How can you Adapt SharePoint to Suit Your Business?

Does your organisation have more than 2 people in it? Do you ever need to share information and collaborate on a document? Are you using Office 365 E1, E3 or E5? Now…are you using SharePoint? If you answered “yes” to the first three questions but “no” to the last, you are missing out on value […]

Read More >


Three Easily-actioned Steps to get more from your Managed IT Service Provider

No matter if you’re a rusted-on client who would never switch or someone looking for a new Managed IT Service Provider, these three steps will deliver more value without adding extra cost. 1. Get them on-site more often.  One of the best ways to get more value from your MSP is to get their staff […]

Read More >


5 Signs Your IT Provider Doesn’t Care About You

Stuck in a one-sided relationship with your IT provider? Spending sleepless nights wondering if they really care? Here are 5 signs which signal that unfortunately, they don’t. Lack of follow up It’s nice when your IT support fixes your problem. But it’s even nicer when they check back in afterwards to see if it has […]

Read More >


What is Penetration Testing and How does Computer One do it?

Penetration testing is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit. Penetration testing can be performed with automated software or conducted manually. Although the main objective of penetration testing is to identify security weaknesses, it can be used to test your organisation’s security […]

Read More >