Yusra Shaeik

What is Mobile Device Management and Why Does Your Business Need It?

According to recent research, the average person spends 4 hours and 37 minutes on their phone every day. We are living through the pinnacle of the mobile era! Today, managing a myriad of smartphones, tablets, and laptops is a necessity. Employees expect the flexibility to work from anywhere, and businesses thrive on mobility. However, with

Understanding the CIA Triad in Cyber Security

When you hear “CIA,” you might think of spies, but in cybersecurity, CIA stands for Confidentiality, Integrity, and Availability. These three principles form the backbone of a strong security strategy, helping to protect organisations from digital threats. What is the CIA Triad? The CIA Triad is a core concept in information security, consisting of: These

SharePoint workflow end-of-life: what you need to do

On 2nd April 2026, Microsoft SharePoint Online workflows will be retired. That sounds a little way off. But if you use this handy automation tool in your business, figuring out what to do about SharePoint workflow end-of-life is something you need to do sooner rather than later. Here is everything you need to know about

DAG is now an Assured Cyber Security Consultancy

Dial A Geek has just met the standards required to become an Assured Cyber Security Consultancy – as approved by the NCSC, the National Cyber Security Centre. The Cyber Advisor scheme, as it’s known, is designed to help businesses make the difficult decision as to who to trust with their cyber security. This scheme gives

Migration to Microsoft 365: top 3 cybersecurity tips

Migration to Microsoft 365 is a smart move for your business if you want to protect yourself and be ready to grow in future. But migrating to Microsoft 365 from another platform calls for more than just transferring a bunch of data across. You will also need to learn how to protect that data. Your

How to set up Microsoft 365 Advanced Threat Protection

Working out how to set up Microsoft 365 Advanced Threat Protection is one of the most effective ways to protect your business from email-based cyber attacks. This is vital. Because phishing is the most common type of cyber crime. Email impersonation and spoofing, CEO fraud, malware delivered through dodgy links and the like – all

Meet Your Geek – James Clapp

Meet James – the newest addition to our team. James has joined us as a Senior IT Technician bringing over 16 years of experience across many areas of IT and having worked across several types of industries from local housing associations to global FTSE 100 organisations.  With a focus on quality and customer service, James is looking forward

Why is identity protection so important for businesses?

Your digital identity includes all of the activities and actions you take online every day. It’s not just your login credentials (though, of course, these are a vital part of it). It’s who you are, what you do, and what you have access to in the digital world. The power that having access to your

What is IASME Cyber Assurance (and who needs it)?

If you’re looking for a higher cybersecurity standard for your business – something to help you reassure investors and attract new clients – IASME Cyber Assurance could be it. But what is IASME Cyber Assurance exactly? Who needs it? And what sort of business is it the right choice for? Because, from the outside, cybersecurity