This is a part 1 of a 2 part series on security basics. This week, we will focus on staff, and next week, we will give...
Our Blog
Junior IT Support Technician
Prevos Solutions require an Junior IT Support Technician to provide excellent IT service to its rapidly growing list...
Security Risk when
using Microsoft Outlook
A critical security vulnerability has been identified in the Microsoft Outlook desktop client, tracked as...
Guest Blog: Organizations ‘not doing enough’ to prevent data breaches
Organizations need to do more to prevent themselves from experiencing data breaches, as many people realise that not...
Presentations on a Laptop: Avoid these IT pitfalls
You've booked the venue, a lot of people have signed up, you've created a great presentation on your laptop....
Guest Blog: Gerry Cleary, Galway International Arts Festival
Galway International Arts Festival has been connecting audiences and artists for over 39 years. Founded in 1978, it...
Server options: Onsite, Cloud or both?
Your business is growing to the point where you might need a server, or you are thinking of upgrading. Lets look at...
Phisherman’s Blues
Having recently received some phishing emails, I thought I'd share how things went... To start with, what is phishing?...
Ransomware Part 2: Quick Video Overview
I know I know, its only 2 weeks since the last post about Ransomware. But this time we have a cool video! Also,...
Ransomware and how to protect your business
More businesses are falling victim to ransomware attacks on their computers. This happens when hackers install malware...
Data Protection: A business stored some personal information… What happened next will shock you!
However, there are some important elements that any organisation which stores/transmits personal information...
You ask, We listen
Our partnerships with our clients strengthen the longer we work with them. ...And we are increasingly viewed by them...