Virus protection

post image

It is imperative that all company devices are protected by up to date Anti Virus software.  This should not only protect individual devices from running malicious software but should monitor emails, web access and removable devices for both malicious and unwanted content. ACS Technologies partner with ESET to offer a wide range of Anti VirusRead more

Encryption & Data Security

post image

Businesses often underestimate the value of the data they hold.  many companies may feel that their data is not particularly sensitive and that no one would want it anyway, however, every business has a legal right to protect the data they hold on clients, prospects, suppliers and personnel as well as protecting their own interests.Read more

Cyber Attacks Soar to 26 million a day

post image

These were the initial words of a recent national newspaper headline and it went on to say that ‘as hackers find new ways to wreak havoc’. This newspaper article was based on an annual report by specialist Sonicwall which can be downloaded at https://www.sonicwall.com/resources/white-papers/2018-sonicwall-cyber-threat-report-2/. In October 2018, the UK government said “98% of UK businesses nowRead more

Leasing & Financing

post image

An investment decision to deploy an IT solution or service will, in the main, be justified by the business benefits it brings. To achieve the benefits, it is essential that the correct decision is made in terms of the chosen technology and, critically, the selection of the correct IT partner. However, another vital decision isRead more

Windows servers

post image

Once a business gets beyond 2 or 3 people then we would advise that they put some sort of server system in place. What is a Server? A Server is a computer that acts as a central hub for your network. It can control security, manage files, share resources and host applications such as emailRead more

Virtual Desktop Infrastructure (VDI)

Imagine if you could access your office desktop from anywhere, on any device?  Work in the office, from home, from client sites, hotdesk, on the move without having to copy files or lose access to important applications? Virtual desktops allow users to do just that – work from anywhere and have continuity of the filesRead more

Hardware & Software Firewalls

post image

Companies often underestimate the amount of traffic which comes in and out of their network every day via their Internet connection.  That connection, whether it be ADSL, Fibre or dedicated connectivity, is effectively open to the world and is open to being scanned, attacked and probed by genuine and malicious traffic. A correctly configured firewallRead more

Offsite Backup

We cannot stress enough how important it is for any business to have a backup plan in place.  Whether you are an individual or a multi-national company your data IS your business. Data can be lost in a variety of ways.  The greatest threat is user error – accidentally overwriting or deleting files; but thereRead more

Choosing your computer repairer

Computers need repair, upgrade and periodic maintenance.  Without an ongoing contract, the time and cost of getting these actions carried out can result in significant disruption of your business and its customers. How dependent is your company on various computers, including laptops, being fully functional and working effectively? But what criteria should you use whenRead more

Your disaster recovery plan

How many people have a DR plan in place for their business? Would you know where to start or do you think that it’s OK as the business insurance will cover everything? Making sure your business insurance is up to date and all-encompassing should be part of your DR plan but the main focus shouldRead more