Site icon Limbtec Limited

Monthly Video Guides

[vc_row][vc_column][vc_column_text]

Monthly Guide Videos

Every month we focus on an aspect of business technology. If you see anything that you want more information about, or help in implementing anything then call us on 01752 546867.[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column width=”1/3″][/vc_column][vc_column width=”1/3″][vc_raw_html]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[/vc_raw_html][vc_column_text]

Support Contract

What do you gain by having an IT Support Contract[/vc_column_text][/vc_column][vc_column width=”1/3″][/vc_column][/vc_row][vc_row][vc_column width=”1/3″][vc_raw_html]JTNDaWZyYW1lJTIwc3JjJTNEJTIyaHR0cHMlM0ElMkYlMkZwbGF5ZXIudmltZW8uY29tJTJGdmlkZW8lMkY3OTY1NDc1NDQlM0ZoJTNENmExNTljZWEyYSUyMiUyMHdpZHRoJTNEJTIyNjQwJTIyJTIwaGVpZ2h0JTNEJTIyMjAwJTIyJTIwZnJhbWVib3JkZXIlM0QlMjIwJTIyJTIwYWxsb3clM0QlMjJhdXRvcGxheSUzQiUyMGZ1bGxzY3JlZW4lM0IlMjBwaWN0dXJlLWluLXBpY3R1cmUlMjIlMjBhbGxvd2Z1bGxzY3JlZW4lM0UlM0MlMkZpZnJhbWUlM0U=[/vc_raw_html][vc_column_text]

Cyber Crime and Young Employees

This week we explore  if younger members of staff have a different attitude to Cyber Crime?[/vc_column_text][/vc_column][vc_column width=”1/3″][vc_raw_html]JTNDaWZyYW1lJTIwc3JjJTNEJTIyaHR0cHMlM0ElMkYlMkZwbGF5ZXIudmltZW8uY29tJTJGdmlkZW8lMkY3OTI5NTQxMjAlM0ZoJTNEODY4NGQwMDI1MCUyMiUyMHdpZHRoJTNEJTIyNjQwJTIyJTIwaGVpZ2h0JTNEJTIyMjAwJTIyJTIwZnJhbWVib3JkZXIlM0QlMjIwJTIyJTIwYWxsb3clM0QlMjJhdXRvcGxheSUzQiUyMGZ1bGxzY3JlZW4lM0IlMjBwaWN0dXJlLWluLXBpY3R1cmUlMjIlMjBhbGxvd2Z1bGxzY3JlZW4lM0UlM0MlMkZpZnJhbWUlM0UlMEE=[/vc_raw_html][vc_column_text]

Email Protection

This month we look at your email protection, Email is the route most hackers use when trying to gain access to your systems.[/vc_column_text][/vc_column][vc_column width=”1/3″][vc_raw_html]JTNDaWZyYW1lJTIwc3JjJTNEJTIyaHR0cHMlM0ElMkYlMkZwbGF5ZXIudmltZW8uY29tJTJGdmlkZW8lMkY3ODUyNzEyODElM0ZoJTNEMTFlNTJkZDQxMyUyMiUyMHdpZHRoJTNEJTIyNjQwJTIyJTIwaGVpZ2h0JTNEJTIyMjAwJTIyJTIwZnJhbWVib3JkZXIlM0QlMjIwJTIyJTIwYWxsb3clM0QlMjJhdXRvcGxheSUzQiUyMGZ1bGxzY3JlZW4lM0IlMjBwaWN0dXJlLWluLXBpY3R1cmUlMjIlMjBhbGxvd2Z1bGxzY3JlZW4lM0UlM0MlMkZpZnJhbWUlM0U=[/vc_raw_html][vc_column_text]

Cyber Security

Moving IT Services to the cloud, is what all businesses have either done or will be doing shortly, but have you thought about your cyber security, we explore that this month.[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column width=”1/3″][vc_raw_html]JTNDaWZyYW1lJTIwc3JjJTNEJTIyaHR0cHMlM0ElMkYlMkZwbGF5ZXIudmltZW8uY29tJTJGdmlkZW8lMkY3NTYyNzg0ODglM0ZoJTNEOGNhYTY4MzhlNyUyMiUyMHdpZHRoJTNEJTIyNjQwJTIyJTIwaGVpZ2h0JTNEJTIyMjAwJTIyJTIwZnJhbWVib3JkZXIlM0QlMjIwJTIyJTIwYWxsb3clM0QlMjJhdXRvcGxheSUzQiUyMGZ1bGxzY3JlZW4lM0IlMjBwaWN0dXJlLWluLXBpY3R1cmUlMjIlMjBhbGxvd2Z1bGxzY3JlZW4lM0UlM0MlMkZpZnJhbWUlM0U=[/vc_raw_html][vc_column_text]

Password Managers

This month we take a deeper dive on the benefits of using a password manager in your business.[/vc_column_text][/vc_column][vc_column width=”1/3″][vc_raw_html]JTNDaWZyYW1lJTIwc3JjJTNEJTIyaHR0cHMlM0ElMkYlMkZwbGF5ZXIudmltZW8uY29tJTJGdmlkZW8lMkY3NDE3ODEwMDclM0ZoJTNEMWM0MTkyNDA1OSUyMiUyMHdpZHRoJTNEJTIyNjQwJTIyJTIwaGVpZ2h0JTNEJTIyMjAwJTIyJTIwZnJhbWVib3JkZXIlM0QlMjIwJTIyJTIwYWxsb3clM0QlMjJhdXRvcGxheSUzQiUyMGZ1bGxzY3JlZW4lM0IlMjBwaWN0dXJlLWluLXBpY3R1cmUlMjIlMjBhbGxvd2Z1bGxzY3JlZW4lM0UlM0MlMkZpZnJhbWUlM0U=[/vc_raw_html][vc_column_text]

Phishing Guide

This month we take a deeper look at phishing scams, what to look, and exactly how dangerous this is.[/vc_column_text][/vc_column][vc_column width=”1/3″][vc_raw_html]JTNDaWZyYW1lJTIwc3JjJTNEJTIyaHR0cHMlM0ElMkYlMkZwbGF5ZXIudmltZW8uY29tJTJGdmlkZW8lMkY3MzUzMjkzMTglM0ZoJTNEN2UyYjAxNzRmYiUyMiUyMHdpZHRoJTNEJTIyNjQwJTIyJTIwaGVpZ2h0JTNEJTIyMjAwJTIyJTIwZnJhbWVib3JkZXIlM0QlMjIwJTIyJTIwYWxsb3clM0QlMjJhdXRvcGxheSUzQiUyMGZ1bGxzY3JlZW4lM0IlMjBwaWN0dXJlLWluLXBpY3R1cmUlMjIlMjBhbGxvd2Z1bGxzY3JlZW4lM0UlM0MlMkZpZnJhbWUlM0U=[/vc_raw_html][vc_column_text]

Video Call Setup.

Is your Video Call setup the best it can be? this month we have a look at what you can do to get the most out of your setup.[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column width=”1/3″][vc_raw_html]JTNDaWZyYW1lJTIwc3JjJTNEJTIyaHR0cHMlM0ElMkYlMkZwbGF5ZXIudmltZW8uY29tJTJGdmlkZW8lMkY3MjU1OTY2NjglM0ZoJTNEZDdkMTFmNTJjYyUyMiUyMHdpZHRoJTNEJTIyNjQwJTIyJTIwaGVpZ2h0JTNEJTIyMjAwJTIyJTIwZnJhbWVib3JkZXIlM0QlMjIwJTIyJTIwYWxsb3clM0QlMjJhdXRvcGxheSUzQiUyMGZ1bGxzY3JlZW4lM0IlMjBwaWN0dXJlLWluLXBpY3R1cmUlMjIlMjBhbGxvd2Z1bGxzY3JlZW4lM0UlM0MlMkZpZnJhbWUlM0U=[/vc_raw_html][vc_column_text]

Turn Team Off on startup

Do you want to focus when you start your day, then disable teams form starting on startup.  This video will show you how.[/vc_column_text][/vc_column][vc_column width=”1/3″][vc_raw_html]JTNDaWZyYW1lJTIwc3JjJTNEJTIyaHR0cHMlM0ElMkYlMkZwbGF5ZXIudmltZW8uY29tJTJGdmlkZW8lMkY2OTA0MTY5NDclM0ZoJTNENThiYjhiOWEzYSUyMiUyMHdpZHRoJTNEJTIyNjQwJTIyJTIwaGVpZ2h0JTNEJTIyMjAwJTIyJTIwZnJhbWVib3JkZXIlM0QlMjIwJTIyJTIwYWxsb3clM0QlMjJhdXRvcGxheSUzQiUyMGZ1bGxzY3JlZW4lM0IlMjBwaWN0dXJlLWluLXBpY3R1cmUlMjIlMjBhbGxvd2Z1bGxzY3JlZW4lM0UlM0MlMkZpZnJhbWUlM0U=[/vc_raw_html][vc_column_text]

Microsoft Lists.

Have you heard of microsoft lists, our latest video will help explain why you should use this app.[/vc_column_text][/vc_column][vc_column width=”1/3″][vc_raw_html]JTNDaWZyYW1lJTIwc3JjJTNEJTIyaHR0cHMlM0ElMkYlMkZwbGF5ZXIudmltZW8uY29tJTJGdmlkZW8lMkY2ODI0MTY4MjYlM0ZoJTNEYjdlMjRjM2M2YyUyMiUyMHdpZHRoJTNEJTIyNjQwJTIyJTIwaGVpZ2h0JTNEJTIyMjAwJTIyJTIwZnJhbWVib3JkZXIlM0QlMjIwJTIyJTIwYWxsb3clM0QlMjJhdXRvcGxheSUzQiUyMGZ1bGxzY3JlZW4lM0IlMjBwaWN0dXJlLWluLXBpY3R1cmUlMjIlMjBhbGxvd2Z1bGxzY3JlZW4lM0UlM0MlMkZpZnJhbWUlM0U=[/vc_raw_html][vc_column_text]

Webcam protection

There is a big increase in webcams being compromised. Our latest video explains how you can protect yourself.[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column width=”1/3″][vc_raw_html]JTNDaWZyYW1lJTIwc3JjJTNEJTIyaHR0cHMlM0ElMkYlMkZwbGF5ZXIudmltZW8uY29tJTJGdmlkZW8lMkY2NjE3Njk0NzglM0ZoJTNENjk2ZWFjOWMwZCUyMiUyMHdpZHRoJTNEJTIyNjQwJTIyJTIwaGVpZ2h0JTNEJTIyMjAwJTIyJTIwZnJhbWVib3JkZXIlM0QlMjIwJTIyJTIwYWxsb3clM0QlMjJhdXRvcGxheSUzQiUyMGZ1bGxzY3JlZW4lM0IlMjBwaWN0dXJlLWluLXBpY3R1cmUlMjIlMjBhbGxvd2Z1bGxzY3JlZW4lM0UlM0MlMkZpZnJhbWUlM0U=[/vc_raw_html][vc_column_text]

Would any of your staff actually click that link?

There’s a cyber-crime called phishing.

It’s a major pain.

Criminals send emails pretending to be someone they’re not, hoping one of your people will click a link and accidentally give them access to your data.

Do you think your team would spot a phishing email?

Here’s an easy way to check.[/vc_column_text][/vc_column][vc_column width=”1/3″][vc_raw_html]JTNDaWZyYW1lJTIwc3JjJTNEJTIyaHR0cHMlM0ElMkYlMkZwbGF5ZXIudmltZW8uY29tJTJGdmlkZW8lMkY2MTU5OTQ3ODMlM0ZoJTNEZjIwZjI1ZTViNyUyMiUyMHdpZHRoJTNEJTIyNjQwJTIyJTIwaGVpZ2h0JTNEJTIyMjAwJTIyJTIwZnJhbWVib3JkZXIlM0QlMjIwJTIyJTIwYWxsb3clM0QlMjJhdXRvcGxheSUzQiUyMGZ1bGxzY3JlZW4lM0IlMjBwaWN0dXJlLWluLXBpY3R1cmUlMjIlMjBhbGxvd2Z1bGxzY3JlZW4lM0UlM0MlMkZpZnJhbWUlM0U=[/vc_raw_html][vc_column_text]

If you use a password manager, switch off the inbuilt one in your browser.

We always recommend you use an external password manager. And if you do, disable the built-in one offered within Chrome.

Here’s why – and how to do it.
[/vc_column_text][/vc_column][vc_column width=”1/3″][vc_raw_html]JTNDaWZyYW1lJTIwc3JjJTNEJTIyaHR0cHMlM0ElMkYlMkZwbGF5ZXIudmltZW8uY29tJTJGdmlkZW8lMkY1OTQxOTc0MDclM0ZoJTNENTQxNTQ2NmY3YSUyMiUyMHdpZHRoJTNEJTIyNjQwJTIyJTIwaGVpZ2h0JTNEJTIyMjAwJTIyJTIwZnJhbWVib3JkZXIlM0QlMjIwJTIyJTIwYWxsb3clM0QlMjJhdXRvcGxheSUzQiUyMGZ1bGxzY3JlZW4lM0IlMjBwaWN0dXJlLWluLXBpY3R1cmUlMjIlMjBhbGxvd2Z1bGxzY3JlZW4lM0UlM0MlMkZpZnJhbWUlM0U=[/vc_raw_html][vc_column_text]

What is multi-factor authentication?

Multi-factor authentication is where you use another method as WELL as your password to login.

Our new video explains what it is, how it works, and why you really, really want to start using it in your business.[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column width=”1/3″][vc_raw_html]JTNDaWZyYW1lJTIwc3JjJTNEJTIyaHR0cHMlM0ElMkYlMkZwbGF5ZXIudmltZW8uY29tJTJGdmlkZW8lMkY1NDEwOTk4MTglMjIlMjB3aWR0aCUzRCUyMjY0MCUyMiUyMGhlaWdodCUzRCUyMjIwMCUyMiUyMGZyYW1lYm9yZGVyJTNEJTIyMCUyMiUyMGFsbG93JTNEJTIyYXV0b3BsYXklM0IlMjBmdWxsc2NyZWVuJTNCJTIwcGljdHVyZS1pbi1waWN0dXJlJTIyJTIwYWxsb3dmdWxsc2NyZWVuJTNFJTNDJTJGaWZyYW1lJTNF[/vc_raw_html][vc_column_text]

The data security equivalent of leaving your doors open!

We all take great care to keep our homes & businesses secure.
Yet some business owners and managers don’t have the same attitude towards their business’s data security.
Which is MAD. Because there are a lot more people trying to access your business’s data, than hoping to steal your TV.
Here are four key ways to improve your business’s data security.[/vc_column_text][/vc_column][vc_column width=”1/3″][vc_raw_html]JTNDaWZyYW1lJTIwc3JjJTNEJTIyaHR0cHMlM0ElMkYlMkZwbGF5ZXIudmltZW8uY29tJTJGdmlkZW8lMkY1MTUxODcwMDAlMjIlMjB3aWR0aCUzRCUyMjY0MCUyMiUyMGhlaWdodCUzRCUyMjIwMCUyMiUyMGZyYW1lYm9yZGVyJTNEJTIyMCUyMiUyMGFsbG93JTNEJTIyYXV0b3BsYXklM0IlMjBmdWxsc2NyZWVuJTNCJTIwcGljdHVyZS1pbi1waWN0dXJlJTIyJTIwYWxsb3dmdWxsc2NyZWVuJTNFJTNDJTJGaWZyYW1lJTNFJTBB[/vc_raw_html][vc_column_text]

Which of these phishing scams have you heard of?

You’ve heard of phishing, we’re sure.

But what about vishing? And smishing? And whaling?

We explore each one in our brand new video. The more you and your staff are aware , the better protects you will be.[/vc_column_text][/vc_column][vc_column width=”1/3″][vc_raw_html]JTNDaWZyYW1lJTIwc3JjJTNEJTIyaHR0cHMlM0ElMkYlMkZwbGF5ZXIudmltZW8uY29tJTJGdmlkZW8lMkY1MTc4MTc3NjMlMjIlMjB3aWR0aCUzRCUyMjY0MCUyMiUyMGhlaWdodCUzRCUyMjIwMCUyMiUyMGZyYW1lYm9yZGVyJTNEJTIyMCUyMiUyMGFsbG93JTNEJTIyYXV0b3BsYXklM0IlMjBmdWxsc2NyZWVuJTNCJTIwcGljdHVyZS1pbi1waWN0dXJlJTIyJTIwYWxsb3dmdWxsc2NyZWVuJTNFJTNDJTJGaWZyYW1lJTNF[/vc_raw_html][vc_column_text]

Take our 60 minute security challenge

We’re the local data security experts. And one of the things our team prides itself on, is quickly finding ways that hackers could damage your business.

In fact, if you give us just 60 minutes, we’re confident we’d find something wrong with your IT setup that places your data security at risk.

Watch our new video to find out more – then contact us to start your 60 minute security challenge.[/vc_column_text][/vc_column][/vc_row]

Exit mobile version