Business Technology Blog

Chichester | Hampshire | Sussex

Virtualisation for businesses

The benefits of virtualisation for businesses

The process of making several types of hardware, such as servers and desktop PC's non - physical.

READ MORE

Review for multi screen attachment for laptop

Review: Multiscreen attachment for laptops

Anthony (ABM's owner) reviews his multi-screen setup for his Microsoft Surface Studio after his struggle to travel and work efficiently without a multi-screen setup...

READ MORE

Quishing scams to watch out for

Beware of Quishing Scams

Quishing is the terminology for QR Phishing. If you have an Etsy sellers account, please be careful as to the messages you engage with...

READ MORE

best practices of data backups

Best practices for data backups

World backup day is celebrated to remind everyone about the importance of protecting data and keeping your systems secure. We have created this quick article to ensure your business understands the best practices of keeping data backups. 

READ MORE

Balance Innovation and IT security blog post

Balancing Innovation and IT Security

In today's rapidly evolving digital landscape, businesses face a dual challenge: fostering innovation to stay ahead of the competition while maintaining robust IT security to protect sensitive data and assets. Balancing innovation and IT security is a delicate tightrope act that requires careful consideration and strategic planning...

READ MORE

Empowering virtual teams

Empowering virtual teams

While remote work offers flexibility and convenience, it also presents unique challenges, particularly when it comes to communication and collaboration. Fortunately, a wide range of collaboration tools have emerged to bridge the gap and empower virtual teams to work together seamlessly. In this article we highlight some of the most effective solutions available.

READ MORE

5 common cyber security mistakes SME's make

5 most common cyber security mistakes SME's make

I recently attended a fantastic event called 'Grow Digital', several speakers touched on small businesses navigating the digital world, and one of the main seminars was about cyber security. It was extremely interesting to hear all of the discussions taking place within the group of small business owners, and realising how much misinformation has shaped the IT security landscape...

READ MORE

10 tips for buying a laptop

10 pointers to look at when buying a laptop 

Tips on how to make an important purchasing decision for your business... 

READ MORE

4 tips to prevent cyber attacks

4 tips to prevent cyber attacks

Read our infographic, use it how you wish and share it with others!

READ MORE

What could an IT consultancy meeting do for your business?

Whether the meeting be via call, email, video, or in person, carving time out of your day to discuss your business expansion, new business venture, project management or system audit allows you to delegate some of the responsibility, and gain expert advice on the most efficient step forward for your IT infrastructure...

READ MORE

Common IT questions

We answered some more of your questions!

We received very IT security focused questions, but take a look, they might help you with your own business.

READ MORE

End of life notices

Please take note of these upcoming EOL dates.  We can assist you if any of these notices affect your business.

READ MORE

how safe is my data after a hack

How safe is my data after a hack?

we recognise that prevention does not always apply, and that bad things happen. Lets talk about how your reaction to a hack can help limit some of its nasty side effects, what clues to look for to decide how safe your data is after a hack, and what steps to take if you feel you are under further threat. 

READ MORE

Asking AI about the future of the IT support industry

Asking AI about its plans for the IT support industry

We decided to ask ChatGPT about how it thinks AI will improve the IT support industry, here is its response:

READ MORE

Zero click attacks

Zero-click attacks

There has been a consistent trend in the use of zero click attacks to obtain private data and to spy on victims. These attacks exploit the vulnerabilities in a device or software, this allows the hacker to remotely execute malicious code...

READ MORE

Augmented Virtual Reality

Augmented / Virtual Reality Devices

As new exciting releases hit the market, we want to show you your options, rather than highlighting one product. There are budget-friendly solutions to your AR/VR device requirements. 

READ MORE

Common It mistakes when kitting out your office

Common IT mistakes with office infrastructures

We have now reached the season of office moves! Here are our pointers to ensure that your business relocation stays within budget and to your specified timescale.

READ MORE

6 benefits of an efficient phone system

Benefits of an efficient phone system

We have put together a list of pointers about what makes up an effective phone system for a business, and how it benefits your staff...

READ MORE

Let ABM answer your IT questions

We answer your IT questions

We have collected all of the questions we have been asked by customers, potential customers, friends, relatives, business associates and through our online form and we answer them here. This page is updated regularly. 

READ MORE

World Backup Day March 31st

IT Security

World Backup Day - 31st March

Celebrated to remind everyone about the importance of protecting data and keeping your systems secure. We have put together some important data backup and cyber security information to keep your business secure. 

READ MORE

Make sitting at your desk more comfortable

Technology Insight

Make sitting at your desk more comfortable

When you work a desk job a huge concern is always the affect it may have on your body. Sitting down for 8 hours (or more) a day has been proven just as bad as laborious jobs. Here are some products we recommend.

READ MORE

Clicked on a bad link article

IT Security

I think I clicked on a bad link...

Don't panic. It happens to the best of us, these criminals have become highly capable at achieving their goals. We recommend following these steps...

READ MORE

Office 365 email security breach

IT Security

Security Update: Watch out for this Office 365 breach

We recently learned of a case where a person wasn't able to send or receive emails in Office 365. Upon investigation it turned out that their account had been hacked, likely through clicking into a phishing email and then entering email address and password on a fake webpage.

READ MORE

Beware of overheating technology

IT Information

Beware of overheating technology! 

In warmer weather you run the risk of letting your technology over heat. Here in the 'never-really-that-hot-UK' (until it is, and then we all melt) most office environments have fans cooling employees down, but leaving technology to fend for itself.

READ MORE

End of life internet explorer

IT Information

Internet Explorer - end of life

There is possibility Internet Explorer will be removed from Windows 10 on the 15th June.

READ MORE

IT Security - Cyber security article

IT Security

Infection Types

No matter how careful you are, getting a virus on your machine can sometimes happen. Different infections complete different tasks. Read below to understand what each virus aims to achieve.

READ MORE

Server installations Chichester

IT Information

Is it time to upgrade your server?

When anyone mentions 'server', immediately the first reaction is dread followed by, 'cost' and then 'downtime'. At ABM we have been supplying comprehensive server solutions for over 20 years. We know how to save a company money where required and how to complete a server migration with as little downtime as possible (if any at all). Here is our process for understanding what a company will require from their server...

READ MORE

Be careful on public WiFi IT security

IT Security

Be careful on public WiFi

Public WIFI has become a common selling point for many businesses. It is so easy to visit your favourite coffee shop and almost instantly have access to the internet, for free. But what are the dangers of using this open network? There are many precautions you can take to prevent a data breach...

READ MORE

Technology Timeline

Technology Insight

Technology through time...

ABM have researched the top 20 technology products released / greatly improved year on year since the 2000's, and have put them in a timeline for you all.

READ MORE

Dual Monitors benefits of working efficiently

IT Information

The benefits of dual monitors...

The university of Utah completed a recent study, confirming that with two monitors, task productivity increases by 25% and with three monitors 35.5%.

READ MORE

Password Protection - IT security advice

IT Security

Password Awareness

How do you create an effective password? What are the do's and don'ts of password use?

READ MORE

© Copyright 2024 ABM Computer Solutions. All Rights Reserved.