Need immediate IT support? Even if you're not a customer call 01329 888625 now for priority support!     Remote support

Instant IT support? Call 01329 888625

Blog

Blog

Apple Denies the FBI’s Requests to Unlock Terrorist’s Phone

Posted on 4th March 2016, by Pete Matheson

The world has been abuzz with discussion about tech giant Apple, which recently received a request from the United States government to create a workaround to Apple Encryption. This workaround would give the FBI access to the iPhone owned by the perpetrator of the recent act of terrorism in San Bernardino, California. No one agrees … Continue reading “Apple Denies the FBI’s Requests to Unlock Terrorist’s Phone”

DL380: 4 Must-Have Features of the New HP Server

Posted on 26th February 2016, by Pete Matheson

The most recent HP DL380 server was released in 2014 to wide-spread success. Small and large businesses throughout the UK are embracing this scalable solution. In fact, it’s become one of the best-selling HP servers on the market. The newest model, the Gen9, was completely redesigned prior to its release. The Gen9 model is scalable … Continue reading “DL380: 4 Must-Have Features of the New HP Server”

MDM – mobile device management made easy with Meraki

Posted on 19th February 2016, by Pete Matheson

While we work with other MDM systems, we suggest Cisco’s Meraki to our clients because we believe they deserve the best solution in the marketplace.  Meraki takes enormous burdens off your information technology staffers.  Meraki helps you do more than just manage your company-owned smartphones, tablets, personal computers and laptops. It tells you their most recent geographic location, how often and how … Continue reading “MDM – mobile device management made easy with Meraki”

Why Businesses Are Turning Towards Hosted Telephony

Posted on 5th February 2016, by Pete Matheson

It is well-known among businesses that telephone services are incredibly interwoven with our day-to-day lives. Inasmuch, it is becoming increasingly common for businesses to turn to hosted telephony, using a private branch exchange (PBX) within their corporation. This is a lot less expensive than using traditional external lines, and offers a multitude of benefits within the organization. … Continue reading “Why Businesses Are Turning Towards Hosted Telephony”

BYOD, the Security Risks Associated, and Mitigation

Posted on 29th January 2016, by Pete Matheson

In the age of mobile devices, perhaps you have already considered BYOD and the security risks associated with them. BYOD has obvious benefits in terms of employee satisfaction and cost, especially if the employees are purchasing their own devices. That said, especially if employees are purchasing and bringing their own devices, these devices present serious … Continue reading “BYOD, the Security Risks Associated, and Mitigation”

Warning over email security

Posted on 11th December 2015, by Pete Matheson

We have recently been made aware that there has been an unprecedented increase in the amount of targeted email attacks on businesses. These attacks are at an all-time high, and are becoming more successful as attackers come up with more sophisticated methods. A few examples of how these attacks may happen are listed below. Method … Continue reading “Warning over email security”

Christmas 2015 Opening Hours

Posted on 10th December 2015, by Pete Matheson

Please see below for our 2015/2016 opening hours over the Christmas and New Year period. Thursday 24th December – Open Friday 25th December – Closed Monday 28th December – Closed Thursday 31st December – Open Friday 1st January – Closed From everybody at Tekkers IT Solutions, we hope you enjoy a relaxing and fun filled festive period!

Welcome to Craig Nixon

Posted on 2nd April 2015, by Pete Matheson

We are excited to welcome another new member of staff this week. Craig Nixon comes from Radian, where he was responsible for the installation, management and monitoring of the core infrastructure services for 1800+ users. This included HP Proliant and Blade servers, NetApp, VMware, Citrix and Cisco infrastructure as well as core services running on … Continue reading “Welcome to Craig Nixon”

Insecure Hotel WiFi

Posted on 2nd April 2015, by Pete Matheson

An article from The Register highlights a growing security risk amongst those travelling on business. If you are a user of hotel WiFi, whether it’s free or (more likely) paid for – you must also be aware of the risks from using this network. Since the network has any number of unknown users at any … Continue reading “Insecure Hotel WiFi”