (IoT) and the ubiquity of connected devices. In the global IoT market,..
Making Social Media Work For Your Business
More companies than ever are using social media as a key strand of their customer service offer and it’s no wonder, given how social media plays an ever-growing role..
CMI achieves ISO 9001:2015 and ISO/IEC 27001:2013 certification
We are proud to announce that as of September 2018, CMI has been awarded ISO 9001:2015 certification and ISO/IEC 27001:2013 certification. These international..
Monitor Tips For Business Productivity
Often taken for granted as a simple extension of our laptop display, monitors are the unsung heroes of the business world. A great monitor will not only enhance the..
All about IT Automation and Artificial Intelligence
IT Automation is key to IT optimisation and digital transformation. With our Managed Endpoint Automation service, we are harnessing the benefits of IT automation for..
Why is SEO Important For Your Business?
SEO, or Search Engine Optimisation, is the process of optimising your website through content so that keywords and terms related to your business show up through online..
5 Business Podcasts Worth Listening To
In this digital age, business owners can get inspiration and advice from anywhere in the world. If you have a long commute, or you’re one of those business owners who..
How Can a Smartphone Enhance Your Business?
20 years ago, we could not have imagined how natural it would be to have a device in your pocket that connects you to anywhere in the world in a matter of seconds. The..
Choosing the right hardware and software
Over the past 20 years, technology has become much more accessible and affordable. In all industries, business operations can rarely run without either PCs, laptops,..
Big Data and Analytics – not just for large corporations
The explosion of data has been a constant trend in the last decade, and businesses are still figuring out what this means for them. The term ‘Big data’ is used to define..
The Benefits of a Circular Economy
- Britain sends 235m items of clothing to landfills each spring after our annual spring clean, the majority of which could have been re-worn, reused or recycled.
- ..
7 ways to get a high quality wireless network
A high quality wireless network can make your business more agile and efficient, so it’s vital to make sure a fast and reliable network covers your offices. Wireless..
What's the best way to manage your passwords?
Password management best practice
The Facebook and Cambridge Analytica scandal and the 87 million accounts affected by privacy violation have made data privacy and..
8 Ways to improve your cyber security
Keep your business safe
Following on from BTA’s recent Cyber Essentials Plus Certification, we’d like to offer some guidance on how to improve your own cyber security.
Get prepared for GDPR
What is the GDPR?
Following on from our September blog, here is a recap about the upcoming General Data Protection Regulation (GDPR).
The GDPR comes into force on 25th..
What is Blockchain technology and how does it work?
Blockchains could be the most important technological innovation since the Internet itself. Facilitating transactions between organisations and people requires trust...
Cloud Computing: Feel the fear and do it anyway?
Cloud computing can make any business more responsive and efficient, but many businesses fear the cloud, citing issues surrounding data protection, security and..
Data Storage for SMEs: What you need to know
According to a 2017 Fujitsu study among senior finance professionals in small and medium sized businesses (SMEs) data storage requirements are predicted to double over..
The Future of Net Neutrality
In December 2017 the United States Federal Communications Commission (FCC) voted to repeal a set of regulations that govern what has become known as net neutrality.
The..
Meltdown and Spectre: What is happening?
In recent news, major CPUs have been dealing with issues known as Meltdown and Spectre. These are vulnerabilities that can allow access to sensitive memory data..
Cloud Computing: The difference between IAAS, PAAS and SAAS
Cloud computing solutions offer a wide range of benefits to businesses, from lowered costs to better disaster recovery, and UK businesses are catching on. The Cloud..
This Is How The UK Intends to Plug the Cyber Skills Gap
Not too long ago, the country with the largest military and most advanced warfare technologies held all the cards in geopolitics. But things have changed. Hackers are..
What is Enterprise Mobility Management? CMI Explains.
Enterprise mobility management (EMM) is a set of services and technologies designed to secure corporate data on employees’ mobile devices. It generally consists of a..
5 Tips for Office 365 from the Business IT Experts
If your business hasn’t already moved to Office 365, it may be time you consider making the switch. Office 365 offer the most up-to-date versions of the applications you..
Become a Presentation Pro: 5 Tips for PowerPoint 2016
Even with all the amazing technology of recent years, most of us still find ourselves having to press the little letters on our keyboard to write manuals, proposals and..
BTA’s Top 5 Tips for Outlook 2016
Most of us live in Outlook. It controls our diaries, our email and to-do lists. Without it, we would have to walk down the hall to verbally deliver messages and put a..
How to Prepare for Virtual Reality in the Workplace
Virtual reality, augmented reality and mixed reality tools are coming to the workplace sooner than you think. With the launch of Apple’s iOS11 and most recent iPhones,..
7 Free Apps You Should Get for Windows 10
There is an entire world of apps for Windows 10. Some are incredibly useful, others are fun, and a few seem to perform minor miracles (like recover deleted files from an..
GDPR – What is it and how does it affect SMEs?
I have to start this blog article by saying I am not a lawyer and so if you are reading this I would urge you to take legal advice for your particular situation.
BTA Top Tip: Battery Saving Apps for Smartphones
It is the time of year for sunshine, long lunches, and a good holiday break. But even if you plan on turning your phone off for a device-free Bank Holiday trip, you may..
9 Tech Start-ups To Watch This Autumn
When it comes to start-up technology companies, particularly those in the business IT space, we are always watching. Some of these companies may become BTA partners..
Protect Against 80% of Threats With Cyber Essentials Certification
According to the government, nearly half of UK businesses suffered a cyber-attack last year. Cyber threats are affecting businesses of all sectors and sizes, reducing..
IT Managers: This Is How You Can Influence Overall Business Strategy
It wasn’t that long ago that the head of IT didn’t have an office. Instead, he usually sat in a room in a remote part of the building, filled with IT equipment. He..
5 Must-Watch Ted Talks on Cyber Security
Even the most sceptical people can now see that cyber security is something we all need to take seriously. Whether it is as consumers, retailers, employees or..
Reduce Your Company’s Carbon Footprint with These 5 IT Tips
The sun is shining, the weather is sweet. Make you want to move… to more environmentally friendly IT.
The Bob Marley song may not go exactly like that, but with sweet..
PayPal Phishing Scam That Tries To Obtain Selfie
BTA would like to warn customers of an unusually authentic-looking phishing scam that attempts to obtain a photo of the target holding a bank card and photo ID in order..
Mainstream Businesses Look at Adopting Blockchain Tech
The blockchain is unquestionably an ingenious invention – the brainchild of a person (or group of people) known as Satoshi Nakamoto. But what has been a way of..
Should Your Business Introduce Wearable Tech?
Wearable technology such as Google Glass, Apple's iWatch and Samsung's Galaxy Gear smartwatch is beginning to gain traction with consumers. What seemed too futuristic..
WannaCry Cyber Attack: What Happened
The WannaCry Cyber Attack has made worldwide news over the past few days. And as a Managed Service Provider with expertise in IT security, we have received a lot of..
Why You Don't Need 27 Passwords
This is a guest blog from Wendy Zamora at Malwarebytes, first published here.
Alert: Large Google Docs Phishing Scam Affects 1 Million Users
Approximately one million people have had their Gmail account accessed by a phishing scam involving a Google Docs email yesterday.
Businesses Are Not Taking Cyber Security Seriously – And Paying For It
It used to be that a good security system and a building with a manned gate kept businesses safe. Employees with key cards and CCTV surveillance were icing on the cake. ..
5 Ways Windows 10 & Android Can Work Great Together
If all your communications mediums work together seamlessly, you are more efficient. You can work more, and with less effort. This is why businesses are investing in..
Look out Slack! Microsoft Formally Launches Teams
A quick little chat message vs. writing an email: which would you rather do? Most of us would rather send a chat message, especially if the messaging platform was..
5 Essential Tips for Microsoft Word
Most of us know how to do the basics in Microsoft Word—bold text, copy, paste, create bullet points and change font size. But few of us have ever been shown how to use..
How to Spot a Fake App
A few weeks ago, the world celebrated International Data Privacy Day. The goal of the day is to draw attention to all the personal information you own, and make sure it..
The Best Tech for Travel in 2017
It is that time of year when many of us begin dreaming of, or indeed preparing for, a warm weather holiday. Short, dark days and constant drizzle is enough to make..
What is Encryption: This is how apps keep your data safe
You may have thought twice about the security of messages sent over WhatsApp, or about using an app for online banking. After all once you press ‘send’ or ‘transfer’,..
New Gadgets are Here! What to Expect This Year
They may not all be new gadgets, but they are new parts of gadgets or improvements to gadgets we already know and love. They are… (drum roll) the exciting device..
Banks: Too big to…. go to the Cloud?
Sure, your business uses cloud services—Microsoft Office 365 for example, or perhaps you even have StorageCraft Cloud Back up for your Office 365. But what about your..
Top Tips & Hidden Tricks for iOS 10
iOS 10 is filled with practical improvements that most of us would use – if we knew about them. Some things are obvious, but others are little hidden gems that most of..
Tech Industry Unites to Develop Crash-free IT Systems
It is the well-known organisation that you talk about frequently with your friends: the Zero Outage Industry Standard Association. You shorten it to ZOISA in..
Top 5 Technology Trends to Influence Businesses in 2017
Technology evolves somewhat like a garden does—with some elements growing slowly over time, and others spreading like wildfire given the right conditions.
Microsoft Beat Salesforce in Battle for LinkedIn
The end game for many technology start-ups is to sell to a large company, or go public to facilitate growth. LinkedIn is hardly a start-up anymore, but it has now done..
5 Cyber Security Trends to Watch Out for in 2017
It is a hot topic that continues to stay ‘hot’ and a growing issue for businesses worldwide: cyber security. But can we expect to see the same issues next year that we..
Important Security Information for BTA Clients
We have noticed an increase in the number of IT security breaches lately, particularly in companies being hit by ransomware attacks like CryptoLocker. [See related BBC..
Debating Between Amazon Echo and Google Home? Read this.
They both tell decent jokes, they both stream BBC4 if you ask for news, and they give recipes and random facts with ease. They can quickly tell you how to get somewhere,..
Top 8 Reasons Your Computer is Slow – from the Business IT Experts
Most of us know the feeling: that annoying frustration that builds as you try to open documents and pages that seem to take years to finally appear. It is even more..
Cybercrime is Taking Nearly £150 Billion from UK
Cybercrime is a constantly evolving threat that most businesses are acutely aware of, however have not set aside adequate resources to protect against. When it comes..
Build Your Own App
You no longer have to be an IT geek, trained programmer or tech engineer to create an app—and by app, we mean a real app that you could buy… one that other people could..
Top 5 IT Terms You Should Know
There are some IT terms that are no longer “IT”. In fact, they are now mainstream words used by youth and adults alike in everyday conversations. Some of these words..
Why You Should Use a Password Manager
You may have excellent passwords—varied, long and with lots of different characters. But if you are like most people, you probably thought up a password for one of the..
Where Is Cloud Data Actually Stored?
With the rise in popularity of cloud-based applications and data storage, you may be wondering where and how information is actually stored. Or you may be wondering what..
The Top 9 Most Hilarious Tech Ads From Decades Past
Technology has come a long way in recent decades, and it would appear advertising has too. IT companies, hardware manufacturers, electronics corporations, computer..
What Does Brexit Mean for the UK's Tech Sector?
Brexit has huge implications for almost all parts of British life and commerce, including the technology sector. We can’t foresee exactly what a post-Brexit world will..
Your Guide to the Top 5 Cyber Threats
This may come as a shock. There is no such thing a catch-all security software that your IT provider can implement to keep your company safe. Instead IT support..
Technology Fights Back: Can we stop work from taking over our lives?
It is the 10pm email that you shouldn’t have read, in which a colleague accidently gives misinformation to a client. What do you do? You do what most of us do: turn down..
Do You Need To Add Cyber Insurance To Your IT Strategy?
Digital information is to businesses what a white water rapid is to a hydroelectric power plant. It fuels things. Whether it be customer information, competitor data or..
Is There a New Search Engine Smarter Than Google?
Search is now being integrated into everything—our cars, phones, homes and even glasses. As such the stakes, and rewards, for successful search engines are higher than..
Survey Finds IT Leaders Think Their Departments are 4 Years Behind
The IT department of a company is in many ways like its heart. All other areas of the organisation depend on it for vital everyday functioning. But in recent years, IT..
Windows 10 - Tips & Tricks You'll Love
Many people have now upgraded to Windows 10, but few are aware of everything Windows 10 can do. And it can do a lot. Windows 10 is packed with user-friendly shortcuts..
6 Reasons Your Network Infrastructure Needs an Upgrade
If your businesses is relying on older network hardware, it is probably time for an upgrade.
Why You Should Be Excited About 5G
The first 1G system was introduced by Nordic Mobile Telephone in 1982, using phones that cost around £2,000, and weighed approximately 5kg. Lucky for us, we have come a..
Technology Trends: Goodbye Apps, Hello Bots!
If you run in techy circles, you will already know about the rise of the bot to mainstream stardom—and how apps, which have recently been all the rage, are on the back..
Buildings of the future: Meet the world’s cleverest office
If we ask you if you’ve heard of The Edge, you might think we were talking about Microsoft Edge—the “enhanced Windows 10 search experience”. But The Edge we are talking..
The Real Reason You Need Top-Notch IT Systems and Support
We are in the midst of a major technology revolution—specifically a digital revolution. It affects businesses of all shapes and sizes, of all sectors and regions.
Dell is Now Accepting Bitcoins as Payment
As an IT consultancy that procures its fair share of Dell devices, we were interested to hear that Dell has recently become the largest retailer in the world to accept..
Insider Breach at Ofcom – Could it happen to you?
You may have seen the news last week about a former employee of Ofcom recently offering his new employer a significant amount of sensitive data he had stolen from the..
8 UK Start-ups Harnessing the Internet of Things
It is one of the most talked about spaces in technology today: the Internet of Things.
Japan to Open the First Farm Run By Robots
It is the stuff of Sci-Fi films, but it is happening—and soon. Next year a Japanese company is opening the first farm run almost entirely by robots.
The Biggest IT Disasters: Hard to Believe True Stories
Somewhere between hiring the best employees, the streamlined operations process, the carefully crafted management meetings, KPIs and customer support, lies what is..
New Ransomware - CryptoJoker - is Not a Joke
Beware of a new ransomware called CryptoJoker that encrypts your data using AES-256 encryption and then demands a ransom in bitcoins to get your files back. CryptoJoker..
The 3 Variants of Cloud Security Explained
Security is still perceived as a concern for Cloud computing. Despite the ability of the Cloud to free the limitations of infrastructure and logistics, a recent survey..
Machine Learning is About to Change Everything
Artificial intelligence exists all around us in subtle ways, embedded in our daily activities thanks to the rise of machine learning.
The Human Factor: Top 4 Ways Data Security is Breached Every Day
It is hard to believe but true: 95% of all corporate security incidents involve human error. Whether deliberate or accidental, humans are the weakest link in information..
Google to Kill the Password
Google is testing an interesting new authentication idea. In a bid to get rid of the password, Google may switch to phone authentication. Under this scheme you would..
6 IT Predictions for 2016
Hidden amongst the servers, shiny new laptops and other IT hardware in our tech lab, we found a small, but perfectly formed crystal ball. It was indeed a strange..
Y2K Wasn't a Big Deal - But This Technology Concern Is
We all remember Y2K and the global fear that digital devices would all stop working. As it turned out that fear was mostly unfounded. But now we have a very real..
Two Questions All IT Directors Should Ask Themselves
Ten years ago we thought we were in the midst of a digital revolution. But many would argue, if that was revolution, what we are in now is a total transformation. ..
The Devil Wears Gadgets: 5 Things to Consider as Wearable Devices Gain Popularity
Wearable computing may not quite rival the luxury brands yet in terms of fashion statements, but wearing devices is on the rise. In fact the IDC predicts 112 million..
What to do if you are a Talk Talk customer
The Talk Talk cyber attack has left many wondering how at risk they are and what they should do to protect themselves.
BTA's inhouse technical guru, Scott Bartlett,..
Top 5 Security Issues SMEs Should Know About
You probably have an alarm system for your home (or at least a very good lock and a very loud dog), because you know burglars are constantly lurking. But it is doubtful..
Why the Hybrid Cloud Makes Sense for SMEs
The answer for most SMEs is both.
SMEs all over the world are reaping the benefits of cloud based voice and data services..
Technical Services Update: October
Each month we share the latest updates from our technical service team, relating to trends we are seeing, new software releases and the latest technology we think is..
BYOD is dead - Say hello to CYOD
Remember the ‘Bring your own device’ movement? It wasn’t quite as big as the Climate Change movement, or grow-a-beard movement (thank you Hipsters), but it was..
Top 5 Reasons Your Internet Might be Slow
Click.
Wait, wait, wait, wait.
Your page finally loads.
“GRRRRRRRR,” you say, “Why is the internet so slow?!”
Well we are going to tell you. Below are the top 5..
4 Benefits a Managed Help Desk Brings to an SME
It goes without saying that technology is a necessary investment for all businesses. But being clever about how that investment is made is critical to ensuring pounds..
Tip of the Week: 3 Ways to Improve Your iPhone Battery's Life
If you are like most people you use your iPhone to… well do just about everything. You use it for work, fun, staying connected to friends and hundreds of other purposes..
VoIP is the Ultimate Solution for Your Communication Woes
One major technology pain point businesses have revolves around communication. If your clients and prospects can’t effectively reach your staff, customer support and..
26 Billion Connected Devices By 2020 Will Dramatically Change Things
The incorporation of mobile devices into day-to-day life has changed our culture significantly. When Apple introduced “iPhone” less than a decade ago, Steve Jobs..
Tip of the Week: Spot a Hacker By Investigating Their IP Address
Have you ever wondered how your PC is identified from the billions of other devices out there? Just like every human being has specific physiological traits that make up..
Two-Factor Authentication: An Easy Way to Make it Hard for Hackers
If you are up-to-speed with the latest tech news, you will already know that passwords are considered an "old-school" method of authenticating account logins. If you..
How You Approach Technology Affects Your Entire Budget
For most businesses, one of the largest expenses is payroll. Good people cost money, and by hiring talented employees, a large portion of the operational budget is..
Administrator and Different Types of User Accounts: Explained
Most of us know what an Administrator profile is, as well as a general User profile when it comes to our PC. Admins are liken to God and Users are liken to the general..
Windows 10 Is Here - This is What Your Business Needs to Know
Microsoft’s latest PC operating system arrived with fanfare last week, and so far has received overwhelmingly positive reviews. As Sophie Curis at the Telegraph wrote..
Hackers Can Now Use Radio Signals to Steal Corporate Data
Hackers are always coming up with new, often ingenious methods of hacking companies around the world. Despite their best efforts, technology professionals have managed..
Upgrade to Windows 10 on Launch Day?
It is getting closer and closer to the big day - the launch of Windows 10 on July 29th! And here at BTA, we are excited. After all, Microsoft’s new OS provides features..
What is your competition up to? Use These 6 Apps to Find Out.
If you are like most business owners, you probably find yourself checking out your competitors to get a feel for their prices and services. With these six apps, you can..
Computing 101: The Difference Between Virtualisation and the Cloud
Do you know the difference between virtualisation and cloud computing? Most business owners have a hard time distinguishing between the two and find the topic to be..
Free Tool Connectify Turns Your PC into a Wifi Hotspot
We have all had moments where we desperately need a WiFi connection but don't have access to one. The good news is if you have a PC with a wireless card, you can take..
Tip of the Week: Practical Ways to Make Your Smartphone Distraction-Free
Mobile devices like smartphones and tablets are marketed as powerful productivity tools. However some workers may find their device’s apps to be more of a distraction..