Search again

Anywhere in particular?
Knowledge base

Locky: a “good” example of malware

What is Locky? Locky is a lesser known piece of ransomware that was first released...

Knowledge base

How to move the WSUS database to a different location

Windows Small Business Server can control windows updates that domain PCs install with the WSUS...

News

Email scams: spoof, spam, phishing and attachments.

The majority of business communications are carried out by email.  It is a highly useful...

Knowledge base

How do I find the full location of a network drive?

In order to find the full location of a network drive that is mapped to...

News

Securing the Internet of Things

The Internet of Things (or IoT for short) can be described as the connecting of...

Knowledge base

Unable to connect to TCP port 2000 on a Cisco Router with NAT

If you are unable to connect to TCP port 2000 on a Cisco router that...

Knowledge base

Beaming example IPv6 Cisco broadband router configuration

Example IPv6 Cisco broadband router configuration The following configuration shows the basic commands to add...

Knowledge base

All about IPv6 and how Beaming allocates IPv6 address prefixes

Find out what IP version 6 is and how we allocate IPv6 address prefixes A...

Knowledge base

What is smishing?

Smishing – or SMS phishing – is a term for malicious text messages sent by...

Knowledge base

How to detect spoof and phishing emails on a mobile device

As a follow up to our recent article on how to spot and stop phishing...

Knowledge base

How do I install a new printer?

Even if you do not have local administrative privileges, it can be quite simple to...

Knowledge base

How to change your password from a terminal server

Continuing our series of frequently asked questions from our technical helpdesk, we’ve got a short...

Knowledge base

Powershell script to remove Sage temp files

If you host Sage files on a file server, then you may have noticed that...

Knowledge base

BeamRing IPW56 – How do I transfer a call?

Knowledge base

BeamRing IP54W – How do I transfer a call?

Knowledge base

How to set up multi-factor authentication in O365

Improving your business’s cyber security

  • This field is for validation purposes and should be left unchanged.