This is a part 1 of a 2 part series on security basics. This week, we will focus on staff, and next week, we will give...
Our Blog
Junior IT Support Technician
Prevos Solutions require an Junior IT Support Technician to provide excellent IT service to its rapidly growing list...
Security Risk when
using Microsoft Outlook
A critical security vulnerability has been identified in the Microsoft Outlook desktop client, tracked as...
Helping Customers Choose the right Microsoft Product
As an approved Microsoft reseller, customers choose us to resolve their IT challenges with software which meets their...
How to choose a strong Passw0rd (Hint: don’t use the commonly used one in this title!)
“But I’ll think of a strong password and use it everywhere”. Not recommended either, because if this is cracked in one...
5 IT Security Best Practices
The terms computer viruses, ransomware, and trojan horses frequently evoke fear and dread on the part of business...
Using a Public Wifi Hotspot – Is it Safe?
You’re settling down in a comfy chair in the café with your latte. You take out your phone, and see ‘FREE Wifi’ in the...
Disaster Recovery – Plan for the Worst, Hope for the Best
Disaster Recovery (DR) is a system by which a company avoids significant economic losses when its IT infrastructure is...
Choosing a Computer For Your Business
There are great deals available for a new PC or laptop for your business. Here are 6 areas to consider to ensure you...
Guest Blog: Organizations ‘not doing enough’ to prevent data breaches
Organizations need to do more to prevent themselves from experiencing data breaches, as many people realise that not...
Presentations on a Laptop: Avoid these IT pitfalls
You've booked the venue, a lot of people have signed up, you've created a great presentation on your laptop....
Guest Blog: Gerry Cleary, Galway International Arts Festival
Galway International Arts Festival has been connecting audiences and artists for over 39 years. Founded in 1978, it...