Category: Blog

The Ideal setup for your IT Systems (Part 1)

The ideal setup for your IT Systems In this blog, I will set out the ideal setup for your business IT systems. It represents current best practices for small and medium-sized businesses, with an ever-increasing eye on cyber security. Initially, I thought it would be a single blog, but it turns out there is a

Read More

Why Hackers Hack

Victims of hacks and attempted hacks often take it personally. Why did they come after me? I’m not famous or rich. Why did they come after my company? We’re just a small business. That’s a perfectly natural human reaction. The fact is that cyber-attacks are rarely personal or business-specific. Hackers are ready to exploit any

Read More

Phishing emails Webinar

https://freshmango.co.uk/wp-content/uploads/2021/07/Phishing-emails-Webinar.mp4Here is a 20-minute webinar by Guy Phoenix on phishing emails. Well worth a look!

Read More

Why don’t I have Administrator Credentials on my PC or Laptop?

Why don’t I have Administrator Credentials?! We’re asked this question from time-to-time, and the short answer is it is standard IT policy for any professionally managed IT network. If you’re keen to understand why this is the case then read on! IT History – Standardisation In any business or organisation, standardisation in your IT systems

Read More
Fresh Mango Technologies Jim Robot