Part 2 of a 2 part series on security basics. Last week, we focused on staff, and this week, we give a security basics...
Our Blog
Security Basics Part 1: Staff
This is a part 1 of a 2 part series on security basics. This week, we will focus on staff, and next week, we will give...
Junior IT Support Technician
Prevos Solutions require an Junior IT Support Technician to provide excellent IT service to its rapidly growing list...
When Should You Replace Your Server?
As the cost of replacing a server can be substantial, many organisations want to delay this for as long as possible....
Helping Customers Choose the right Microsoft Product
As an approved Microsoft reseller, customers choose us to resolve their IT challenges with software which meets their...
How to choose a strong Passw0rd (Hint: don’t use the commonly used one in this title!)
“But I’ll think of a strong password and use it everywhere”. Not recommended either, because if this is cracked in one...
5 IT Security Best Practices
The terms computer viruses, ransomware, and trojan horses frequently evoke fear and dread on the part of business...
Using a Public Wifi Hotspot – Is it Safe?
You’re settling down in a comfy chair in the café with your latte. You take out your phone, and see ‘FREE Wifi’ in the...
Disaster Recovery – Plan for the Worst, Hope for the Best
Disaster Recovery (DR) is a system by which a company avoids significant economic losses when its IT infrastructure is...
Choosing a Computer For Your Business
There are great deals available for a new PC or laptop for your business. Here are 6 areas to consider to ensure you...
Guest Blog: Organizations ‘not doing enough’ to prevent data breaches
Organizations need to do more to prevent themselves from experiencing data breaches, as many people realise that not...
Presentations on a Laptop: Avoid these IT pitfalls
You've booked the venue, a lot of people have signed up, you've created a great presentation on your laptop....