01892 614040 info@cencom.co.uk
Go With The Flow

Go With The Flow

In November I have been Going With The Flow This last few weeks we have been looking at the new Microsoft Flow. It appears to be the solution to so many of the problems found when using cloud services that I have spent some time trying to use it to meet a number of...

Cyber Essentials

Cyber Essentials

Cyber Essentials is a UK government backed certification showing that your organisation meets a minimum level of good security practice. Most of these things, if you are a client of CenCom we will be doing for you but the certification is a requirement for any...

Keeping Safe With Email 1

Keeping Safe With Email 1

Keeping e-mail Safe and Secure series Don't confuse Phishing, Spam and Viruses It is easy to confuse which is which but here is the simple definition Virus: this is usually an attachment to an email or it could be a link to a download or webpage which will infect your...

Outlook Tips 1

Outlook Tips 1

Outlook 2010, 2013 and 2016 Outlook has been around for some considerable time and is the favoured mail, calendar and contact manager for most serious businesses, People tend to take for granted how you use it but some of the tips below might be new to you and can...

HTTPS by default

HTTPS by default

Websites are becoming secure by default, Should yours? You will probably have seen some sites start https:// and others only http:// and you may have read all the advice about making sure you can see a padlock when you are on your bank website or you are entering your...

Is a password enough

Is a password enough

Is a password enough? Security is a balance between usability and protection, A truly secure computer is in a physically locked box with no power, but that's not practical. People need to use the systems and that is when the problems start both for people who want...

Are you at risk from data pirates?

Are you at risk from data pirates?

Are you at risk of the data pirates? We used to think of viruses as something malicious created for no other reason than to do damage. Most virus attacks were untargeted and caused by bad practice and were reasonably easy to protect against with good working practice,...

Choosing Your Printer

Choosing Your Printer

Firstly you have to ask yourself, what are my current and future printing needs? Do I print a lot of photos and images, or is it more text documents that I print? To gain a more simple understanding of why these simple questions are important to answer before choosing...

Mobile Broadband: 3G Vs 4G

Mobile Broadband: 3G Vs 4G

A hot topic for many people in today’s society is: why cant I get any 3G service here? This is due to coverage of 3G mobile internet only being required to cover 80% of the population, while 20% of the nation is left in the dark. This causes a real problem for some...

Solid State Drives Should You Upgrade?

Solid State Drives Should You Upgrade?

Solid state drives or SSDs are beginning to replace hard disk drives (HDD), and many of you will not understand the difference between the two. However there is a big difference between the two, and not just the price.  Despite the fact that an SSD drive with a...

Passwords Are Important

Passwords Are Important

Password Advice One of the problems with passwords is that users forget them. In an effort to not forget them, they use simple things like their dog’s name, their son’s first name and birthdate, the name of the current month- anything that will give them a clue to...