Navigating remote work: The crucial role of reliable IT Support and Cybersecurity

In an era where remote and hybrid working models have become the norm, businesses are rapidly adapting to new digital landscapes. The shift has brought forth unprecedented opportunities, but it has also exposed companies to unique challenges, making reliable IT support and robust cybersecurity more critical than ever. Enter expert firms like Codus IT, who not only offer a lifeline for technical issues but also pave the way for streamlined operations, innovation, and fortified defenses against cyber threats.

The Changing Landscape

The remote and hybrid working trend has reshaped the traditional office setup. Employees now collaborate from various locations, relying heavily on digital tools and connectivity. While this transformation has enhanced flexibility and productivity, it has also ushered in a host of technical complexities. From network vulnerabilities to software compatibility issues, companies face a daunting array of potential pitfalls.

The Role of Reliable IT Support

Seamless Operations: Imagine a scenario where your team is on the brink of an important virtual presentation, and suddenly, the network crashes. Reliable IT support acts as a safety net, ensuring that your operations run smoothly without disruptive technical glitches.

Enhanced Security: With remote work, the need for robust cybersecurity measures is paramount. IT support experts like Codus IT can implement cutting-edge security protocols to safeguard sensitive data.

Efficient Problem Solving: When faced with technical issues, every moment counts. Professional IT support offers swift troubleshooting, minimising downtime and maximising productivity.

Resource Optimisation: Outsourcing IT needs to experts allows your in-house team to focus on strategic initiatives rather than getting bogged down by routine technical challenges.

Scalability and Innovation: As your company evolves, so do your IT requirements. A proficient IT support partner can align your digital solutions with your growth trajectory, ensuring scalability and fostering innovation.

The Vital Importance of Cybersecurity

Data Protection: In the digital age, data is a valuable asset. Robust cybersecurity measures protect your business data from unauthorised access and breaches.

Phishing and Social Engineering: Cybercriminals are adept at exploiting human vulnerabilities. Comprehensive cybersecurity includes education and training to empower employees to recognise and respond to phishing attempts.

Secure Communication: Remote collaboration relies heavily on digital communication tools. Cybersecurity ensures that sensitive information shared through these channels remains encrypted and protected from interception.

Endpoint Security: With devices scattered across different locations, endpoint security becomes critical. Effective cybersecurity measures ensure that every device connected to the network is fortified against potential threats.

Compliance and Regulations: Depending on your industry, remote work might bring forth specific compliance challenges. Adequate cybersecurity measures ensure that your operations adhere to relevant regulations.

Codus IT: Your Trusted IT and Cybersecurity Partner

With a proven track record and a team of seasoned professionals, here at Codus IT we specialise in delivering bespoke solutions tailored to the unique needs of each client. Our comprehensive approach encompasses network management, cloud integration, and cutting-edge cybersecurity.

Embrace the Future with Codus IT

In a landscape that’s rapidly evolving, businesses must stay ahead of the curve. If your company is grappling with the challenges of remote and hybrid work, it’s time to consider the invaluable support of experts like Codus IT. By entrusting your IT needs and cybersecurity to a reliable partner, you’re not only ensuring seamless operations but also safeguarding your digital assets against threats.

Safeguarding your growing business: The crucial role of cybersecurity and outsourced IT support

In today’s digital landscape, where technology plays a pivotal role in every aspect of business operations, ensuring the security of your organisation’s data and systems is of paramount importance. As your business grows and expands, so does the risk of cyber threats and vulnerabilities. This is where a robust cybersecurity strategy and outsourced IT support come into play, offering comprehensive protection and expert guidance. In this article, we will delve into the significance of cybersecurity for a growing business and how outsourcing IT support can be a game-changer in safeguarding your valuable assets.

The Expanding Cyber Threat Landscape

With each passing day, cyber threats are becoming more sophisticated and pervasive. Hackers, malicious actors, and cybercriminals are constantly evolving their tactics to exploit vulnerabilities in digital systems. Small to medium-sized businesses, in particular, have become prime targets due to their limited resources and often inadequate cybersecurity measures. According to recent reports, more than 43% of cyberattacks are aimed at small businesses.

The Importance of Cybersecurity for Growing Businesses

1. Protecting Sensitive Data: Growing businesses accumulate a vast amount of sensitive data, including customer information, proprietary research, and financial records. A single data breach can result in severe reputational damage, financial losses, and even legal consequences. Implementing robust cybersecurity measures helps protect this critical data from unauthorised access, ensuring the trust of your customers and business partners.

2. Maintaining Business Continuity: Downtime caused by a cyber incident can be devastating for any growing business. Cyberattacks can disrupt operations, paralyse networks, and lead to significant revenue losses. A well-designed cybersecurity strategy, coupled with outsourced IT support, helps minimise the risk of such disruptions and ensures smooth business continuity.

3. Complying with Regulations: With the introduction of data protection regulations, businesses are now legally bound to protect customer data. Failure to comply with these regulations can result in hefty fines and legal penalties. Outsourced IT support can help ensure your business meets the necessary compliance requirements and avoids potential legal pitfalls.

The Role of Outsourced IT Support

Expertise and Experience: Cybersecurity is a complex field that demands specialised knowledge and continuous learning. Outsourced IT support brings a team of skilled professionals who possess the expertise and experience required to safeguard your business against evolving cyber threats. These experts stay updated with the latest trends, tools, and techniques, providing you with a competitive advantage in the realm of cybersecurity.

Cost-Effective Solutions: Building an in-house IT team solely dedicated to cybersecurity can be expensive for growing businesses. Outsourcing IT support allows you to access a range of services tailored to your needs without the significant overhead costs. Whether it’s 24/7 monitoring, vulnerability assessments, or incident response, outsourced IT support offers flexible and cost-effective solutions.

Scalability and Adaptability: As your business grows, so do your IT needs. Outsourced IT support offers scalability, allowing you to easily adjust services based on your requirements. Whether you’re expanding your workforce, opening new branches, or integrating new technologies, a reliable IT partner ensures that your cybersecurity framework remains robust and adaptive.

In an era dominated by digital connectivity and persistent cyber threats, prioritising cybersecurity is no longer optional for growing businesses. By investing in a robust cybersecurity strategy and leveraging the expertise of outsourced IT support, you can safeguard your valuable assets, protect sensitive data, and ensure uninterrupted business operations.

At Codus IT, our team of IT professionals understands the unique challenges faced by growing businesses and is dedicated to providing tailored cybersecurity solutions. Don’t leave your business vulnerable to cyber risks. Take the proactive step of speaking to our expert team at Codus IT today. Let us help you fortify your defenses and navigate the complex world of cybersecurity, so you can focus on growing your business with confidence. Contact us now and let’s start securing your digital future together.

Harnessing the Power of Outsourcing IT Support: The Benefits for a Growing Business

In the digital age, information technology (IT) has become the backbone of every business, regardless of its size or industry. As a growing business, outsourcing IT support services can significantly impact your operations and overall success.

However, maintaining an in-house IT department can be expensive and resource-intensive. This is where outsourcing IT support services comes to the rescue. In this blog post, we will explore the numerous benefits of outsourcing IT support for a growing business and how it can help you streamline your operations, enhance productivity, and achieve sustainable growth.

Cost Savings

One of the primary advantages of outsourcing IT support is cost savings. Building an in-house IT department requires substantial investment in recruitment, training, and infrastructure. Outsourcing eliminates these upfront costs, allowing you to leverage the expertise of an external IT team without the financial burden. By partnering with a reputable IT support provider, you gain access to a team of skilled professionals who can efficiently handle your IT needs at a fraction of the cost of maintaining an in-house team.

Access to Expertise and Specialised Knowledge

IT support providers specialise in managing a wide range of IT issues and challenges. By outsourcing your IT support, you tap into a pool of highly skilled professionals with diverse expertise and experience. These experts stay up-to-date with the latest technologies, security threats, and industry best practices, ensuring that your business benefits from cutting-edge solutions and proactive support. Their specialised knowledge can help you overcome complex IT hurdles, implement efficient systems, and optimise your IT infrastructure to support your growth objectives.

Scalability and Flexibility

As your business grows, so do your IT requirements. Outsourcing IT support offers unmatched scalability and flexibility. An external IT support provider can quickly adapt to your changing needs, whether it’s scaling up or down, integrating new technologies, or addressing emerging IT challenges. They can accommodate fluctuations in demand, provide additional support during critical periods, and ensure that your IT infrastructure aligns with your evolving business goals. With an outsourced IT support team, you have the freedom to focus on core business functions while leaving the IT complexities to the experts.

Proactive Monitoring and Issue Resolution

Downtime and technical issues can cripple a growing business. Outsourced IT support providers employ advanced monitoring tools and proactive maintenance strategies to identify and resolve potential issues before they disrupt your operations. They can monitor your systems 24/7, detect vulnerabilities, and implement security patches and updates promptly. By proactively managing your IT infrastructure, they minimise the risk of downtime, data breaches, and other IT-related setbacks, allowing you to maintain seamless operations and uninterrupted productivity.

Enhanced Data Security and Compliance

Data security is a critical concern for businesses of all sizes. With cyber threats becoming increasingly sophisticated, safeguarding sensitive information is paramount. Outsourcing IT support provides access to a team of experts who are well-versed in the latest security measures and compliance requirements. They can implement robust security protocols, perform regular backups, monitor for potential breaches, and ensure that your business remains compliant with industry regulations. By mitigating security risks, you protect your valuable data, preserve your reputation, and build trust with your customers.

Outsourcing IT support for a growing business offers a multitude of benefits that can significantly impact your operational efficiency, productivity, and bottom line. By leveraging the expertise of external professionals, you gain cost savings, access to specialised knowledge, scalability, proactive monitoring, and enhanced data security. These advantages allow you to focus on core business activities, stay ahead of the competition, and navigate the ever-changing IT landscape with confidence. As you plan your business’s growth trajectory, consider outsourcing your IT support to Codus IT by contacting our team on 0161 7634529.

Cloud Migration and outsourced IT management

Cloud computing has revolutionised the way businesses operate, providing a range of benefits that were previously unavailable to small to medium-sized businesses.

As more companies are embracing the cloud, it’s becoming clear that cloud migration can be a game-changer, particularly when combined with outsourced IT management. In this article, we’ll discuss the benefits of cloud migration for small to medium-sized businesses and why it’s important to partner with an outsourced IT management provider.

Cost Savings

One of the most significant benefits of cloud migration is cost savings. With the cloud, businesses can avoid the expense of purchasing and maintaining expensive hardware and software. Cloud computing providers offer pay-as-you-go pricing models, which means businesses only pay for the resources they use, making it much more cost-effective than traditional on-premise IT solutions. Additionally, outsourcing IT management can also help reduce costs by providing access to a team of experts who can optimise resources and ensure efficient use of technology.


Another major advantage of cloud migration is scalability. With traditional on-premise solutions, businesses had to estimate their technology needs and invest in costly hardware and software to accommodate future growth. The cloud offers a more flexible and scalable approach, allowing businesses to easily scale up or down their resources as needed, without the need for additional hardware or software. This is particularly important for small to medium-sized businesses, which need to be able to adapt quickly to changes in demand.

Improved Security

Security is a top concern for all businesses, regardless of their size. Cloud providers have invested heavily in their security infrastructure, providing a level of protection that would be difficult for most small to medium-sized businesses to achieve on their own. Cloud providers have teams of experts that focus solely on security, which means businesses can benefit from the latest security protocols and technologies without having to invest in expensive security solutions. Additionally, outsourcing IT management to a reputable provider can help ensure that all security protocols are implemented and monitored effectively.

Increased Productivity

Cloud migration can also increase productivity by enabling employees to work from anywhere, at any time. Cloud solutions provide access to data and applications from any device with an internet connection, allowing employees to work remotely, collaborate more effectively, and access the information they need when they need it. This level of flexibility and accessibility can significantly improve productivity, particularly for small to medium-sized businesses with limited resources.

Business Continuity

Finally, cloud migration can help ensure business continuity in the event of a disaster. Cloud providers offer backup and disaster recovery solutions that can help businesses quickly recover from unexpected events such as power outages, hardware failures, or natural disasters. Additionally, outsourcing IT management can ensure that all backups and recovery solutions are in place and tested regularly, providing additional peace of mind for businesses.

In conclusion, cloud migration offers a range of benefits for small to medium-sized businesses, including cost savings, scalability, improved security, increased productivity, and business continuity. Partnering with an outsourced IT management provider can help businesses maximise these benefits by providing access to a team of experts who can optimise resources, monitor security, and ensure that all technology solutions are working effectively. By embracing cloud computing and outsourcing IT management, businesses can compete more effectively and efficiently in today’s fast-paced business environment.

What are the benefits of outsourcing IT services

In today’s fast-paced business world, IT services play a critical role in ensuring the smooth running of operations. However, for many companies, maintaining an in-house IT department can be expensive, time-consuming, and challenging. This is where outsourcing IT services comes in.

In this blog post, we will discuss the benefits of outsourcing IT services.

Cost savings

One of the most significant benefits of outsourcing IT services is cost savings. Building and maintaining an in-house IT department can be expensive, especially for small and medium-sized businesses. Outsourcing IT services eliminates the need to invest in expensive hardware, software, and IT infrastructure, as well as the costs associated with hiring and training IT personnel. This enables companies to focus on their core business while still enjoying top-quality IT services at a lower cost.

Access to specialized expertise

Outsourcing IT services also provides access to specialised expertise that may not be available in-house. IT service providers typically have teams of highly skilled professionals with extensive experience and knowledge in various IT fields. This expertise is especially crucial for businesses that require specialised IT services, such as cybersecurity or data management.

Increased efficiency and productivity

Outsourcing IT services can also help to increase efficiency and productivity within the organisation. IT service providers typically have the latest technology and tools to manage and support the company’s IT needs. This enables businesses to focus on their core competencies while leaving IT services to the experts. Additionally, outsourcing IT services ensures that the IT systems are always up-to-date, reducing downtime and increasing overall productivity.

Scalability and flexibility

Outsourcing IT services also provides scalability and flexibility. As businesses grow, their IT needs may change, and outsourcing IT services can help them to scale up or down as required. IT service providers can quickly and efficiently adapt to the company’s changing needs, providing the necessary IT resources and support to meet these needs.

Reduced risk

Outsourcing IT services can also help to reduce the risk of security breaches and data loss. IT service providers typically have robust security measures and protocols in place to protect the company’s data and systems from cyber threats. Additionally, outsourcing IT services enables businesses to comply with relevant regulations and standards, reducing the risk of legal and financial penalties.

In conclusion, outsourcing IT services can provide businesses with numerous benefits, including cost savings, access to specialised expertise, increased efficiency and productivity, scalability and flexibility, and reduced risk. However, it is essential to carefully evaluate potential IT service providers to ensure that they meet the company’s specific IT needs and requirements.

Simply contact to us to learn how we can help.

Cyber Security Tips for Small Businesses

It is very important for small businesses to protect themselves from the most common cyber attacks. If you’re a small or medium-sized enterprise (SME) then there’s around a 1 in 2 chance that you’ll experience a cyber security breach.

Here are a few tips cyber security tips for small businesses to get you started.

Backing up your data

Think about how much you rely on your business-critical data. Customer details, quotes, orders, and payment details. Now imagine how long you would be able to operate without them. All businesses, regardless of size, should take regular backups of their important data, and make sure that these backups are recent and can be restored.

– Identify what data you need to back up

– Keep your backup separate from your computer

– Consider cloud storage

– Make backing up part of your everyday business

Protecting your organisation from malware

Malware is software or web content that can harm your organisation. The most well-known form of malware is viruses, which are self-copying programs that infect legitimate software.

– Install, and turn on, antivirus software

– Prevent staff from downloading dodgy apps

– Keep all your IT equipment up to date

– Control how USB drives (and memory cards) can be used

– Switch on your firewall

Keeping your smartphones and tablets safe

Mobile technology is now an essential part of modern business, with more of our data being stored on tablets and smartphones. What’s more, these devices are now as powerful as traditional computers, and because they often leave the safety of the office (and home), they need even more protection than ‘desktop’ equipment.

– Switch on password protection

– Make sure lost or stolen devices can be tracked, locked, or wiped

– Keep your device up to date

– Keep your apps up to date

– Don’t connect to unknown Wi-Fi Hotspots

Using passwords to protect your data

Your laptops, computers, tablets and smartphones will contain a lot of your own business-critical data, the personal information of your customers, and also details of the online accounts that you access. It is essential that this data is available to you, but not available to unauthorised users.

– Make sure you switch on password protection

– Use two factor authentication for ‘important’ accounts

– Avoid using predictable passwords

– Help your staff cope with ‘password overload’

– Change all default passwords

Avoid phishing attacks

In a typical phishing attack, scammers send fake emails to thousands of people, asking for sensitive information or containing links to bad websites. They might try to trick you into sending money or steal your details to sell on. Phishing emails are getting harder to spot, and some will still get past even the most observant users.

– Configure accounts to reduce the impact of successful attacks

– Think about how you operate

– Check for the obvious signs of phishing

– Report all attacks

Don’t leave the responsibility for cyber security with a single person. Every member of the team needs enough knowledge to understand how cyber security impacts on their area of focus. Contact us to see how we can help develop these cyber security tips for small businesses.

The National Cyber Security Centre latest Threat Report

The National Cyber Security Centre has recently published their latest Threat Report. In this blog we have summarised some of the key information and urge you to speak with us about your cyber security to protect your business and your customers.

A key takeaway from the report is to be careful what you’re sharing online because cybercriminals often conduct research on individuals through social media platforms and other public information sources in an attempt to gain access to their network.

Patches released for Apple and Google Chrome vulnerabilities

Users should be aware that Google and Apple have released security updates to fix vulnerabilities affecting their respective products.
Apple’s two vulnerabilities include a remote code execution vulnerability (CVE-2022-32893) in its WebKit software, as well as a kernel vulnerability (CVE-2022-32894).

Google has released a standard update for its Chrome browser with eleven updates, but which includes a fix for the vulnerability CVE-2022-2856 which exists in the wild. The NCSC recommends following vendor best practice advice in the mitigation of vulnerabilities.

Microsoft report on a sustained phishing campaign by the SEABORGIUM threat actor

The Microsoft Threat Intelligence Center has published a new information on the sustained campaign of phishing and credential theft by the threat actor SEABORGIUM – you can read it here.

Cyber criminals often conduct research on individuals in an organisation to attempt to gain access and is known to identify legitimate contacts in the target organisation’s corporate network. The opening exchange with the target is often a benign email referencing an attachment that doesn’t exist. Once a target opens the email, they are directed to an actor-controlled server hosting a phishing framework. The final page is a prompt for authentication, mirroring the sign-in page for a legitimate provider and intercepting any credentials.

Warning as cyber criminals use HMRC branding in phishing scams

Cyber criminals continue to impersonate HMRC branding to trick the public into sharing personal or financial details.
Recipients of this phishing attempt are encouraged to ‘submit their tax refund request’ via a link, which would send them to a fraudulent website designed to harvest their personal details.

A cyber criminal’s main goal is to trick you into giving them your sensitive information, which could include bank details, often claiming to be from UK government or other official organisations.

As of July 2022, the NCSC has received over 13million reported scams, which has resulted in 91,000 scams being removed across 167,000 urls. You can reduce the likelihood of being phished by thinking about what personal information you (and others) post about you, and by reviewing your privacy settings within your social media accounts.

Speak to our team to see how we can help educate your team towards safer online activity.

Cloud Migration: Why should I move to the cloud?

To future-proof and modernise your organisation it is important to embrace new ways of working, improve collaboration and innovate, including considering cloud migration. By migrating systems to the Microsoft Cloud it is possible to better manage IT costs and remain agile. This allows you achieve peace of mind knowing your business is secure, whilst addressing the challenge of sustainability.

Cloud computing has been a true revolution in IT. When you consider the benefits it can bring, it’s not surprising that so many businesses have been eager to make the switch. However, if you are still investigating the process and benefits please read on.

Control costs and only pay for what you need

Cloud infrastructure, software and services take away the traditionally high operating costs of IT and allows you to redeploy your IT team (if you have a team in-house) on more valuable digital developments’ initiatives. You can choose the applications, services and features you need and only pay for them.

Be flexible

When you need to increase server capacity, add users, or manage an increase in demand, you can instantly to this in the cloud. You don’t have a long-term commitment to infrastructure costs, which is inevitable with on-premises facilities. Instead, you can be flexible with capacity and services to fit your current business needs.

The biggest cloud computing services, like Microsoft Azure, use a global network of secure data centres, with the latest generation of fast and efficient computing hardware, making sure there’s always enough power, storage and bandwidth for everyone who needs it.

Always stay up to date

Working with Microsoft Cloud means you always have access to the latest versions of the software, apps and tools you use every day, with automatic updates and no downtime. Your teams can access and make use of faster and more effective productivity features and functions as soon as they are available.

Leading and reliable security

Microsoft Cloud data centres are monitored 24/7 by cybersecurity experts and innovative systems, meaning your data and transactions are safeguarded by industry-leading protocols and software. Protection is applied automatically and continually updated to stay ahead of threats.

Recovery and back-up servers are instantly available and provide extra peace of mind for data security. Using automated processes, the cloud monitors and continually optimises its server speed and performance.

Access your work from anywhere

Cloud software, services and infrastructure are accessible from any device. With hybrid working set to stay, cloud computing brings secure, anytime access to mobile or desktop devices so employees can use any combination of locations and technology that suits their workstyle.

Still have questions? Talk to our team on 0161 763 4529 and we will be happy to answer any questions you may have.

Multi-Factor Authentication in 2022

Multi-Factor Authentication is becoming part of daily digital activity. Traditionally, you would access online accounts with a username and a password. However, with the changing digital environment, usernames are often easy to discover and, since passwords can be hard to remember, people tend to pick simple ones, or use the same password across all accounts.

Almost all online services – banks, social media, shopping and Microsoft 365 – have added a way for your accounts to be more secure. This is sometimes referred to as “Two-Step Verification” or “Multi-factor Authentication”. When you sign into the account for the first time on a new device or app (like a web browser) you need more than just the username and password. You need a second “factor” – to prove who you are.

In today’s current climate, everyone and every organisation is a target, so we need to make strides to enhance security measures. Multi-factor authentication is a simple way to add a layer of protection to the sign-in process.

Why should I use MFA?

If you only use one password to login or authenticate a user, it can leave you vulnerable to a cyber attack. If that password is weak or has been exposed elsewhere, it is an easy entry point to your network by an attacker. When you are required to use a second form of authentication, security is significantly increased as this additional step isn’t something an attacker can easily obtain or duplicate.
With MFA, even if a compromised password is used, the attacker would be unable to gain access without either a code or fingerprint confirmation, and the legitimate user would be notified of the attempted login.

MFA and Microsoft

Microsoft is taking the first steps towards mandating MFA by switching off basic authentication methods in Exchange Online. Modern authentication will become the standard for Microsoft’s online services, allowing Microsoft to begin to mandate MFA for all cloud services.
If you are considering obtaining a Cyber Essentials certification, under the new criteria, MFA is a requirement for all cloud accessed apps, therefore, you must have this in place beforehand.

Ready to implement MFA?

How MFA can be implemented to your business will depend on the complexity of your infrastructure. Get in touch with our experts today to learn how we can help!

Updates to Cyber Essentials Certification

Using five security controls, Cyber Essentials aims to help businesses to reduce the impact of online threats, such as:

Phishing attacks



Password attacks

Network attacks

Earlier this year, some of the technical control requirements for Cyber Essentials changed in line with recommended security updates. Let’s take a closer look at the updates.

Home working is in now part of the scope. However, most home routers are not. Following the increase in ‘working-from-home’, it has become the norm for staff members to access their work through a home/personal device. Even though home routers are out of scope, any end-user devices used to access a business infrastructure must have the Cyber Essentials controls applied. Anyone who works from home for any amount of time is classed as a ‘home worker’ and this rule will apply.

All cloud services are now part of the accreditation process. In the last two years it has become increasingly common to access work through cloud solutions with businesses opting for a cloud-based infrastructure. Any cloud services must now be fully integrated into the accreditation. If your business data or services are hosted in the cloud, then Cyber Essentials controls need to be implemented.

Multi-factor authentication (MFA) is now required to access cloud services. Most of us use some form of MFA every day, for example to access our banking app. MFA uses a minimum of 2 factors to grant access, something you know and something you have: usually a password and a face, voice or print recognition. For Cyber Essentials, the password element of the MFA approach must be at least eight characters long, with no maximum length restrictions.

Smart phones and tablets are now part of the certification. These are any device that you use to connect to your corporate network and access organisational data and services via mobile internet. However, if mobile devices are only used for voice calls, text messages or MFA, then these devices will not be considered.

Two additional tests have been added to the Cyber Essentials Plus audit. These are: test to confirm MFA is required for access to cloud services and test to confirm account separation between user and administration accounts.

If you would like to learn more about the updates to Cyber Essentials then please do get in touch with our team on 0161 763 4529. We are fully trained and experienced in keeping your business safe online.