claireLOGIC
  • Managed IT
    • Managed IT Services
    • IT Support Services
    • IT Strategic Review
  • Cyber Security for SMEs
  • Cloud Solutions
    • Cloud Solutions
    • Microsoft 365
  • Business Continuity
    • Business Continuity Services
    • WhatsApp Archiver
Contact us Resource centre

Going for growth: Joining forces with Hampshire-based Aura Technology

Going for growth: Joining forces with Hampshire-based Aura Technology

We’re delighted to confirm that we’re about to enter an exciting new phase of our growth. Aura Technology, the leading Hampshire based MSP, has announced a deal which brings our two companies together so that we can expand into new markets, strengthen our technical expertise and continue our growth together.  Having worked with Aura’s founder […]

Small business backups: how to assure SME business continuity with bulletproof cloud backups

Small business backups: how to assure SME business continuity with bulletproof cloud backups

Are your small business backups left in the hands of your cloud software vendors like Microsoft and Google?  If so, you’re one of many who are leaving their SME business continuity very much to chance. Cloud storage is fast becoming the most popular way to store documents and files for both businesses and individuals. However, […]

The benefits of managed IT services for SMEs

The benefits of managed IT services for SMEs

Investing in the future – why it makes sense to bring IT experts into your SME at an early stage of growth The team at claireLOGIC has been hard at work onboarding a new client the past few weeks.  We were delighted when change enablement experts Epion Consulting recognised that taking us on as their […]

SME IT Security: why proliferation of passwords in growing SMEs make password managers a must

SME IT Security: why proliferation of passwords in growing SMEs make password managers a must

Good password management is an essential for modern SME IT security. Every reader will recognise the alarming rate at which passwords proliferate in their own life.  From social media through to online banking, everything requires a password.  Remembering them all is virtually impossible. You will also have encountered the typical, common sense ‘golden rules’ about […]

The importance of SME cyber security awareness training

The importance of SME cyber security awareness training

Why employee cyber security awareness training and password management education is so critical Employee cyber security awareness training has never been as important as it is today for SME businesses. Staff in growing businesses have many roles or multiple responsibilities. These days, many of these roles are digitally based. They either use password protected specific […]

Why Multi-Factor Authentication (MFA) is important for SME cyber security

Why Multi-Factor Authentication (MFA) is important for SME cyber security

As the digital landscape evolves, so do the threats to SME cyber security. In today’s digital age, SME businesses are increasingly reliant on technology to deliver, streamline, serve and protect their services, their staff, their clients and business in general. Nothing stands still, however. Especially cyber threats – and more than 50% of businesses reported […]

Success Story: IT support for charities – How claireLOGIC helped The Abingdon Bridge

Success Story: IT support for charities – How claireLOGIC helped The Abingdon Bridge

How claireLOGIC worked with youth charity The Abingdon Bridge and improved its IT systems Being able to rely on your IT is crucial for any organisation, and charities are no exception. IT support for charities is essential for them to operate effectively. The Abingdon Bridge (TAB), an Oxfordshire-based wellbeing charity supporting young people aged 13 […]

IT Support for SMEs: Success Story—How claireLOGIC transformed IT Support Services for Quadriga

IT Support for SMEs: Success Story—How claireLOGIC transformed IT Support Services for Quadriga

Health and safety consultancy Quadriga finds an IT support partner that finally meets promises When Reading-based health and safety consultancy Quadriga set out to find a new IT service provider, it was a lengthy and stressful journey. Good IT support for SMEs can be hard to find and they knew they needed strong support. They […]

SME Cybersecurity Insights 2024

SME Cybersecurity Insights 2024

Actionable advice in the light of shocking Government figures on cyber breaches in 2024 These days, SME cybersecurity is more critical than ever for growing businesses. The UK Government’s 2024 Cyber Breaches Survey shines a light on the current business cyber security landscape.   It suggests that SMEs should be taking more action to safeguard their […]

IT security in schools in the spotlight as cyber attacks rise

IT security in schools in the spotlight as cyber attacks rise

Growing concern around IT security in schools has seen the Department for Education continue to enhance its school IT security guidelines in 2024. 2024 looks to be a crucial year when it comes to school cyber security.  Cybercriminals are finding cunning new techniques and approaches to threaten schools, businesses and all kinds of organisation. According […]

Top 6 IT Challenges in the Education Sector

Top 6 IT Challenges in the Education Sector

IT and technology is a massive part of every educational institution’s infrastructure. With this, technology has evolved within the education sector — allowing providers to truly push the boundaries of what’s possible and innovate for the benefit of their students. However, there are also a number of challenges that come with this. Due to the [...]

Addressing IT knowledge, confidence and capability in Schools

Addressing IT knowledge, confidence and capability in Schools

The education sector has seen a massive uptick in technology adoption in the past decade. 77% of educators — according to Promethean — agree that technology is crucial to engaging students in an effective manner. As schools, colleges and universities look to technology solutions to advance themselves into the digital age, it’s hardly surprising that [...]

Ensuring Cloud Compliance: Considerations for Regulatory Requirements

Ensuring Cloud Compliance: Considerations for Regulatory Requirements

Ensuring Cloud Compliance is simply a necessity for any business to have in the modern world. With so many regulations and acts to protect users and parties from lots of different violations, ensuring that your organisation is aware of the requirements is vital. This is especially true for cloud computing. As businesses turn towards the [...]

Optimising IT Infrastructure: The Key to Scaling Your Business

Optimising IT Infrastructure: The Key to Scaling Your Business

It’s no secret that running IT within your business can be expensive. With IT costs and spending rising globally, a solid IT strategy that checks every box that a modern business needs is looking to be much more expensive for the average business than ever. Optimising your business’ IT infrastructure can be one of the [...]

Keeping Your IT Equipment Cool During Summer

Keeping Your IT Equipment Cool During Summer

Why should you care about the heat? Keeping your IT equipment cool during the summer in important. As the summer sun blazes on...okay, we're overreaching... but you need to pay special attention to your valuable IT equipment like laptops, servers, and iPhones when the temperature rises. Even a few degrees can cause potential service issues [...]

The Shifting Cyber Security Threats and the Role of AI

The Shifting Cyber Security Threats and the Role of AI

Since the launch of AI technology, such as chatGPT, cyber-attacks have become increasingly sophisticated. Detecting these threats has consequently become a challenging task, leaving many businesses vulnerable to breaches that jeopardize their personal data, finances, and reputation. In this blog, we will present real-life examples of AI's influence and discuss its crucial role in defending [...]

WhatsApp: MiFID II compliance for FCA regulated companies

The Risks of Neglecting WhatsApp message archiving The financial services industry operates in a highly regulated environment. This is done to ensure transparency, fair treatment of customers, and the stability of the financial markets. In this context, the Markets in Financial Instruments Directive II (MiFID II) plays a vital role in setting standards for financial [...]

Debunking: 5 Cybersecurity Myths

Debunking: 5 Cybersecurity Myths

By Adam Surridge – Account Manager @claireLOGIC Debunking: 5 Cybersecurity Myths: In today's digital world, cybersecurity is a major concern. It's crucial to separate fact from fiction and debunk the myths surrounding cybersecurity. In this blog, we will address five common myths to shed light on the truth.. Myth 1: "Only big corporations are targeted; I'm [...]

Five Benefits of Outsourcing Your IT

Five Benefits of Outsourcing Your IT

By Adam Surridge – Account Manager @claireLOGIC Five Benefits of Outsourcing Your IT: In today's digital age, businesses rely heavily on efficient and reliable IT infrastructure. However, managing complex IT systems in-house can be challenging and resource-intensive. This is where outsourcing IT to a managed service provider (MSP) like claireLOGIC can be a game-changer. By entrusting [...]

Protect Yourself from Phishing Attacks with an Email Security Gateway!

Protect Yourself from Phishing Attacks with an Email Security Gateway!

By Adam Surridge – Account Manager @claireLOGIC Today, I wanted to shed some light on a critical issue that affects us all: phishing emails. These deceptive messages have become increasingly sophisticated, posing a significant threat to individuals and organisations alike. It's crucial to stay informed about these dangers and take proactive measures to protect ourselves. That's [...]

Five ways that Microsoft Azure can make you more efficient

Five ways that Microsoft Azure can make you more efficient

Azure can make you more efficient: Azure is a comprehensive cloud platform that provides over 200 products and cloud services, ranging from databases to virtual desktops, quantum computing, and machine learning applications. For businesses, Azure offers a wide range of benefits, including increased security, centralised management, and most importantly, cost savings. Here are five ways [...]

Password management and how can an MSP help a business?

Password management and how can an MSP help a business?

Passwords play a vital role in keeping our sensitive information safe. From online banking to social media accounts, we use passwords for just about everything. However, with the ever-increasing number of cyber threats and data breaches, password management has become more critical than ever before. Here, we'll discuss the importance of password management and how [...]

Defence in Depth Layer 5: The Human Layer

Defence in Depth Layer 5: The Human Layer

Although the previous four layers – Email and Web Security, Perimeter Security, Internal Network and Access Security and Endpoint Security – of security should prevent most cyberattacks, it is essential that employees have sufficient knowledge of cyber security to be able accurately identify and report any potential cyberattack or threat. The main concept within this layer is [...]

Record WhatsApp calls in accordance with FCA compliance

Record WhatsApp calls in accordance with FCA compliance

How to record WhatsApp Calls in line with MiFID II regulations  Introduction and risks  Compliant WhatsApp call recording: Over time, many regulated businesses have discovered that customers – and customer facing staff alike are leaning towards sending important information via WhatsApp. Whilst this has its benefits, it opens organisations up to a plethora of FAC [...]

Strategies for FCA Compliant WhatsApp Messages & Call Recording

Strategies for FCA Compliant WhatsApp Messages & Call Recording

Businesses need to ensure that their WhatsApp messaging and call recording systems are setup to comply with MiFID II regulations. UK firms need to launch effective strategies for FCA compliant WhatsApp messages and call recording. The Markets in Financial Instruments Directive (MiFID II) is a set of regulations that have been put in place to [...]

Defence in Depth Layer 4: Endpoint security

Defence in Depth Layer 4: Endpoint security

Relying on a single layer of security is risky, which is why cyber security experts recommend the Defence in Depth (DiD) strategy. This strategy uses multiple layers of security, making it difficult for attackers to breach critical assets. The next layer of protection after Email and Web Security, Perimeter Security, and Internal Network and Access [...]

2023 Cyber security – download our eBook

2023 Cyber security – download our eBook

When looking back at the year 2022, it is clear that it was a turbulent one, full of macroeconomic and geopolitical risk. The war in Ukraine, rapid inflation and supply chain failures all created a perfect storm of interconnected risks that had a profound effect on cyber security for businesses around the world. In the [...]

Technologies to power the modern workplace

Technologies to power the modern workplace

The definition of a workplace has changed a lot over recent years. Businesses are now looking at new technologies to power the modern workplace. Almost all industries no longer operate through what was once considered a normal ‘office’ job. Studies show around 50% of employees now work on a hybrid basis. This being, partly from [...]

The Pros and Cons of BYOD Policies

The Pros and Cons of BYOD Policies

Bring your own device IT policies (often called BYOD policies) are often seen as a way to save money and increase productivity. However, there are both good and bad aspects to this policy. The pros of BYOD policies The pros include the ability for the employee to have more control over the device they use, [...]

Defence in Depth Layer one: Email and Web Security

Defence in Depth Layer one: Email and Web Security

Email and Web Security: Are your IT systems protected by more than one layer of security? Relying on a singular cyber security system is a huge vulnerability and opens up your network to harm and risk. Defence in Depth (DiD) is a cyber security strategy that uses multiple layers of security to protect a business’s critical assets [...]

Defence in Depth Layer two: perimeter security

Defence in Depth Layer two: perimeter security

Perimeter security: Relying on a single layer of security for your IT systems is a problem that can have serious consequences. It’s important to understand the risks associated with relying on one system, and how it can be used by attackers to gain access to your valuable information and data. Defence in Depth (DiD) is [...]

Defence in Depth Layer 3: Internal Network and Access Security

Defence in Depth Layer 3: Internal Network and Access Security

Internal Network and Access Security: To secure IT systems and valuable information, relying on a single layer of security is risky. Defence in Depth (DiD) is a cyber security strategy that uses multiple layers of security, making it difficult for attackers to breach critical assets. After 'Email and Web Security' and 'Perimeter Security', the third [...]

Disaster Masterclass at Williams F1:  What you missed…

Disaster Masterclass at Williams F1: What you missed…

Our Disaster Masterclass finale event took place at the Williams F1 Conference Centre. Check out our previous blogs Blenheim Palace: Disaster Masterclass Windsor Castle Hotel: Disaster Masterclass We explored the importance of PR communication. How to best handle comms if a crisis occurs, and what to do and say to avoid the pivotal moment of [...]

Disaster Masterclass at Blenheim Palace: What you missed…

Disaster Masterclass at Blenheim Palace: What you missed…

The first of our three exciting Disaster Masterclass events took place at Blenheim Palace last week. We had some amazing speakers from organisations such as Datto and Microsoft (Vuzion). They spoke about the importance of preparing your business against a business disaster! The threat landscape Cybercrime and cyber-fraud is at an all-time-high and will only [...]

Why Business Continuity and Disaster Recovery is Vital

Why Business Continuity and Disaster Recovery is Vital

Business Continuity and Disaster Recovery (BCDR) is vital. DRBC is the overall process of reducing the likelihood and impact of a disaster on a business. It is a key component for business viability. Business Continuity is the operations side of BCDR. For example, designing and creating policies or procedures that help essential business function during [...]

The Cyber Risks of Working From Home

The Cyber Risks of Working From Home

The Cyber Risks of Working From Home : As I’m sure everyone knows, home working has become more popular than ever before and this is great. It allows for more flexibility, saves time and money. It also boosts job satisfaction and work-life balance. That being said, in order to fully harness these benefits – and keep [...]

The Importance of Leadership within Policies and Governance

The Importance of Leadership within Policies and Governance

The Importance of Leadership within Policies and Governance cannot be overlooked A company’s leadership team is responsible for creating company policy. Leaders are also responsible for its delivery and its compliance across an organisation. This is important as policy compliance is not just about dotting the i’s and crossing the t’s, but ensuring your business is as productive and [...]

Can you, and should you monitor staff activity when home working?

Can you, and should you monitor staff activity when home working?

Should you monitor staff activity when home working? This is quite a controversial subject with many mixed views, but given that 46% of workers in the UK currently work from home (either permanently or on a hybrid basis), it’s definitely something a lot of businesses are considering. Why you should monitor staff activity The main [...]

What is an IT strategic review?

What is an IT strategic review?

An IT Strategic Review offers a "line in the sand" moment - a snapshot of where the business is right now. And as it's run externally, it's also impartial. Why do I need an IT Strategic Review? Businesses that don’t invest in IT are missing out on efficiencies and are most at risk of cybercrime. [...]

Why you need to turn MFA on

Why you need to turn MFA on

Did you realise that a 6-character password, containing upper- and lower-case letters, numbers and symbols can be broken into more quickly than you can type it? Hackers can easily access passwords these days, so it's important to implement multi-factor authentication (MFA) to safeguard your business' finances. This MFA approach helps protect your bank accounts and [...]

Ineffective and effective IT policies

Ineffective and effective IT policies

There are a lot of different IT policies out there, and it can be hard to know which ones are effective and which ones are not. It is important to have an effective IT policy in place. There are a few things that you should keep in mind when creating or updating your IT policy. [...]

5 Steps to Create a Security Ecosystem

5 Steps to Create a Security Ecosystem

Why your business needs a security ecosystem? A security ecosystem is a group of technologies that work together on a platform to provide an outcome that utilises all the technology components effectively. We will be discussing the 5 steps to create a security ecosystem. Having an integrated and reactive system in place that works with [...]

Disaster Masterclass: Preparing for 2022

Disaster Masterclass: Preparing for 2022

We had an incredible Disaster Masterclass: preparing for 2022 event in partnership with Thames Valley Chamber of Commerce. If you missed the event here is a quick recap video from this engaging session. Takeaway top tips from the presenters at the event: Greg Jones. Datto. Cyber-crime has overtaken crime in the real world – don’t ignore [...]

5 Common Types of Phishing Attacks

5 Common Types of Phishing Attacks

How to protect you and your business Be aware of the 5 common types of phishing attacks: protecting yourself and your business is key. It's important to create systems that ensure you are secure and that your operations are stable. It is essential to be aware of the latest threats and have measures in place [...]

Five Tools to Maximise Your Microsoft 365 Investment and Productivity

Five Tools to Maximise Your Microsoft 365 Investment and Productivity

Here you will discover the five tools to maximise your Microsoft 365 in investment and productivity. There is more to Microsoft 365 than Word and Excel, which is not surprising. Microsoft has enjoyed 27% year-on-year growth with now nearly 200 million commercial Microsoft 365 users worldwide. Microsoft have therefore heavily invested into 365 – to [...]

Productivity Tools for the Modern Workplace – Microsoft 365

Productivity Tools for the Modern Workplace – Microsoft 365

Introducing Microsoft Productivity Tools Let's find out how productivity tools for the modern workplace - Microsoft 365 can work for you. The modern workplace is a distraction - mobile phones, social media and a plethora of other communication tools. It can be a spectator sport just watching colleagues collaborate effectively on the latest project! You may [...]

Should we upgrade to Windows 11?

Should we upgrade to Windows 11?

There may be some issues that you will need to consider around potential downtime if something goes wrong, as well as compatibility with your current hardware: Windows 11 is very new, so hasn't been tried and tested for an extended period. Windows 11 is currently only available to PCs with newer processors – mostly those [...]

An overview of Windows 11

An overview of Windows 11

Windows was first introduced in 1985 as an operating system – and Windows 11 is Microsoft’s first major release of the Windows operating system since 2015. The company has announced that it will be available as a free download for anyone who currently owns a Windows 10 device and will be available for purchase as [...]

claireLOGIC are now ISO 27001 accredited

claireLOGIC are now ISO 27001 accredited

We are delighted to announce that we have been accredited with ISO 27001 certification. This is a great achievement for our company and demonstrates our commitment to information security. The accreditation process was very thorough and involved a detailed assessment of our security procedures and policies. We are confident that we now have the necessary [...]

 Why you need a business continuity solution

 Why you need a business continuity solution

Why you need a business continuity solution The threat landscape is constantly evolving, and the possibility of falling foul of a cyber, DOS, MitM attack or a natural disaster/pandemic is ever-present. It's often a case of not IF, but WHEN. Cyber threats paralyse businesses - seriously disrupting daily operations and putting the future survival of a business [...]

Eliminating the threat of Shadow IT

Eliminating the threat of Shadow IT

Eliminating the threat of Shadow IT has never been more important. While your employees will largely recognise the importance of IT, there will be an underlining trend where employees take some elements of IT into their own hands. These few will use their own devices, apps and software for business use, without IT's approval — [...]

Sharepoint deployment and data migration case study

Sharepoint deployment and data migration case study

How claireLOGIC helped Aesop to move in sync with SharePoint deployment and data migration Who is Aesop? Aesop is a national arts charity and social enterprise who are based in Oxfordshire. Its vision is ‘A future when arts solutions for society’s problems are valued and available for all who need them’. Current programmes include Dance to [...]

Is outsourcing just a cost cutting exercise?

Is outsourcing just a cost cutting exercise?

With the economy now more uncertain than ever, many organisations are looking into how they can cut costs whilst still delivering their business operations and goals. While outsourcing can deliver substantial savings – this shouldn’t be the only reason for choosing to outsource. If you are considering outsourcing, it’s worth understanding all the elements that [...]

Which should you use? Microsoft Teams or Zoom?

Which should you use? Microsoft Teams or Zoom?

Recently the usage of both Microsoft Teams and Zoom has boomed! With millions of new installations of both Microsoft Teams and Zoom, we thought it would be useful to compare the everyday features. These are features that we believe most businesses would want to use: As the above table clearly shows, the differences between Zoom [...]

Transform Business Process with Microsoft SharePoint

Transform Business Process with Microsoft SharePoint

How to transform business process with SharePoint: Cloud-based document management solutions can transform business processes. With Microsoft SharePoint, it is easy to access documents, schedules, and project plans. Additionally, it provides tools for communicating with team members. SharePoint provides all of these features and more, particularly when combined with Office 365. Microsoft's SharePoint enables users [...]

Are you using all the features of Microsoft Teams?

Are you using all the features of Microsoft Teams?

As of now, 200 million people use Microsoft Teams every month, leaving its closest competitor far behind. However, despite its success, many companies are still unfamiliar with the collaborative working tool. Even some of its existing customers have yet to discover the tool's full potential. Microsoft Teams is a component of the Office 365 suite [...]

Using Microsoft Planner to improve workflow and task management

Using Microsoft Planner to improve workflow and task management

Introducing Microsoft Planner Microsoft Planner is a task management tool which is already included with all Office 365 Business and Enterprise subscriptions. There are many paid applications on the market for task management Comparatively tools like Asana and Trello are very useful but Microsoft’s offering comes ready-integrated into Office 365, an application suite which many [...]

Do you fire-drill your servers and IT systems?

Do you fire-drill your servers and IT systems?

All businesses run fire-drills at our places of work – but do you fire-drill your servers and IT systems? The truth is you’re more likely to suffer a cyber security attack than suffer from a fire? So why don’t businesses regularly run recovery drills? Downtime is expensive, but just how expensive? Everyone knows that I.T. downtime [...]

What does it feel like to work for claireLOGIC?

What does it feel like to work for claireLOGIC?

Have you ever wanted to know what does it feel like to work for claireLOGIC? We sat down with one of our newest technical engineers – Alasdair Hewitt – to discuss just what it feels like to be one of the IT crowd, here at claireLOGIC. Fun? Challenging? Impactful? You betcha! Tell me, how your [...]

How secure is your Human Firewall?

How secure is your Human Firewall?

How secure is your Human Firewall? You may have heard of the term the 'Human Firewall', it's a bit of a buzzword at the moment, but what does it mean? Hackers are getting more sophisticated and are deliberately targeting the weakest link in your security, your team. Those human gatekeepers of an organisation’s safety. Your [...]

claireLOGIC Environmental Policy

claireLOGIC Environmental Policy

Executive summary As part of claireLOGIC's environmental policy we are committed to reducing our environmental impact. Doing so wherever possible across our operations and the services we deliver. Our goal is to provide services that are safe and environmentally sound. In addition to conducting our operations in an environmentally responsible and sustainable manner. The company [...]

Standing room only at disaster readiness business event

Standing room only at disaster readiness business event

It was standing-room only last Friday (20/09/2019), at our event in the stunning offices of tech giant’s Datto’s UK HQ in Reading – our carefully chosen panel of business experts came together to share best practice; educating delegates about the importance of planning for a disaster. There was a great atmosphere, as the speakers from [...]

Law firms – Why you shouldn’t let your unused domain names expire

Law firms – Why you shouldn’t let your unused domain names expire

Securing law firm domain names is critical. Criminals are targeting UK law firms because of the data they hold and the sheer volume of high-value transactions that go through them every month. In April 2019 there were over 70,000* property transactions in the UK, with the average UK house price for the same month coming [...]

claireLOGIC wins Customer Commitment Award

claireLOGIC wins Customer Commitment Award

2019 Thames Valley Chamber of Commerce business awards. It’s with great pride in our team that we’re happy to announce that claireLOGIC won the ‘Customer Commitment Award' at this years’ Thames Valley Chamber of Commerce business awards. This year’s awards were hosted by Olympic Gold Medallist Long Jumper Greg Rutherford – someone who knows a thing or [...]

Do you run a business that employees up to 250 staff?

Do you run a business that employees up to 250 staff?

There always seems to be bad news about another massive corporation paying little to no tax, or a senior manager accused of sexual misconduct. But what often doesn't get reported are the GOOD NEWS stories of the economy… News about people running and working in SME businesses that actually keep the UK economy going and [...]

HR and IT – Why this relationship should matter to you

HR and IT – Why this relationship should matter to you

As a director or business owner, you may not immediately see how important it is for your HR & IT teams to work closely together. You may outsource one or both of these functions; businesses usually do this to gain a greater depth of knowledge and better overall continuity whilst saving money. Regardless of how [...]

Our clients score us perfect in customer satisfaction

Our clients score us perfect in customer satisfaction

Last month claireLOGIC received a perfect feedback score – yes, 100%. We are elated to have reached – and to share – this incredible milestone. However, we can’t afford to be complacent. We constantly monitor how well we are performing using our ISO 9001 Quality Management System. So, to receive 100% is no mean feat! [...]

An aerial view of your IT strategy

An aerial view of your IT strategy

You understand your files and folders - which network drive they are on. But have you ever wondered what your IT infrastructure actually looks like? How that structure or choice of applications could impact business plans? Has the advice you've previously taken been completely impartial? You know your IT works and you hope it won’t let you [...]

Is your business disaster ready?

Is your business disaster ready?

Prevention is better than cure, obviously. Having any level of downtime in any organisation can lead to some serious problems – and downtime can be due to anything, from a power outage to a loss of internet connection – if an application breaks, a cyber-attack happens, or even a natural disaster or fire… 59% of the top FTSE [...]

NCSC Cyber Essentials Certification

NCSC Cyber Essentials Certification

Cyber Essentials, for us it's... essential. We’re pleased to announce that we have gained our Cyber Essential status, within the UK Government’s National Cyber Security Centre (NCSC) framework. The requirements for our IT infrastructure – within this framework – cover five core technical principles; these are: Firewall protection Security configuration User access control management Malware [...]

Where’s my email gone? part 1

Where’s my email gone? part 1

Protect PART 1 of 2 So, emails. You’ve probably sent a handful today already, from your phone or computer, and will undoubtedly send plenty more throughout the day. In business we use them as a way of staying in touch with multiple stakeholders, running projects and keeping on top of our work. If you’ve ever [...]

Where’s my email gone? Part 2

Where’s my email gone? Part 2

Keep it safe 'Dave' PART 2 of 2 At some point in time you may need to restore some data. Depending on what level of backup you have, you can go as far as restoring one single email that Dave in accounts sent you about your expenses being approved - or an entire inbox. The [...]

Why should you read the Terms and Conditions?

Why should you read the Terms and Conditions?

Scroll, scroll and scroll some more, look for the ‘Agree’ button and sign your life away. Terms and Conditions are in fact, a contract. They are a contract between you and the company you are using. So, when they are so important… why do most people never read them? The reason is a simple one: they [...]

Microsoft Office 365 could be the answer

Microsoft Office 365 could be the answer

They say that the six most dangerous words in business are “we’ve always done it that way”. I know I know, it’s a cliché, but resistance is futile. Ok, cliché’s over, but switching your email over to Office 365 could be the smartest thing you do this year. Whether you’re a Mac or a PC [...]

Managed IT Support Case Study for ‘Relics of Witney’

Managed IT Support Case Study for ‘Relics of Witney’

Background Managed IT Support Case Study for ‘Relics of Witney’. RELICS started in 1987 as a retail outlet initially selling antique and reclaimed items – as well as decorative and furnishing items. The proprietors developed the business to be at the forefront of restoration, finishing and decorative paint supplies to end-users and the trade. Overview [...]

How claireLOGIC supported Oakey Automotive Services fight-off the hackers

How claireLOGIC supported Oakey Automotive Services fight-off the hackers

Oakey’s are a car and van repair garage based in Oxfordshire. They were established in the early 80’s and now deliver specialist diesel vehicle repairs, servicing and MOT testing – the business has also recently expanded their range of offerings to include Motorhomes and caravan repairs and habitation servicing. Overview The business has a varied [...]

Why should you protect your business from ransomware attacks?

Why should you protect your business from ransomware attacks?

In a recent survey, 99% of Managed Service Providers (MSPs) predict significant increases in ransomware attacks over the next 2 years. The report was conducted by our disaster recovery partner Datto – who surveyed 1,700+ MSPs that serve 100,000+ small-to-mid-sized businesses globally. They found that ransomware attacks have soared in recent years, with nearly all [...]

What is Social Engineering and what does it mean to your business?

What is Social Engineering and what does it mean to your business?

Cyber social engineering scams have been around for more than a decade and yet people continue to fall for them every day. Down to a lack of awareness and basic cyber security training, people fall for the same tricks every day. Unfortunately, the weakest link in your cyber security is also usually your greatest asset [...]

IoT Security

IoT Security

IoT Security – handy tips to keep you and your 'things' safe... So, if you’re either one of your parents, or getting older before your time, in fact, if you’re not a Millennial, you probably find yourself saying, “well isn’t that clever” or, “what will they think of next”, a couple of times a week. OK, [...]

Don’t get stung by fake Microsoft and BT scammers

Don’t get stung by fake Microsoft and BT scammers

We are receiving a steady increase of support calls from clients who are falling foul of fake support calls – scammers pretending to be from either Microsoft, BT or your bank! Don't be stung by fake scammers. This activity has been ongoing for many years – however, the scammers are upping-their-game; and targeting more users, [...]

Cyber security: Understand the threat to your business

Cyber security: Understand the threat to your business

Right now, a business is being attacked. And while the criminals behind the attack might never be identified, they’re absolutely professional in their approach – and they can cost you a fortune and your credibility. Last year alone, 17 million British people were victims of cyber crime, yet incredibly, not everyone gives cyber security the consideration [...]

What is layered security and why do you need it?

What is layered security and why do you need it?

Protecting your IT systems is so important, especially with data laws being fortified through GDPR and regular news updates circulating around malware and viruses almost becoming the daily norm. Most companies and charities now have a certain level of IT protection in place, but is your security “layered”? About layered security Layered security involves multiple [...]

Is someone watching you through your TV?

Is someone watching you through your TV?

Many of us may welcome new smart gadgets and devices into our homes. They might have an impressive touchscreen or a smartphone app that allows you to control them from wherever you are, whenever – making life a little bit more fun (if that’s your kind of thing) and easier than before. Yet behind the [...]

Dangerous vault app for children – hidden on their phone

Dangerous vault app for children – hidden on their phone

It’s not always easy to spot a dangerous app for children. You might think you check your child’s phone often enough and it all looks above board. Sometimes, however, not everything is as your child or teenager would have you believe. App creators have identified that most children or teens like to keep secrets from [...]

Fed up with online ads? Not for much longer

Fed up with online ads? Not for much longer

Earlier in the year Google announced it was going to be imposing greater restrictions on online advertising, making browsing far easier and far less annoying for some of us. Google makes huge amounts of revenue from its very own online advertising, however, so how is this going to work? Currently, Google pays fees to third-party [...]

“WannaCry” ransomware. The scale of the attack has been huge.

“WannaCry” ransomware. The scale of the attack has been huge.

We're sure you’ve seen media coverage over the weekend of the “WannaCry” ransomware attack. The scale of the attack has been huge. What happened? Several large organisations were hit by a ransomware attack. This is where a computer gets infected with a certain type of virus. Once infected the virus searches the computer and network [...]

claireLOGIC is in team-buliding mode

claireLOGIC is in team-buliding mode

New team claireLOGIC is in team-building mode, we’ve recently taken on two new team members. We’re also continuing to look for more good people. If you’ve ever worked in management or owned your own business, you’ll know that finding the right person is not easy! You have a "shopping list" of what you're looking for - someone that will share your vision [...]

Increase your IT security with mobile antivirus

Increase your IT security with mobile antivirus

Most people today own a smartphone but are woefully negligent when it comes to mobile security. With some simple steps, you can stay ahead of the hackers and keep your data protected. Almost everyone who owns computer hardware understands the importance of antivirus software. Every year, businesses and consumers spend millions of pounds protecting their [...]

Achievement of ISO 9001:2015 certification – 2017

Achievement of ISO 9001:2015 certification – 2017

Everybody likes good news, even more so in January when it’s cold and the festive season is well behind us! Here at claireLOGIC, we’ve just had some really great news and we are very pleased to be able to share it with you. claireLOGIC's achievement of ISO 9001:2015 certification Over the years we have worked [...]

Do you use the same password for everything?

Do you use the same password for everything?

We’ve all been there. It’s just so easy to use the same login and password details across multiple websites. Yet we know it’s not the right or sensible thing to do. So if you make one New Year’s Resolution for 2017 make it this: to vary your logins and passwords before your accounts get hacked [...]

IT support in Abingdon – local company grows

IT support in Abingdon – local company grows

Abingdon IT Support Company – claireLOGIC grows into new offices - 2016 claireLOGIC, is proving to be a real local success story as they continue to expand – having recently grown their team and moved to new offices at the Vineyard in Abingdon to provide IT support for our local businesses. Despite a competitive local marketplace, [...]

Outsourcing your IT – Threats within your organisation

Outsourcing your IT – Threats within your organisation

Would you like to keep your business IT systems safe from hackers? Of course, you do! But what about threats from within? Would outsourcing your IT help? In many cases, small businesses appoint an internal IT person who is then granted access to sensitive information such as financial data, email addresses and passwords. In organisations [...]

We regularly share informative content on the latest trends, best practice and things to watch out for…

Want to be one of the first to read our blogs? Get them straight to your inbox.

claireLOGIC

Our company

  • Why claireLOGIC?
  • Meet the Team
  • Our partners
  • Who we support
  • Areas we cover

Talk to us

  • Book an appointment
  • Recruitment
  • Contact us
  • About us

Useful places

  • Resource Centre
  • HR Solutions
  • Get support

  • Privacy Policy
  • | Terms and Conditions

© 2025 claireLOGIC Corporate Ltd