Blog
Sign up for all our news here
Donate your old/unwanted laptops and we will try to refurbish them to give to those who need them, usually via a charity. You may have seen our recent blog about our laptop refurbishment initiative. [...]
Laptop spec is an important consideration and something we get asked about a lot (unsurprisingly)! Needless to say, it shouldn’t feel like you’ve climbed mountains just to find the right laptop for you! When you [...]
Our engineers here at Pro Drive have been very busy using their technical skills in their spare time, refurbishing second hand laptops which have been distributed mainly via charities. Our whole team collected laptops [...]
Due to the conflict in Ukraine the government, the ICO and UK cyber experts generally are all urging SMEs to act against increased cybersecurity threats. The situation in Ukraine poses an increased risk of cyber [...]
Your business might need a Vulnerability Assessment, starting with a scan, for several reasons. Here, we explain what it is and why it needs to be managed. Watch our video to learn all about Vulnerability [...]
Below is a cyber security checklist of things we can all do to protect ourselves and our businesses when we’re online. — By Ivan Santos, Service Desk Manager As a result of the [...]
Many business owners have concerns about the standards and impact of their hybrid meetings. Meanwhile, they are breathing a palpable sense of relief that they are able to bring their teams back to the office. [...]
Act now! Microsoft have announced major changes to their Microsoft 365 licensing programme which will, unfortunately, result in price increases. We look at these and suggest ways to mitigate them IF you take action quickly. [...]
Have you got a hybrid strategy in place? Hybrid working, with people splitting their time between being in the office and working remotely, has to be properly planned - although every business will have different [...]
Energy cybersecurity is something that the sector is rightly worried about - attacks aren't just happening in the movies. We explain why energy firms need Cyber Essentials ... Many energy businesses, especially those involved in [...]
If you are running a Financial Services or Fintech firm and you do not have Cyber Essentials certification, you might be putting your reputation and your clients at risk. Businesses in the financial sector have [...]
We’ve compiled 5 business IT New Year’s resolutions to add to your list - some are free, the others will save you money in the longer term. If you haven't already, acting on these will [...]
You may have heard about a vulnerability that has been found in Apache Log4j, a very common logging system used by developers of web and server applications, based on Java and other programming languages. Pro [...]
We've got 5 business tech Christmas gifts that might be helpful to you – add them to your wish list if you haven’t got them already! 1. Does having to remember passwords drive you crazy? [...]
On 24 January 2022, changes to the Cyber Essentials scheme from the National Cyber Security Centre (NCSC) and IASME will be officially released. Here, we explain what Cyber Essentials is, what the changes are, what [...]
Many businesses add email banners to their email systems to serve as warnings to recipients - but they are often ineffective, resulting in thousands of users falling for cyber scams each year. As providers of [...]
For cyber security advice and resources look no further! Whether you know what you want an answer to or don’t know where to begin; this blog has useful information and links. Firstly, it’s a fact [...]
We use the Net Promoter Score (NPS) system (SM) to measure our IT help desk performance. We’re told that companies in our business sector who are top performers on NPS generally have a score of [...]
You should have a cybersecurity strategy - basically a document that will cover all the steps you need to have gone through to protect your business as well as possible against cyber crime. And, in [...]
Mobile Device Management is being deployed by many organisations. If you are using your business mobile device and your company requires a secure way of protecting the data on it (for example if they need [...]