Blog

Mitel NEXT – it’s an EVENT, not a junket

Mitel NEXT – it’s an EVENT, not a junket

The Mitel Next events are forums for innovation and have been taken all over the globe. Past locations include Dallas, Berlin, Paris, Munich and Phoenix, each with their own theme.

Their eighth event - Mitel NEXT, London- Collaboration: Path Way to Peak Performance, was held last month and we were invited to attend.

How to protect your business against the rising cost of cybercrime

How to protect your business against the rising cost of cybercrime

In 2017, the cyber community was rocked by the WannaCry ransomware attacks, which struck business and organisations across the globe. Then not even a month later, a Petya ransomware variant named Nyetya joined its ranks as one of the worst cyber-attacks in history.

Using technology to provide better IT Support in Newcastle

Using technology to provide better IT Support in Newcastle

At Forsythes Technology, we're constantly working with our customers to put in place the right technology to enable better business practices. We help with our services ranging from traditional IT infrastructure to cloud, telephony and software development.

Do you have a Physical Security Policy for your business?

Do you have a Physical Security Policy for your business?

Currently there is a lot of focus on cybercriminals infiltrating networks, and rightly so! However, there are risks to your data security in your offices too. If someone can access the area where your servers are, they can potentially take your data the old-fashioned way - walking out with it.

Foldable phones are here, but are we ready for them? 

Foldable phones are here, but are we ready for them? 

Samsung was among the fray of smartphone manufacturers to premier their iteration of the much anticipated foldable phone at the Mobile World Congress in Barcelona last week. A break from the traditional smartphone form factor of recent years, the Galaxy Fold offers a tablet-sized screen in a mobile-sized body.

Protecting your weak spots in the war against cyber criminals

Protecting your weak spots in the war against cyber criminals

Cyber criminals are continually improving and looking to exploit any weakness in your information security. Are you aware of your businesses weak spots and what’s being done to protect them?
(more…)

Read more 1 Comment

Browse safely with HTTPS

Browse safely with HTTPS

Are you an avid online shopper? Have you noticed if each payment page has HTTPS in its URL lead-up? If you’re not absolutely sure, you might be a prime target for identity theft. Here’s why you should make sure that the websites you browse for shopping have a little padlock icon on them in the […]

How private browsing can improve your online safety

How private browsing can improve your online safety

Often when we’re surfing the net in the comfort of our homes or with the privacy of a small screen we don’t stop to think about the potential security threats that such a seemingly harmless activity can pose. However, certain sites could be snooping on your online activity by placing digital trackers called “cookies” on […]

Why UPS is important in network gear

Why UPS is important in network gear

Storms, floods, fire, and other emergencies can cause productivity loss due to power failure. Utilizing an uninterruptible power supply (UPS) for your workstations will ensure that you never lose unsaved work. But what about your online connection? To avoid being crippled by loss of internet connection, it’s a good idea to plug routers, wireless access […]

Purchase Request Workflow Automation | A SharePoint Case Study

Purchase Request Workflow Automation | A SharePoint Case Study

A common issue with enterprise is how to reliably control, track & audit purchasing. Small to medium enterprise generally do not use expensive enterprise resource planning (ERP) solutions that allow for approvals of orders, and larger organisations may not feel that the cost associated with licencing ERP for all users is worthwhile.