CAREERS »        SERVICE DESK SUPPORT »        CUSTOMER LOGIN »        01329 239900 »

Blog

Hundreds of people are being bombarded with phone calls from fake IT support scammers based abroad who are fleecing their victims out of thousands. Scammers are phoning up pretending to be Microsoft or IBM persuading people to give them remote access to a computer – and then are able to empty bank accounts or leave…

Does your business need to get a grasp of the bigger picture? I once had a conversation with a business owner who asked me an important question: “How do I make sure I’m thinking about the big picture, when I’m always working on a lot of small things that seem to take up all my…

How do you secure your mobile phone within a company when everyone uses them to access company resources, whilst ensuring that mobile devices can be managed as a priority? The real question is how should mobile devices be managed, Exchange or with an MDM (Mobile Device Management) solution. Although there are a number of MDM…

Can your business afford to be caught out by adverse weather conditions? Ensure your business has a plan should the worst happen. Many businesses in the local area are reaping the benefits of remote working this week. With the promise of snow on the horizon, businesses that have implemented flexible working can relax in the…

Here at Taylor Made we’re always researching the latest in IT, including the newest software and apps. This week we’ve been taking a look at What3words, a brand-new location tool that helps people and businesses pinpoint exact locations. What3words is essentially an addressing system that’s given every 3m x 3m square in the world a…

When travelling quite a distance, to a new location, your first action is to put your destination into a satnav – you always start with the end in mind. Your Satnav then calculates the best route to get to your destination via a number of options. You then decide which option you want to take…

Many businesses use Microsoft Outlook on a day-to-day basis, communicating with internal and external people. However, how many users actually realised there was a bug in their Outlook 2010? A Windows security update for Outlook was released, which resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens specially crafted…

You have probably heard of Office 365 and all the pros and cons that come with it. You may have even taken a look at all the tools available and now you are wondering if Office 365 really is the solution for your business. But, is it as secure as everyone keeps saying – well…

In the words of Simon Sinek…. “People don’t buy WHAT you do, they buy WHY you do it.” In our crowded and competitive market place, we decided very early on that we needed to differentiate ourselves, we needed to make it clear what we do and ultimately why we do it. Very few people or…

Businesses are aware of Ransomware since the two major attacks ‘WannaCry and NotPetya’ that took place in 2017. Businesses now need to know how to reduce the risk of falling victim and the best protection to keep their business safe. Ransomware is something that is never going away. These type of attacks are becoming more…

Small to medium-sized businesses (SMBs) are often less prepared to deal with security threats than larger businesses. In 2016, over 50% of companies experienced a ransomware incident in the UK. According to 1000 IT service providers; the lack of cybersecurity awareness amongst employees is a leading cause of a successful attack. It has been shown…

Businesses today use IT systems in a number of different ways. IT systems are fundamental to the commercial success of every business. Yet so many businesses are cynical about investing time and money into a strategic IT plan. Today we are going to explain the impact of not having an IT strategy in place, why…

Many businesses around the world have suffered a ransomware attack and had their data encrypted. Protecting sensitive data is vital to all businesses, trying to avoid identity theft and protect privacy is key. Businesses lose confidential information, documents and even pictures every day due to their data not being backed up. Some have even paid…

Over the past 2 months, we have seen two major ransomware attacks ‘WannaCry and NotPetya’ that have affected thousands of businesses around the world. You or any business for that matter is at risk of being a victim of a ransomware attack, whether you have a computer or mobile phone, a hacker could target you….

As yet another Global cyber-attack takes hold of businesses. Customers and local businesses are warned by Taylor Made  that it’s actually employees who pose the greatest cyber threat. Yesterday a new virus hit computers across the globe, freezing users’ machines and demanding a ransom to unlock it. Nigel Taylor, managing director of Taylor Made, says…

UK businesses are adopting the Cloud. Nigel Taylor, founder and chairman of Taylor Made warns that rash decisions and quick moves can lead to disaster. Here, he talks to ComparetheCloud.net about why switching to the Cloud is a journey and to ensure your business makes a smooth transition. About the Cloud According to a recent…

20 employees are aiming to climb three of the UK’s biggest peaks in 24 hours for Wessex Cancer Trust. The Three Peaks Challenge will take place in September where the team will climb Ben Nevis, Scaffel Pike and Snowdon. They will battle tiredness, blisters and aching legs as they scale some of the UK’s most…

You’ve probably heard all the talk about Office 365 and no doubt read the “Top 10 reasons why Microsoft Office 365 rocks”. You may have even taken a look at all the tools and features and now you are wondering if Office 365 really is the solution for your business – well the answer is…

If you Google ransomware, the cyber attack in which hackers commandeer a company’s data until a ransom is paid, the resulting headlines and statistics will all point to the same conclusion: the malware has become the most prominent, global threat to business cybersecurity today. As data is the nucleus of today’s businesses, ransomware has the…

It’s happened… What now? The worst has happened and you’ve fallen victim to the recent global ransomware attacks that has rendered your information inaccessible… What do you do now? •Firstly, don’t panic. The nature of the cyber attack is to render information inaccessible by encrypting or obscuring the data, once the process has started the…

As an avid sports fan that happens to work in the technology industry, I have always tried to find similarities between the two. Not only to satisfy my own personal interests but sport can be such an emotive topic for so many people. A strategy to be ‘on-target’ In this instance I am going to…

Cyber security for obvious reasons is an extremely hot topic at the moment. With the recent surge of scam emails we are warning all businesses to be extra vigilant. Our IT experts have seen an increase in the prevalence of emails purporting to be from delivery companies but are in fact weapons of being used…

Four undeniable reasons to care about business continuity and disaster recover. As a proactive business, you know that a solid business continuity and disaster recovery plan  is essential. Why would anyone ever put a business at rick to downtime or data loss when prevetion is so easy? While some negligent businesses fail to give BCDR…

Despite how essential technology is within the work place many companies still relegate their IT systems to the bottom of the priority list. This outdated approach is apparent when an IT strategy hasn’t been devised by the business and IT leaders. A lack of communication and coordination between the IT leader and the different departments…

The business world is certainly a different place compared to what it looked like maybe ten years ago. Advancements in technology have led to more efficient ways of working. This allows businesses to become more responsive and proactive to both internal and external challenges. Whilst more employees are working longer hours than they were two…

Many businesses believe that there are only two options available – you either outsource your IT or keep it in-house, but this simply isn’t the case. Many companies provide a tailored solution that consists of a combination of the two. The level of integration and support is decided on a case by case basis, dependent…

Public, private, or hybrid cloud computing is becoming an increasingly integral part of many companies’ business and technology strategy. According to a recent survey commissioned by the Cloud Industry Forum more than four in five UK organisations have formally adopted at least one cloud service. Today 84% of companies have either hosted or cloud based…

To make one point clear, indicators of compromise (IOCs) are not threat intelligence. IOCs are a valuable source of data, but threat intelligence is the tangible information that forms the basis for your actions, based on the context in which the data originates. IOCs on their own are just one facet of what makes up…

Winter has arrived, the kids are leaving school and everyone is flat out with Christmas shopping. It’s that time of year where offices are a constant revolving door of staff going on and returning from breaks. It’s more than likely that people will forget to finish or hand over a task that they are responsible…

Time-to-detect is the period of time between when your data is compromised and when the threat is detected. Even with this brief definition it’s clear as to why the success of your data security relies on this window of opportunity to be as narrow as it possibly can. Cyber threats are becoming more and more…

Winter and the festive season are almost upon us, and businesses are thinking seriously about remote working. This is in preparation for the very real possibility of snowy days and bad weather. We want to be clear about how businesses can reap the rewards of switching to the Cloud. Flexible and remote working have long…

The cybersecurity landscape is awash with threat. Despite this, there’s still some common behaviours within business that’s having a detrimental effect on data security. It is making it easier for cyber attackers to compromise their systems. You need to review your current operations strategy and general mindset in order to safeguard your business’ sensitive or…

New figures show that cyber crime cost £11 billion last year, we are urging businesses and individuals to be scam-savvy. Cyber criminals are becoming clever in the way they target their victims. Simple steps can be taken to protect data. Figures from Get Safe Online showed that victims of cyber crime in the UK lost…

Ransomware. It’s not new by any means, it’s evolved exponentially over the last few years and dominates the malware market. Fun fact – Ransomware is now the most profitable malware type in history. Businesses are extremely vulnerable, both the enterprise and individual user. Ransomware operators are finding innovative ways to exploit companies and generate revenue….

Data breaches are practically inevitable. 91% of businesses are vulnerable to an attack, whilst 61% of businesses have experienced one or more attacks previously. While you may not be able to prevent one, to protect your operational outputs you can certainly prepare and have a disaster recovery plan in place should you encounter a data…

72% of businesses don’t have the right operational infrastructure or necessary processes in place to detect and respond to an IT data breach. Suffering a data security attack costs businesses millions annually, but it’s not just the financials that you need to have on your radar. From the same survey, 68% of businesses cited that…

Outsourcing your IT management or keeping it in-house isn’t a decision to make lightly. It all depends on what is right for your business. Both have their advantages but it’s important you know what to expect before you commit to doing it. Given the increasing cyber security threats dominating the industry, protecting your business’ data…

The trend of digital data – information garnered through computers – is rising at a rapid rate, with our current storage capacities expected to increase 10 fold by 2020. In just 30 minutes, the internet, with all of its connected devices (personal computers, smartphones etc), will generate the same amount of digital data equal to…

Technology isn’t slowing down. Your business will always be facing new trends and challenges to overcome, testing the flexibility and efficiency of your business operations. According to recent data, the demand for managed IT service providers is rising, given the ever changing complexities of IT systems and cyber security threats; 69% of SMBs are now…

The world we live in is becoming more and more integrated and digitised with people being more reliant upon technology to function in everyday operations. However there’s concern amongst IT professionals that the more technology brought into the remits of a business, the more vulnerable we become to IT security threats. Let’s revisit the past,…

Gartner predicted that in 2016 95% of security failures would either be the customer’s fault or more worryingly, the fault of poor internal data protection policies. Whether it’s the consequence of a disloyal employee or an accidental misuse of technology, it’s critical to have procedures in place should your company fall victim to an internal…

The summer season, despite its hedonistic appeal, can present business continuity problems for organisations. Summer holidays are in abundance, sickness rises due to allergies and shockingly, overall workplace productivity decreases by 20%. Business operations need to manage this tumultuous period but without micromanaging, banning privileges or restricting annual leave. Centralising your IT policy to your…

Since the emergence of remote working in the cloud, organisations are still tip toeing around the idea of bringing such technologies into the workplace with one reason being – which is a very valid one – the potential security risks. And you’d be in your right to factor in these concerns when making operational decisions….

The cloud is almost irresistible. Modern business operations are rapidly moving towards technology dependent infrastructures where agility is at the core of the strategy. Forrester Research recently predicted that the cloud market will reach $191 billion by 2020. Early adoption of new enabling technologies can be an important manoeuvre to outflank your competitors and get…

Two core technologies will have reached the end of their useful life according to Microsoft – both of these within 15 months of each other. Microsoft ceased support for Windows XP last year on 8th April, yet over 18% of users are still running this outdated operating system. This has left many businesses open to…

According to a study conducted by O2, only 23% of workers are taking advantage of the government’s flexible working legislation, so what is holding people back? The government announced new legislation surrounding flexible working practices last June, meaning any employee has the right to request to work from home or operate on an agile basis….

Collaboration has always been a crucial part of business. It drives innovation, increases workplace efficiency and facilities effective communication. This isn’t exactly news though. For some time now, smart businesses have been taking steps to adopt agile working practices and shift away from traditional workplace models that have limited the scope for effective collaboration with…

From the growing popularity of agile working practices in smart businesses, to the profound impact millennials are having on workplace culture, it’s clear that modern business is changing, quickly. And much of this change is the result of technology. Technology that has brought forth new, exciting potential for collaboration. See, collaboration is vital. It allows…

With a global digital economy that accounted for 22% of the entire world’s economy in 2015, it’s clear that technology is redefining the world of business. The business world has always taken a proactive approach to adopting new technologies – something reinforced by predictions that 25% of the world’s economy will become digital by 2020….

Every so often the business world latches on to a trend tipped to revolutionise everything as we know it. Sometimes these trends sink from our memories as quickly as they appear, but sometimes these predictions are correct – the rise of social media in marketing is a case in point. Another example that is rapidly…

Gazing into the crystal ball of business and trying to predict the future is complex. There are many factors to consider when trying to get the mists to clear. However, what is universally agreed is, whatever the workplace of the future looks like, it will be enabled through technology. When business leaders were asked what…

In the recent Global Risks Report by the highly respected World Economic Forum (WEF), business leaders across the world were asked to list the biggest threats facing business over the next decade. Cyberattacks were viewed as the single greatest business risk in North America, with global business leaders extremely concerned. They’re concerned because they know…

Whether it’s TalkTalk’s high-profile loss of almost 157,000 customer details in late 2015 or the 4000 data breaches in just three years at UK councils, cyber attacks and data breaches are becoming increasingly prevalent. And this is a problem. It’s a problem because the modern business world is driven by data. It’s a problem because…

Phishing email attacks are not a new thing they have been around for years. However our technical teams have recently seen a considerable increase in the frequency of these type of attacks. In addition, more recently these attacks have been preceded by coordinated social engineering to make them even more effective at trapping victims. So…

It’s no secret that Law Firms have been facing challenges for the past few years. Fortunately, we are now experiencing recovery, giving Law Firms a new-found confidence and optimism. In troubled times, investing in your IT infrastructure has not been your highest priority. However, with the EU introducing fines of up to 4% of revenue…

The mobile revolution is not just another buzzword to be banded around by marketing and technology giants to promote new investments – it is real, and it is changing the way law firms do business. Ready or not, the mobile technology revolution is here. Courtesy of the rising accessibility, popularity and capabilities of smartphones and…

As a leading professional IT service provider, Taylor Made Computer Solutions are all too aware of the importance of ensuring IT infrastructures are not only able to support business, but enable business growth. What’s more, when considering the legal sector, the importance of investment in your IT infrastructure becomes even more pronounced – this blog…

Relatively recently, the general consensus amongst law firms was such that both the outsourcing of IT solutions and migration of data services to the cloud were seen as too inherently risky. This attitude was also strengthened by what many law firms deemed the potential consequences of relinquishing control to managed IT providers. Summarising this sentiment…

Whilst the protection of confidential data within businesses should always be considered an absolute priority, there are few industries where this need for vigilance is quite as pronounced as it is within the world of law. However, this is just one of many reasons that well-equipped IT infrastructure is essential to ensuring your firm thrives….

Through consistently deploying new point solutions in reaction to new data sources, businesses often find themselves vulnerable to protection gaps – a typical result of the additional complexity associated with multiple, often overlapping point solutions. Given these inherent vulnerabilities, it is understandable that many businesses opt to invest in a single data protection system to…

As with many businesses, it is likely that your attempts to protect your critical data have unintentionally pushed you toward adopting a whole host of data protection services in response to new data sources. For instance, you may have implemented one system for backup and recovery for server systems within the data centre and a…

The need for AV (anti-virus) protection is not in the headlines so much these days, as this normally coincides with high profile widespread malware outbreaks. However, dangerous malware is still a very real threat and it is important to stay up to date. The term ‘malware’ refers to all possible malicious software, which can be…

We have just witnessed another of Apple’s legendary World Wide Developers Conferences (WWDC). Like most, I kept a distant but watching eye, to see if I would need to upgrade my iPhone again. Whilst they did announce IOS9, there was a distinct lack of iPhone hardware updates and my current handset can breathe a sigh…

“Thin” desktops (VDI and shared/remote desktop) form a major part of modern hosted IT solutions. I have been designing and installing desktop solutions for customers for a number of years now, and have seen the user experience get better and better along the way. The thin desktop of the past would typically be a horrible…

Although health information can sometimes seem conflicting, there are clear choices we can all make on a daily basis to help steer us towards better health. In the same way, eating the wrong foods or lack of daily exercise, will, over time, contribute to real health problems. For a while, in the short term, this…

Microsoft will shortly be releasing the next version of their Windows operating system.  It has been designed to give the end user a consistent user interface and experience across all devices, whether you are using your desktop, laptop, phone, tablet or Xbox. What’s new? Microsoft have set out to improve on the Windows 8 operating…

SURF ADDICT I’m usually glued to the TV or an extreme sports streaming website when there’s a big surf competition on and, in the last year, the coverage has become a far more immersive experience for the viewer. This is mainly because of the use of GoPro cameras on the competitors’ surfboards. I can stream…

The paperless office has been a fashionable concept for quite some time; but despite the use of email and digital documentation, going completely paperless is often seen as an unachievable goal. But what about focusing on a particular business process or department function and looking at whether there is scope to eliminate paper altogether?  #1…

Most of us are aware that developments with driverless or ‘autonomous’ cars are underway, and Google is leading the way, trialling these in the USA. Modern cars from many manufacturers are already full of technology, including accident-prevention systems such as active city stop, automatically applying the brakes at low speeds if an imminent collision is…

You may have noticed in the press information released on a newly discovered bug that is believed to be present on over 500 million computer systems worldwide. The bug commonly known as the “Bash bug” or “Shell Shock” is not a virus but an inherent vulnerability found in many computer systems and routers that use…

It is a well known fact that you can’t manage what you can’t measure. Having visibility of your IT environment along with regular reporting is essential if you are to avoid any issues that may affect productivity. However, a report on its own is not much use, unless you have the time and resources to…

The hot buzz word over the last few years has definitely been the “cloud”. The capacity to work anywhere, with all your files is a great advantage to anyone – all you need is an internet connection. Cloud storage is now available to anyone with an email address, so today I’m going to review the…

The concepts of synergy, integration and collaboration are well established in business, but these terms can be over-used. Often, they are used to frame the question of how to get more from your people and get people working together effectively. An equally valid question is ‘how can we get our systems working better for us?’…

There are very few business owners and directors in the SME business community that spend much of their time worrying about Cyber Risk or the impact this might have on their business. Of course, most will be aware from recent headlines of large corporates been hacked and some may even have changed their passwords on…

We’ve seen some nice warm weather recently and hopefully there’s more to come! But have you considered the potential impact of this on your network infrastructure? The effect of excessive heat on your servers and other equipment can be disastrous. Although many servers have built in shut-down protection, the failure of an air-con unit can…

We’re all familiar with the need for robust anti-virus protection across all devices within our organisation, especially with recent high-profile malware such as CryptoLocker. Usually the IT dept will take responsibility for ensuring 100% AV coverage – a real challenge, especially with mobile devices that may not be connected to the company network very much,…

As a software developer, I try to keep on top of the direction software is moving. I have a particular interest in the increase in popularity of “web apps”. These applications are built using modern web browser technologies such as HTML5 and CSS3, and are designed to run directly in your browser of choice. The…

Maybe balloons are the answer… In my first blog posting of 2014 I talked about Google’s autonomous and futuristic car project which could mean we’re riding shotgun with a computer driving us to work, whilst Google Now is keeping us updated on our favourite sports teams and the weather, and the length of our commute…

A data backup, no matter what method or media used should always achieve a certain number of objectives. Those objectives are not necessarily the responsibility of the person that performs the backup, after all, should securing the integrity of business data really be on one person. When that data is absolutely critical to the operation…

It appears that recovery is finally at the forefront of small business’s priority list. This at least appears to be the case based on a number of recent conversations I’ve had with prospective clients and industry insiders. Disaster Recovery and the technology/processes around it is nothing new but I have generally found that SMBs take…

For my first Blog post I wanted to share some exciting news with you all. On the 7th February 2015, I along with my Taylor Made colleague and good friend Scott Mills will attempt to climb the summit of Mount Kilimanjaro in Tanzania, Africa in aid of Taylor Made’s ‘Charity of the Year’, ‘Hampshire &…

We have already been blown away by premium “on the go” cloud services from the likes of Spotify and Netflix – giving us an endless supply of entertainment at the touch of a button, but are we facing a new generation of technology where everything from our commute to work to the items in our…

With the plethora of cloud and hosting solutions bombarding our screens on a daily basis, and possibly a need for you to upgrade your ageing IT systems; what on earth do you do? Simple… Start Planning! Just when you thought it was safe to get back in the water, just when you thought you understood…

Are you tired of your team not turning up for work, paying for training courses only for people to leave shortly after? No skill set in house to complete simple tasks? Do you need an inexpensive way to escalate technical issues without the need to pay for expensive contractors that don’t know or care about…

As a company we inform our customers and staff we ‘work to ITIL standards’. I’m not sure everybody really understands why we do or what ITIL is! In this post I’ll be giving a brief overview on ITIL in an attempt to bring some clarity! The Information Technology Infrastructure Library (ITIL for short) is a…

Are you In business for the money? Sometimes it helps… But what is enough, when do you stop, what do you do next… Sometimes is it too much, how much can you spend? Google (NASDAQ:GOOG) – major shareholder Sergey Brin unloaded 83,334 shares of the company’s stock on the open market in a transaction dated…

In today’s business market, not having a website could be a major downfall to a business – so it’s not only vital to have a website but to ensure that it’s relevant and stands out from the crowd. With the internet being accessed from not only Computers and Laptops, but mobile phones and tablets –…

The low point of my evenings out on the town is usually queuing up in a taxi rank, sometimes waiting hours for an available taxi to take me home after having a few drinks with friends. Imagine if it was just a simple case of launching an app on your Smartphone and selecting the ‘come…

A couple of years ago whilst on holiday I stumbled across a great app, and I know there are plenty of great apps, just as there are videos clips on YouTube, however sometimes sorting the wheat from the chaff gets tiresome and the time loss finding them often outweighs the benefits of using them once…

For some years now ISDN has been a stable and reliable platform for connecting corporate phone systems to the public telephone network. BT’s solid network provides nationwide coverage and multiple trunk capabilities to small and large business alike with rock solid reliability and performance. When launched over a decade ago ISDN also promised fast data…

For a lot of people the idea of converting their hard earned cash into a virtual currency seems like a dicey move but is this just the next step in cloud currency? What does it mean for your business to have a digital wallet in 2014? What is a Bitcoin? A Bitcoin is an international…

I recently stumbled across Chromecast from Google which is slightly surprising as I’m meant to be into technology! I probably missed it as I tend to drift towards Apple products and own a number of Apple TV’s. What is Chromecast? “Chromecast is a thumb-sized media streaming device that plugs into the HDMI port on your…

Support for Microsoft Windows XP ends of April 8 2014. After this date no hotfixes or Security updates will be available for this 12 year old operating system. This means any vulnerabilities found for the OS after this date will result in a free for all for any hacker with access to a vulnerable system…

Proudly powered by WordPress