What is a PivotTable? Within Microsoft Excel, A PivotTable is a table of grouped values that summarises individual items into more of an extensive view. This summary can include sums, averages, or other statistics that the table will group together based on a...
Search Results
Case Study: Tockington Manor School and Nursery
Tockington Manor School and Nursery Case Study Tockington's infrastructure needed updating, outdated devices replaced and laptops updated to Windows 10Introduction to Tockington Manor School Tockington Manor School (TMS) is a family-focused, independent,...
How to Train Your Team on Cyber Security
Regularly training your team about cyber security should be a business priority. Cyber threats are constantly evolving and becoming more targeted which means you need to be ahead of the game. Help protect your systems and data by educating your team on how to spot...
What Qualifies as a Data Breach in the Workplace?
What is a data breach? In simple terms, a data breach is related to both accidental and deliberate causes that lead to data being accessed unlawfully, changed or destroyed without permission, lost, stored unsafely or transmitted to people it shouldn’t be. Data breach...
Rise in Cyber Attacks on the UK Education Sector
UK Schools, colleges and universities are being subjected to an increasing number of ransomware attacks. The initial increase was during August/September 2020 and again in February 2021, now in May/June 2021, a further increase in ransomware against the UK education...
Fengrain
Case Study: Fengrain Fengrain recognised how much IT was evolving and partnered with CIT to help their organisation growIntroduction to Fengrain Fengrain is a dynamically operated farmer owned co-operative. They work for and on behalf of their growers to help them...
R3 Environmental Solutions
Case Study: R3 Environmental Solutions Ltd Complete I.T. Manager is the right service for R3, due to the flexibility, ease of accessIntroduction R3 Environmental Solutions Ltd (R3) delivers simple, ethical, and compliant IT waste management services for businesses,...
Cyber Security- Secure Your Devices No Matter Where They Are
From phishing emails to malware, cyber threats are evolving rapidly and are not limited to large enterprises. The same methods are used to attack SMEs where business downtime, fines and reputational damage can, at worst, lead to business closure. The facts Up to 88%...
The CIT Newsletter: Hosted Telephony, Impersonation Scams and the Cloud
In this edition, we discuss Complete Hosted Telephony, how to stay safe from impersonation scams and test your knowledge on the cloud. Learn more about Complete Telephony This short video explains what Complete Telephony is and how it could help you to ensure you are...
Don’t Fall Victim to an Impersonation Scam!
So, what is an impersonation scam? With so many different scams out there nowadays it can be difficult to keep a track of them but this is a particularly nasty one to watch out for as they often use a voice of authority to coerce their victims and leave them feeling...