Gildas Jones

Managed Service vs IT Support – What’s the Difference?

Yusra talking to Dial A Geek customers on the phone

When choosing your organisation’s technology support provider, it’s essential to understand the difference between IT support and managed services. While both are vital for maintaining a healthy IT infrastructure, they offer different approaches and benefits. This article will outline these distinctions to help you make informed decisions for your business. IT Support: Reactive Solutions for

Top Tips for Better Endpoint Security

Hackers are constantly on the lookout for easy targets, and endpoints—like laptops, desktops, and mobile devices—are prime candidates. In fact, research shows that 70% of cyber breaches originate from these devices, making endpoint security a critical component of any cybersecurity strategy. As your organisation grows, protecting these vulnerable access points becomes even more challenging. But

Google Workspace vs Microsoft 365: Which is Right for Your Business?

Choosing between Google Workspace and Microsoft 365 can be a tough decision for any organisation. Both platforms are powerful, reliable, and widely used, offering a suite of cloud-based tools designed to enhance productivity, collaboration, and communication. This blog post will guide you through the key differences between the two, helping you make an informed choice

Your Complete Guide to BCDR Plan Testing

Having a robust disaster recovery plan is essential, but it’s only the first step. A comprehensive Business Continuity and Disaster Recovery (BCDR) plan must include regular testing to ensure effectiveness across three critical areas: people, processes, and technology. This guide outlines the importance of BCDR testing, goals, types of tests, and best practices. Importance of

BYOD: disadvantages and advantages to consider

BYOD has its advantages and disadvantages. An abbreviation of “Bring Your Own Device”, this trendy, relatively new workplace innovation has made a big splash in the past few years. Some people love BYOD. As an employee, you get to use your own familiar laptop or smartphone. As an employer, you get to save money on

What is identity protection (and why should SMEs care)?

Your digital identity sounds a bit pretentious. But it encapsulates everything about what you say and do online, your login details, and more. This is why identity protection is something that SMEs really need to start caring about. Because cybercrime – especially threats against SMEs, widely supposed to have fewer resources to protect themselves –

Outsourced IT services – are they right for your business?

Making the decision to professionalise your business’s tech can feel like a big step. But outsourced IT services exist for a reason. In fact, they exist for several very good ones: Because up until they reach a certain size, most businesses won’t find it cost-effective to have an internal IT department. Even the salary of

Are you avoiding these 5 key compliance mistakes?

Cybersecurity compliance is a worthy and highly necessary goal for any organisation. But many companies risk their reputation and their security by making key compliance mistakes. So, how about it? How many of these are you managing to avoid? How many of these compliance mistakes does your business make? 1) Neglecting an internal audit An

Mac security – how to protect your data when you’re an Apple user

More and more cybercriminals are targeting Apple Mac users these days. So, how good is Mac security? How do you protect your data when you’re an Apple user? Because Apple is working hard to put better security in place for Mac. But cybercriminals are always developing more sophisticated strategies. Here is the latest low-down on

What is password fatigue? (and how to cure it)

You know the score. You have one password for your email. Another for that account. Another for this. Before you know it, you need to remember ten passwords. Password fatigue sets in. The end result is a whole lot of grumbling on your part. And probably quite a few clicks on the old “forgot password”