Complete I.T. Blog

Security by Design

Security by Design

The most effective tools in this world are created with a purpose, through strategic planning, designing and refining. For example, when you look at a medieval castle, visually, you can see that it was built and designed with a very specific purpose. To protect its...

read more
The CIT Newsletter: Microsoft Power BI

The CIT Newsletter: Microsoft Power BI

In this edition, we take a closer look at Power BI. Power BI is part of the Microsoft Power Platform and is a powerful business intelligence solution that allows organisations to create, automate and optimise insightful dashboards and reports, in easy to digest...

read more
The Two Big Myths in Data Protection

The Two Big Myths in Data Protection

As a leading provider of IT, ERP, Telephony and Cyber Security services to the small and mediums business (SMB) sector I get to speak to a lot of businesses about Information Security and Data Protection. Most businesses in this sector do not have dedicated...

read more
Don’t Fall Victim to an Impersonation Scam!

Don’t Fall Victim to an Impersonation Scam!

So, what is an impersonation scam? With so many different scams out there nowadays it can be difficult to keep a track of them but this is a particularly nasty one to watch out for as they often use a voice of authority to coerce their victims and leave them feeling...

read more
Do You Know How Secure Your Suppliers Are?

Do You Know How Secure Your Suppliers Are?

Written by Harshini Carey, Information Security Specialist at PGI Warnings about emerging and increasingly sophisticated cyber threats are now a daily occurrence, but one particular threat vector which has consistently surfaced throughout 2020/2021 is the growing...

read more