We have been in the technology business for over 20 years, and in that time, some questions have come up time and time again.
So, we've collected them and decided to answer them all here!
Hopefully this helps you understand the world of IT a little better.
If you have another question that we haven't answered, feel free to ask us!
IT Support is the use of trained IT specialists for support with your computer-related needs. The use of this service helps you to resolve any computer problem that you may have. Good IT Support allows your employees to continue working and keeps your company’s data safe.
In short, yes. If Coca Cola and a freelancer lost all of their data files, it would have the same impact on their respective businesses. No matter your business size, some level IT support is needed. You never know what might happen to your PC.
Every business needs at least some form of IT support. If your business is an SMB, then you can benefit from the reduced cost compared to hiring external staff. If you are a larger business, then IT support can supplement your existing team or take it over entirely.
There are many reasons why your business requires at least some level of support. These include: productivity, time, scalability, and saving money.
In the majority of cases, IT MSPs such as ourselves are very happy to work alongside internal IT departments, especially if your business has a high number of users who require both remote and onsite support.
If you want to know more about IT Support, click the button below!
Locking your machine is very important for security, especially at work. To do this, click the Windows Key and L on your keyboard.
Having access to your emails is crucial in a hybrid working world. We have a very handy guide to help you through this here.
Firstly, turn off the printer. Then carefully remove any visible paper, being careful not to tear it. Also, open the printer door and find any more paper that may be stuck. This should resolve the issue. Always send a test print to check that the printer is working correctly.
The more memory you have, the better. Initial costs will be higher, however, you must consider the cost of upgrading memory further down the line.
There are many reasons a computer may crash or freeze. In this case, try and restart the computer. If the problem still isn’t fixed, contact your IT provider.
Double click the recycle bin icon on your desktop. Then, select the files you want to recover, right-click them and press restore. For more information, check out our video guide here.
It is possible to do this, but only if the email recipient used Microsoft 365 or Microsoft Exchange email accounts within your organisation. In Outlook, double click to open the email and under messages, choose actions and then recall this message.
Here at TechWyse, we run a hardware recycling scheme. If your tech is still in working condition, we are happy to restore it and donate it to a local school or charity. Click here to find out more.
Check what programs are running on your PC. If the file is open, you won’t be able to delete it. If not, then restart your PC and try again.
There is no need to replace computers every year or upgrade to the newest model when it is released. If you have a warranty, you can repair your existing device for free, which is always a good option. After the warranty expires then it is advisable to start looking. If a device reaches between 3-5 years, depending on how often it is used, we suggest purchasing a new device.
If you want to know more about IT Support, click the button below!
"The cloud" refers to servers that are accessed over the Internet, and the software and databases that run on those servers. Cloud servers are located in data centres all over the world.
Every business is different. For some, a hybrid approach to the cloud may be more suitable. This is especially true if they use specific software that requires a physical server. If you would like to discuss your options, get in touch with our team.
Cloud computing is described as the process of using a network of remote servers, hosted via the internet, to store, manage and process data, rather than hosting it locally. This means your business does not need to invest in its own hardware.
A cloud backup service saves copies of your business’s files to another location. This is very useful because if you were to lose your files or accidentally delete them, you have an external backup from which you can recover them.
Your backups may be stored in various locations around the world. However, for Data Protection purposes you will want it stored in the country you operate. That’s why we offer UK data storage for all our clients.
Not always. It depends on individual businesses. For many, most of the applications you use are already accessed online. However, businesses that use specific software will still need to keep their on-premise servers. If you have any questions, get in touch with our team.
There are different pricing mechanisms depending on your provider, however, the majority operate on a pay-as-you-go service. This is where you pay month to month or year to year with a rolling subscription.
There are 4 different types of cloud:
Public Clouds - Cloud environments that are not owned by a single user, but are shared. These include Google Cloud, Microsoft Azure and AWS.
Private Clouds - These are cloud environments that are solely used by one group or organisation. They can also be deployed by a third party. This is called Managed Private Clouds.
Hybrid Clouds - This refers to seemingly single environment created by a number of cloud environments that are connected. Every IT system is likely to have hybrid cloud elements, when data moves in and out of each separate environment.
Multiclouds - Multiclouds are an approach made up of more than 1 cloud service from more than 1 cloud vendor. they become hybrid clouds when they are connected by some form of integration.
Office 2021 is sold as a one-time purchase, which means you pay a single, up-front cost to get Office apps for one computer. One-time purchases are available for both PCs and Macs. However, there are no upgrade options, which means if you plan to upgrade to the next major release, you'll have to buy it at full price.
Microsoft 365 is a subscription that includes the most collaborative, up-to-date features in one seamless, integrated experience. Microsoft 365 includes the robust Office desktop apps that you’re familiar with, like Word, PowerPoint, and Excel. You also get extra online storage and cloud-connected features that let you collaborate on files in real-time.
It all depends on what tier of Microsoft 365 you have access to. Here is the complete list of all available on the top tier called Microsoft 365 Business Premium:
Bookings, Delve, Excel, Forms, Kaizala, Lists, OneDrive, OneNote, Outlook, Planner, Power Apps, Power Automate, Power Bi, PowerPoint, Project, SharePoint, Stream, Sway, Teams, To Do, Visio, Viva, Word, Yammer.
OneDrive is an online storage service where you can store all your files. This allows you to access them from any device once you have signed into your linked account.
SharePoint is an online-based service that allows you to create sites to share files and collaborate across your business.
"OneDrive is like your data server, SharePoint is the online file explorer"
Windows 365 is the world’s first Cloud PC. Windows 365 securely streams your personalised Windows desktop, apps, settings, and content from the cloud to any device. A Cloud PC provides customers with a virtualized computing experience where you can stream your Windows from the Microsoft cloud to any device.
Want to know more about Cloud Services? Click the button below!
Cyber security's core function is to protect the devices we all use (smartphones, laptops, tablets and computers), and the services we access, both online and at work, from theft or damage.
No matter the size of your business, you may be a target of a cyber attack. For this reason, we recommend a basic level of protection for all businesses. The general rule of thumb is, you can never be "too secure".
A Cyber security ‘incident’ is when an attack doesn’t result in a breach of the business. For example, if the attack is successfully repelled & the company’s data isn’t compromised.
A Cyber security ‘attack’ is when the business’s security system has been breached and they have been impacted by it. For example, you have lost access or confidential data has been leaked.
A Cyber Security ‘threat’ is when there is a possibility of a malicious attempt to damage or disrupt a computer network or system.
Cyber Essentials is an effective, Government backed, scheme that will help you to protect your organisation, whatever its size, against a whole range of the most common cyber-attacks. To know more about Cyber Essentials, get in touch with our team.
In the majority of cases, IT MSPs such as ourselves are very happy to work alongside internal IT departments, especially if your business has a high number of users who require both remote and onsite support.
The maximum fine under the GDPR is up to 4% of annual global turnover or €20 million. The UK’s ICO (Information Commissioner’s Office), can take a range of other actions, including warnings, reprimands, and temporary or permanent ban on data processing.
Yes, it is strongly recommended. We are able to recommend the correct insurance for any size of business.
Phishing is the practice of sending emails pretending to be from a reputable company. They do this in order to get individuals to reveal personal information, such as passwords and credit card numbers.
Multi-factor authentication (MFA) is an extra layer of security for your online accounts. When you sign in, you may be asked to enter a code that was sent to your mobile, or accept a pop up notification. This is MFA.
Malware is software designed to cause harm to your network. Once on a computer, malware can cause harm or disruption, or steal information. One of the most common ways to get malware on your machine is to click on dodgy links on an email or download a malicious attachment.
A computer virus is a software program that has been intentionally created to cause a user grief, spread to other computers, or destroy data on an individual's computer.
Antivirus is a piece of software installed on your device that is designed to detect and destroy and viruses it finds. All devices should have some form of antivirus installed.
Yes, antivirus is an important layer of security that should not be overlooked. Antivirus software works by not only detecting and removing viruses, but securing your data against all different types of attacks.
Adware is a type of software that has the ability to display advertisements on your computer. Adware watches as you surf the Internet to collect information about your behaviour. It logs your online activities and personal information to create a user profile and sends it to a data collection site.
Ransomware is a type of software designed to prevent you from accessing your files and applications until a request is fulfilled. This is typically a payment to the attacker.
Encryption is a technique where data is encoded when it is stored so that it cannot be read without the use of a password/encryption key. This helps to protect the data from unauthorized, malicious or accidental access.
Encryption is a technique where data is encoded when it is stored so that it cannot be read without the use of a password/encryption key. This helps to protect the data from unauthorized, malicious or accidental access.
There are many different examples of a secure password, but as a minimum, we suggest having a combination of numbers, letters and symbols and a minimum password length of 8. You should create a new password for every online account you use.
We recommend having a password manager support you with this.
Unfortunately, cyber threats are common, and it isn’t always obvious that your cyber security has been compromised. However here are some common signs.
Disaster recovery is a form of IT planning to ensure security measures are in place should a natural disaster, hardware malfunction or user error occur. The key is to have a plan in place to deal with any issues that occur. This could include cloud backups to ensure a copy of all your data is stored off-site.
Want to know more about Cyber Security? Click the button below!