Windows 7 says, “It’s not you, it’s me,” ahead of break-up

Windows 7 end of support - "It's not you, it's me"

Security updates will be cut off in just 10 months: January 2020. That will leave the product untended and vulnerable to new zero-day attacks that are discovered after the support period ends. What should you do?


5 ways in which you’re wasting your tech budget

How to make an IT Budget. A man with his eyes closed holds a dart as if to throw it

Looking for ways to free up some extra cash in your IT budget next financial year? Here are 5 ideas that might contain the answer.


A data breach can cost a CEO’s job – Are you secure?

ICT Security Audit - Chris Coonan loses his job over data breach

If you’re a CEO, CFO or Chair of the Board of a company dealing with personally identifiable information and you haven’t had a security audit in the last 12 months, you’re running the real risk of job loss. Find out what you can do about it.


Two Innovations in IT that will change the way you work in 2019

Working smarter not harder is our motto at Computer One, and with that in mind, here are two innovative developments that are going to help you kick professional goals this year and next.


The Busy Executive’s Guide to Information Security in 2019

Cyber threats are always evolving, and 2019 is sure to bring a barrage of new and increasingly sophisticated attack sources and techniques.


Microsoft 365: What is it, how does it work and what are the benefits for your Small to Medium Business?

It’s attractively-priced and it’s packed full of powerful software but what exactly is it, and what are the extra benefits to your business beyond what you already have?


Here Are the Main Security Threat Types from 2018

Network security

As far as cyber security was concerned, 2018 didn’t get off to a great start.


Email Phishing Scams Are More Sophisticated & Prevalent Than Ever

phishing email scams featured image

You might think that your business is safe from phishing scams because none of your employees would fall for such an obvious trick. The problem is, these days, email phishing scams are more sophisticated - and prevalent - than ever.


5 Common Attack Vectors & the Ultimate Solution to Combat Them

attack vectors feature

In this post, we will explore 5 common attack vectors and the ultimate solution you can use to combat them.


Using Office 365? You’re probably wasting (some of) your money

If you're just using Word, Excel and PowerPoint, you're missing out on a heck of a lot of value you're already paying for! Learn more...