Complete I.T. Blog

What Qualifies as a Data Breach in the Workplace?
What is a data breach? In simple terms, a data breach is related to both accidental and deliberate causes that lead to data being accessed unlawfully, changed or destroyed without permission, lost, stored unsafely or transmitted to people it shouldn’t be. Data breach...
Disaster Recovery and Cloud back up
A few years ago people were constantly asking, what is the cloud? How will it help me? Why would I move to the cloud? Etc… Whilst those questions are still valid more and more people are able to answer them to some degree, whether talking about business or personal use.
A ‘brand’ new look for Complete I.T.
At the beginning of this year we started looking at our brand and website to ensure it was as user friendly and as reflective of CIT as possible. Following 4 client focus groups and feedback from the team it was decided that it was time to bring our brand and website...
Summers here…
I hope you have had an exciting and enjoyable start to 2016. Here at CIT we are constantly looking at ways to both improve our relationships with our clients and our service offering. We carried out 4 client focus groups in different regions that proved very...
Canadian University hit by Ransomware
On the 8th June 2016 the University of Calgary in Canada, had to pay a $20,000 ransom to cyber criminals in order to release their computer systems’ files, after being hit by ransomware. The ransomware installed itself on their machines, taking documents and demanding...
ZCryptor: The Self-Propagating Ransomware You Need To Know About
As if ransomware wasn’t already bad enough, Microsoft is warning users of a self-propagating malware strain known as ZCryptor. ZCryptor can replicate itself and infect additional computers via USB drives (haven’t we already convinced you those are bad?) and network...
Avoid Shadow IT With Total Data Protection
Using consumer file sync and share (FSS) services like Dropbox and Box for business purposes is part of a phenomenon that many have described as “shadow IT,” when systems and solutions are used inside an organisation without explicit organisational approval.
Complete Workstation Management and Remote Management Console
There are some IT services that are simply crucial to any business! As your IT partner, Complete I.T. understand your business, its objectives and have various services and technologies that will allow you to overtake your competition in the business arena, I will be...
The rise of money transfer email scams
The FBI recently posted a warning (https://www.fbi.gov/phoenix/press-releases/2016/fbi-warns-of-dramatic-increase-in-business-e-mail-scams) which details how between October 2013 and February 2016 US Law Enforcement received reports from over 17,000 victims of fraud...
James Rood, Client Infrastructure Support Manager, gives us his take on the changing world of Technology.
Today I’m going to give my own view on how technology has changed over the past 10 years. Now, 10 years ago I was 14. We had a computer running Windows XP, I had some brick of a mobile phone and I was probably still on dial-up internet (we were very late to the...
Should you carry out a Windows 10 upgrade?
Windows 10 has been available for 9 months, and has become Microsoft’s most popular operating system release yet. So should you be making the move? The short answer is ‘yes’ – and here are our top three reasons for making that recommendation. 1. Windows 7 is no longer...