Blog
The Caution Needed When Using AI in the Workplace
Some of the news we hear about AI is positive, and some negative. We know for sure that it's not perfect, so sensible steps should be taken to use it safely within your business. We explore some of the concerns and caution needed when using AI.
The True Cost of Downtime: What Every Business Needs to Know
Downtime is an inevitable challenge, and can be caused for various reasons. We talk about the impact, how you can calculate your downtime cost and how you can build resilience.
How to Spot a Phishing Email
With over 85% of successful data breaches or cyber attacks beginning with a phishing email, it's so important to know how to identify one. We'll show you how.
OneNote Guide: Q&A’s and Step-by-Step Tutorials
We’ll break down the basics of Microsoft OneNote, answer your burning questions, and share quick how-to steps to help you unlock its key features.
PS Tech Announces Managing Director's Appointment to GTIA UK & Ireland Executive Council
We are thrilled to announce that our Managing Director, Paul Stanyer, has been elected to the Executive Council of the GTIA Community - UK & Ireland. This prestigious appointment reflects Paul's dedication to advancing the IT and Managed Services Provider (MSP) community.
Stay Cyber-Safe This Holiday Season: Essential Cyber Security Tips for Your Business
6 Essential Steps to Strengthen Your Email Security
Recent ransomware scam disguised as well-known and trusted UK postal service
Cyber Security Awareness Month 2024 – Secure Our World
In the online world, small changes can have a big impact on your safety and security. As this month is Cyber Security Awareness Month we’re focusing on the easy things you can do to boost your cyber security.
What should you think about before buying a used laptop?
8 Essential Tips to Protect Your Gadgets While Traveling
10 Signs Your Business Needs Better IT Support
Guides
2025 Guide to Good Cyber Security
What's in the guide?
- How to spot risks
- 12 actionable steps to stay secure
- What to do after an attack
- Expert advice from cyber security pros