What are Cookies?

post image

What are Cookies in your browser? They are not programs; they don’t do anything. Cookies are text files, which can be read by users anytime on the Notebook program. Those files are stored on a computer and designed to hold a modest amount of data specific to a particular user. That data allows the websitesRead more

How to prevent and remove viruses and malware?

post image

What is a computer virus? A computer virus is a piece of code, which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data. A virus operates by inserting or attaching itself to a legitimate program or document that supports macros to execute its code. InRead more

Windows 7 End Of Life

post image

When Windows 7 support ends and what it means? Microsoft has officially announced the End of Extended Support date for Windows 7. On 14th of January 2020 the company will stop updating and supporting the operating system. Microsoft is trying to encourage all Windows 7 users to update their operating system before that date comes. ToRead more

Software – what to use?

post image

ACS Technologies can provide a range of software solutions for your business, from servers to desktop applications and specialist software such as CAD and email marketing. Microsoft Windows Server 2016/2019 With Windows Server 2016/2019, Microsoft delivers a server platform built on their experience of building and operating many of the world’s largest cloud-based services andRead more

Office 365

post image

Microsoft’s Office 365 solutions allow businesses of all sizes to benefit from Enterprise class communication, storage and collaboration solutions.  In plain English that means you can manage your email, contacts, tasks and calendar from all your devices or via a web browser. You can share documents between colleagues inside and outside of your organisation securelyRead more

PC’s and Laptops

post image

Did you know that Windows 7 no longer receives updates or support from 14 January 2020? Although systems are still functional this leaves them vulnerable to security breaches and may mean your systems are no longer compliant with industry legislation and policies. ACS can supply a wide range of systems, from basic office PC’s toRead more

Virus protection

post image

It is imperative that all company devices are protected by up to date Anti Virus software.  This should not only protect individual devices from running malicious software but should monitor emails, web access and removable devices for both malicious and unwanted content. ACS Technologies partner with ESET to offer a wide range of Anti VirusRead more

Encryption & Data Security

post image

Businesses often underestimate the value of the data they hold.  many companies may feel that their data is not particularly sensitive and that no one would want it anyway, however, every business has a legal right to protect the data they hold on clients, prospects, suppliers and personnel as well as protecting their own interests.Read more

Cyber Attacks Soar to 26 million a day

post image

These were the initial words of a recent national newspaper headline and it went on to say that ‘as hackers find new ways to wreak havoc’. This newspaper article was based on an annual report by specialist Sonicwall which can be downloaded at https://www.sonicwall.com/resources/white-papers/2018-sonicwall-cyber-threat-report-2/. In October 2018, the UK government said “98% of UK businesses nowRead more

Leasing & Financing

post image

An investment decision to deploy an IT solution or service will, in the main, be justified by the business benefits it brings. To achieve the benefits, it is essential that the correct decision is made in terms of the chosen technology and, critically, the selection of the correct IT partner. However, another vital decision isRead more