Yusra Shaeik

What is a VPN, and Does My Company Need One? (Hint: Yes!)

In today’s digital world, the importance of keeping your company’s data secure cannot be overstated. With cyber threats on the rise and remote work becoming the norm, businesses need robust measures to protect their sensitive information. One such measure is a Virtual Private Network (VPN). But what exactly is a VPN, and why does your

We’re turning 18!

This month we’re celebrating our 18th birthday. That’s right – Dial A Geek is of age!   We wanted to create something fun to spread the word about our experience in the industry. We asked ourselves – what if Dial A Geek were a person? Here’s what we could do today, if we were human:  Our

What is Mobile Device Management and Why Does Your Business Need It?

According to recent research, the average person spends 4 hours and 37 minutes on their phone every day. We are living through the pinnacle of the mobile era! Today, managing a myriad of smartphones, tablets, and laptops is a necessity. Employees expect the flexibility to work from anywhere, and businesses thrive on mobility. However, with

Understanding the CIA Triad in Cyber Security

When you hear “CIA,” you might think of spies, but in cybersecurity, CIA stands for Confidentiality, Integrity, and Availability. These three principles form the backbone of a strong security strategy, helping to protect organisations from digital threats. What is the CIA Triad? The CIA Triad is a core concept in information security, consisting of: These

SharePoint workflow end-of-life: what you need to do

On 2nd April 2026, Microsoft SharePoint Online workflows will be retired. That sounds a little way off. But if you use this handy automation tool in your business, figuring out what to do about SharePoint workflow end-of-life is something you need to do sooner rather than later. Here is everything you need to know about

DAG is now an Assured Cyber Security Consultancy

Dial A Geek has just met the standards required to become an Assured Cyber Security Consultancy – as approved by the NCSC, the National Cyber Security Centre. The Cyber Advisor scheme, as it’s known, is designed to help businesses make the difficult decision as to who to trust with their cyber security. This scheme gives

Migration to Microsoft 365: top 3 cybersecurity tips

Migration to Microsoft 365 is a smart move for your business if you want to protect yourself and be ready to grow in future. But migrating to Microsoft 365 from another platform calls for more than just transferring a bunch of data across. You will also need to learn how to protect that data. Your

How to set up Microsoft 365 Advanced Threat Protection

Working out how to set up Microsoft 365 Advanced Threat Protection is one of the most effective ways to protect your business from email-based cyber attacks. This is vital. Because phishing is the most common type of cyber crime. Email impersonation and spoofing, CEO fraud, malware delivered through dodgy links and the like – all