How to set up a new user on Microsoft 365

Published 3 years ago

Why Microsoft 365 good for business Microsoft 365 includes a range of productivity tools, such as Word, Excel, and PowerPoint, that can help your employees work more efficiently and effectively. With Microsoft 365, your employees can easily share and collaborate on documents and other files in real-time, regardless of their location. This can help improve… Read more »

How to stay secure when working remotely

Published 3 years ago

Working remotely can present unique security challenges, as you may not have the same level of protection and oversight as you do in your usual office or workspace. To maintain security while working remotely, it is important for employees and employers to take certain precautions. Remote working can offer many benefits, from increased flexibility, reduced… Read more »

How to identify a Microsoft sign-in method

Published 3 years ago

What is Windows Hello Windows Hello is a biometric authentication feature in Microsoft Windows 10 that allows users to sign into their devices using facial recognition, fingerprint scanning, or a PIN code. It is designed to provide an extra layer of security for user accounts and protect against unauthorized access. What is Windows Hello for… Read more »

Why engineers say “turn it off & on again”

Published 3 years ago

Engineers often suggest turning a device off and then on again as a simple troubleshooting step because it can potentially resolve many technical issues. When a device is turned off, its memory is cleared and any temporary glitches or errors that may be causing a problem are erased. Turning the device back on allows it… Read more »

G-CLOUD Success

Published 3 years ago

The G-Cloud is a framework with a catalogue called The Digital Marketplace enabling companies to sell to the UK government. This means Pisys are declared and approved to provide services to government customers. “Comcen & Pisys, have been appointed as an approved provider of cloud services and hosting on the latest UK Government G-Cloud framework”… Read more »

How to respond to a Cyber Attack?

Published 3 years ago

A cyber attack can have serious consequences, including financial losses, damage to reputation, and even loss of life in some cases. As such, it is important for organisations and individuals to take appropriate measures to protect against cyber-attacks. If you have identified a breach in your IT systems, it is important to take steps to… Read more »

How to create a Windows SSL VPN?

Published 3 years ago

To begin, we need to look at what an SSL and VPN means SSL – Secure Sockets Layer, is a type of security technology that encrypts the connection between a web server and a web browser. This means that any data that is sent between the server and the browser is encrypted, making it a… Read more »

How to set up Office 365 emails on your phone?

Published 3 years ago

How to set up emails on your phone? Having access to emails on your phone provides convenient communication and collaboration. To set up email on your phone, you will need to know the email address and password for the email account you want to add. You will also need to know the name of the… Read more »

How to configure DHCP on a Draytek router?

Published 3 years ago

DHCP is a Dynamic Host Configuration Protocol. It is used to automatically assign IP addresses to devices on a network. Draytek router is a type of networking device that connects multiple devices to a network. It acts as a gateway between devices on a local area network (LAN) and the internet, allowing them to communicate… Read more »

How to RDP into a computer with your Azure AD credentials

Published 3 years ago

To use Remote Desktop to access an Azure AD joined computer, you will need to do the following: RDP stands for Remote Desktop Protocol, which is a protocol that allows a user to remotely access and control another computer. Azure AD stands for Azure Active Directory, which is a cloud-based directory and identity management service… Read more »

How do you create a strong password?

Published 3 years ago

A strong and unique password is one of the best ways to protect your personal information from hackers and cyber criminals. It is important to choose a password that is difficult for others to guess, and to never share your password with anyone else. It is also a good idea to change your password regularly… Read more »

How to enable a disk clean up on a server

Published 3 years ago

What is a disk cleanup on a server? A disk cleanup on a server is a process of removing unnecessary files and programs from the server’s hard drive. This can help to free up space on the hard drive and improve the performance of the server. Disk cleanup can also help to improve the security… Read more »

Ready to discuss your IT needs and how we can grow your business?

Call us Message us Get in touch