hero_it_support_friendly_support_icon

Friendly Support

hero_it_support-Unlimited-Support_icon

Unlimited IT Support

hero_it_support_Tech-Experts-icon2

Tech Experts

Hero-it-support-Shared-Objectives-icon

Maximise Your Performance

Hero-it-support-Max-Performance

We Have Your Back

All
  • All
  • Business IT Solutions
  • Business IT Support
  • Cyber Security
  • Events
  • Microsoft 365
  • VoIP & Connectivity
Signal going from building to building

Which Connectivity to Choose

When starting a new company, moving offices or increasing number of staff connectivity needs to be carefully considered. Most businesses will have the following services using the internet: ·        VoIP Phone...
hero_it_support_pay_as_you_go

How to Choose a VOIP Solution

What is VOIP Voice over IP (VOIP) is a term used to define voice and multimedia services which run over the local area network and out across the public internet...
Office worker behind computer

What’s your Technology Disaster Recovery Plan?

I'm sure you'll agree with me when I say life would be boring if everything could be predicted. The reality is just like in life, not all things can be...
Typing on a keyboard

3 IT Requirements for Setting Up a New Business

There are so many things to think about when setting up a new business. In this guide, I'm going to outline the key areas to focus on when setting up...
Happy office staff

3 Steps to Keep Your Staff Cyber Secure

As a company providing small business IT support, the single biggest cyber vulnerability to your business we always see is your workforce.  You could invest millions in securing your IT...
Google search bar

Top Ten Google April Fool’s Day Pranks

Each year a series of Google April Fool’s Day pranks are released, becoming more crazy and more elaborate each time. We here at Hero IT Support like a good gag,...
Hero IT Support employees

Superhero Day 2018: Raising Money for Family Fund

As a company, we at Hero IT Support love doing our bit for charities and our local Brighton community. Whether it’s encouraging school children to take STEM GCSE’s or raising...
Working on a desktop device

Cookies: Manage Your Cookies on Google Chrome

Computers iOS Devices Android Follow the guides above to completely manage your cookies and cookie preferences on Google Chrome, giving you full control to complete actions such as deleting, setting...
Windows 10 desktop background

Windows 10 was released on 29th July 2015

Microsoft has announced that Windows 10 is due to be released on 29th July 2015, and as a small business IT support company we're quite excited. For the first year...
Multi-tasking office worker

When is the Right Time To Take On My Own In-house IT Person or Outsource My IT Support?

Maurice looks like he might cry. He’s been stuck under a desk, in someone else’s dust, following the instructions he googled 20 minutes ago. It’s not working! And he’s got...
Jovial office workers

What Makes a Good Computer for Business use?

I think you’ll agree with me when I say that if you’re trying to choose a new computer for your business, there’s a lot of choices. In this article, I’m...
Sending emails from mobile

WannaCry Ransomware: What happened, and what your business should do next

What is WannaCry and what happened? The NSA found a flaw in the windows operating system and had been exploiting it for some time to take control of remote computers....
iOS mobile device

How To Set Up Emergency Contact Information on a Mobile Device

Download the iOS Guide Download the Andriod Guide If you or your child were to ever be in an emergency or an unresponsive state, those attempting to help can access...
VoIP with Hero IT Support

VoIP Phones: Empower Your Business

What are VoIP Phones? ‘Voice over Internet Protocol’ phones are digital and rely on the internet. VoIP phones are geared for businesses with efficient capabilities for employees. Businesses use VoIP as...
Computer chip

These 2 Technologies are Going to Change Your Business

I’m sure you’ll agree – keeping up with the latest technologies can be difficult in today’s world. You just have to scroll through your, and it’s full on the next big...
Receiving and opening emails

Turn off the focused inbox in Outlook

Download the Guide Here Microsoft Office’s Outlook app automatically sorts your emails into a ‘focused’ inbox and an ‘other’ inbox. All IT support companies tend to help clients with this...
Different types of Malware

Threats to Your Business

Ransomware, Reyptson, Leakerlocker. These are all terms for some of the most common threats to your IT systems, and where those providing managed IT services provide priceless security. Before I...
leased_lines_hero_it-support2

The Shocking Truth About Connectivity That They’ve Been Keeping Secret From You For Years!!!

There are a few topics that can kill the soul of a conversation as quickly as one around (what we in IT support services call) ‘Connectivity’, or (what normal people...
Implementing IT security measures

The Most Important IT Security Measure’s You Can Implement for Your business

I’m sure you’ll agree with me when I say phishing emails are almost a daily occurrence in your inbox. In this article you will find out the most important IT...
STEM women gathered

STEM and Women in Tech at Hero IT Support

At Hero IT Support, we don’t like stereotypes and believe it is important to provide both men and women equal opportunities when it comes to work roles and career progression...
chiang-mai-thailand-january-04-2015-linkedin-is-a-social-networking-website-for-people-in-professional-occupations-on-apple-iphone-6-with-login-page_BPx-O1WOnfg-1-1024x683-1

Setting up Outlook on your iOS device

Download the guide here Whether it’s for business or personal emails, follow this simple, easy and free step-by-step guide on how to set up Outlook on your iOS device. You...
Opening-emails-1

Phishing Emails

23% of people that receive phishing emails will open them What is Phishing? Phishing is the fraudulent practice of sending emails purporting to be from reputable companies in order to...
Mouse-and-Hand-1

Phishing and How To Protect Your Business

3 Things that that could put you at risk from Phishing Opening attachments or clicking on links within emails that are unsolicited or unexpected, these are also called phishing emailsResponding to...
Shared mailbox

Keep more than 12 months worth of email history offline in Outlook

Download the guide here Outlook has a lot of default settings which few people know how to alter, and don't require the assistance of IT services. Did you know that...
App-Passwords-Featured-Image

How to create an ‘App Password’ for Office 365 Multi-Factor Authentication

Download the guide here What is an ‘App Password’? Multi-Factor is the latest in two-factor authentication technology from Microsoft. Some apps such as Skype and the Outlook mail app on...
MFA-Featured-Image-1-1

Multi-Factor Authentication – The key to protecting your businesses Microsoft 365 accounts

As a company providing small business IT support, Multi-Factor Authentication is our latest feature to help protect our customers. It has been concerning with the amount of email scams going...
Blog post on alternative screens

Are you ready to save your website?

Mobile Optimisation: Is your website ready? What Is Mobilegeddon? As leaders in IT services we're keen on all news in the tech industry, and this one struck us particularly interesting....
Typing on a keyboard

Managed IT Services: Reactive to Proactive

What is a Managed IT Services Provider? A managed IT services provider (MSP) offers management and support of IT network-based services, applications and equipment. As businesses become increasingly dependent on...
Taking up unlimited IT support

8 Reasons Businesses Taking Unlimited IT Support

IT Support and Services Our managed IT services and support are far more popular with businesses than the pay per hour equivalent. It builds trust and rewards the results your...
Microsoft office 365

Is Microsoft Office 365 Right For My Business?

Microsoft Office 365 is one of the most popular and talked about cloud solutions for businesses. However, with the cloud being a new managed backup platform most business owners still...
Boy looking at a tablet

Internet Safety Tips for Parents 2019

Download the GuideDownload Download and follow this free guide to implement the latest internet safety tips for 2019 to ensure you and your children remain safe when using the internet....
Microsoft OneDrive

How to spot and avoid the latest email scams- ‘The Fake One Drive Login’

As a company providing managed IT services, we have received a lot of reports of email scams recently. However, these are becoming harder to spot. Especially when the email comes...
Shared mailbox

How to add a shared mailbox on the Outlook mobile app with 2018 update

Download the guide here The iOS Outlook app no longer has the ‘shared mailbox’ feature. However, follow this guide for a simple way to continue to gain access from the...
Microsoft windows 2003

End of life for Windows server 2003

Windows Server 2003 End of Life Impact on Businesses The End of Life for the Windows Server 2003 family of products is July 14, 2015. On this date, all support...
Making use of encryption

Encryption

What is it and why does your business need it? Encryption is the process of encoding digital data so that only those authorised can access it. Encryption effectively “renders the...
Global connectivity

How to Create an Advanced Search on Google

Download the Guide You don't need managed IT services to get a thorough organic search result. Use Advanced Search on Google to find exactly what you are looking for safely...
Connecting digitally

Communication and Social Networking

Keep your employees and brand reputation secure when online Social networking and other forms of communication make both our personal and business lives easier and more efficient. However, due to...
Royal Mail Logo

Royal Mail Email Scam

Does this look legit to you? Would you follow the link provided? The scam, also known as CEO Fraud or Executive Impersonation Fraud, as well as the Big Boss Scam....
Information technology worker

How to spot and avoid the latest email fraud – The Big Boss Impersonation

https://youtu.be/QUa5qleBL5s How does the phishing scam work? Fraudsters send phishing emails which appear to have originated from business owners or individuals holding senior positions. These fraud emails are convincing and...
Deploying Business iPhones Across Your Company

Deploying Business iPhones Across Your Company

iPad’s and iPhone’s can transform your business and how your employee’s work. There are many benefits to iOS for business such as better, faster connectivity, new maps and faster navigation....
Ragnar and Chris Neilson

Cybercrime with Chris Neilson

Cybercrime There are many different types of cybercrime, with new methods constantly being used. Some of the most popular cybercrime examples include phishing, malware attacks, The Big Boss Scam, as well as...
Malware threats

What is Cryptowall?

What is Cryptowall? Trojan Cryptowall is a Trojan horse that encrypts files on the compromised computer. It then asks the user to pay to have the files decrypted. After they...
Handyman tools

Our Top Three Business Tools

Virtual Business Tools As a company providing small business IT support, we make sure that our technicians are always equipped with the right business tools to help our customers when...
Co-workers in a strategy session

Business Guide to Microsoft 365

Most people think Microsoft’s Office 365 (Microsoft 365) is Word/Excel/PowerPoint and a bit of email in the cloud. It’s not. Office 365 (Microsoft 365) is Microsoft’s name for a suite...
Password tips and tricks

5 Password Tips and Tricks When Choosing Passwords

Strong passwords can slow or potentially defeat the various methods hackers employ to attack your systems, accounts and emails. Being a company that provides small business IT support, we see...
Office troubleshooting

3 Reasons Why Your Office is Not Running at Full Speed

I’m sure you’ll agree with me there’s nothing worse than when the web grinds to a halt. This can have a big impact if your IT services are running in the...
Commenting on social media

Social Media

How much data do your social media profiles reveal? Social media is a big part of modern day personal and business life. Whether it’s staying in touch with friends or...
Communicating with other users

User Accounts

Do you know who has access to what data? Setting up user accounts is something dedicated IT support companies will suggest. Having user accounts means you have control over who...
Using mobile devices

Safe Computer Disposal

Business Data Can be Found after a Factory Reset Whether disposing of a computer or a mobile, you need to ensure safe computer disposal is done properly, taking into consideration...
Uploading content on WordPress

Safe Blogging

Blogs Can Put You at Risk of Identity Theft Whether blogging for personal reasons or for your business, you need to understand the risks and prevent them to ensure safe...
6-reasons-Monitor-screen

Safe Apple Mac Use

Is your business implementing safe Apple Mac use? Apple Mac devices are known for being less vulnerable to viruses and Malware, however, this does not mean that they are completely...
Phone lines

Premium Rate Phone Line Scams

Excessive Fees for Phone Lines There are many forms that a premium phone line scams can come in, something that we see quite often in managed IT services. All of...
Exchanging contact information

Physical Device Security

How to Maintain Your Physical Device Security Protecting your physical equipment from not only cybercrime, but theft, loss, accidental damage, fire and flood is also vital for the productivity, continuity and...
Operating System Updates and Software Updates

Operating System Updates and Software Updates

Keep Your Businesses Up to Date Operating system updates along with software updates are more important than you may think. Not updating the operating system on your computer, laptop or mobile...
iOS devices

Mobile Device Security and Apps

Does your business provide company mobiles to employees? Many businesses can benefit from the use of mobile devices as this enables easier communication between staff, customers and suppliers. But no technology...
Communication channels

Internet Calls Come with Risks

Internet calls such as Skype and mobile phone video calls are all very convenient and inexpensive for modern businesses. VoIP phones are becoming the standard phone system across businesses. This...
Holding a mobile device

Instant Messaging

Not all instant messaging platforms use encryption. Who is reading your data?Instant messaging has replaced text messages. Especially with the capabilities of video calling and voice calling. However, there are...
online_security_safety_websites_hero-it-supoort

HMRC and Companies House Scams

Spot the HMRC scams and Companies House phishing emails that could put your business at risk…HMRC scams and Companies House scams are usually distributed through phishing emails to business’ accounts...
Online shopping basket

Domain Name Scams

Have you ever heard of Domain Name scams?Creating a website comes with many risks. By creating or commissioning a website, you will need to purchase a domain. By doing so,...
Bitcoins

Cryptocurrency Investment Fraud

Cryptocurrency becoming increasingly popular meaning more risks…Cryptocurrency is on the rise and so is are cybercrime scams relating to it. This is particularly important for businesses looking to invest in...
Combination lock and credit cards

Credit Card Fraud, Cheque and Bank Card Scams

Learn to spot fake cheques, credit and bank card paymentsWhen taking payments in your business, you want to ensure it is legal tender. Equally, when paying for goods and services...
Dial pad on mobile

Call Recording

Did you know that your call could be recorded without you knowing?This is something we see on a regular basis providing small business IT support. You can pay a company...
Safe-Contactless-Payment

Safe Contactless Payment

Is every contactless purchase a safe contactless payment?Contactless cards have been around for a while now, but are we using them safely? Contactless cards use a technology called Near Field Communication...
The-Office-Supply-Scam

The Office Supply Scam

Ensure your staff know who is ordering what…Ordering supplies can come with its problems, with orders being wrong, things being missed or out of stock. However, it’s important you ensure...
Online-Shopping-Fraud

Online Shopping Fraud

How often do you or your employees use online shopping?Online shopping has revolutionised the way that people shop these days, as it brings convenience, saves time and provides users with...
Courier-Scams

Courier Scams

Spot the signs of courier scams…Courier scams are mainly targeted towards individuals rather than businesses, however, it is still important to familiarise yourself with the scam, especially if you have...
Invoice-Scams

Invoice Scams

Can your accounts staff spot malicious invoice scams?Working in business accounts can be a risky place with the amount of cybercrime surrounding invoices, accounts and payments. Your accounts staff should...
Online-Banking-and-Transferring-Money

Online Banking and Transferring Money

Are you and your employees using online banking safely?…Transferring money via mobile and online banking is easy and convenient in both business and personal use. However, cybercriminals take advantage of...
Protect-Your-Website2

Protect Your Website

Protect your business reputation and customer base Do you know how to protect your website from cybercriminals? You want to make sure your website is secure at all times from...
copycat_website_hero-it-support

Copycat Websites

Learn how to spot copycat websites Could you identify copycat websites? These websites are fake replicas of real government department or agency sites, with everything from the branding and logos...
trade_websites_hero_it_support

Trades Recommendation Websites

Identify the signs of a trades recommendation website which may not be completely legitimate How do you know which tradesperson to contract for your business? If your business is looking...
hero_it_support_review_bg

Use of Cookies

Our websites use cookies to distinguish you from other users of our website. This helps us to provide you with a good experience when you browse our website and also...
safe-internet-hero-it-support

Safe Internet Use

Avoid malicious sites and optimise your security features Could you spot a fake website? Do you implement safe internet use in your business? Secure Websites When visiting websites, ensure there...
How-to-Set-Up-VPN-on-Mobile-1080x675-1-1080x675

How to Set Up a VPN on a Mobile Device

WiFi on your mobile device whilst working can be risky. However, using a VPN (Virtual Private Network) ensures that your online activity is safe from cybercriminals intercepting your activity through...
How-To-Set-Up-a-WiFi-Hotspot-on-Your-Mobile-1080x675-1-1080x675

How To Set Up a WiFi Hotspot on Your Mobile Device

Many people are increasingly relying on WiFi Hotspots when working on the go. This however, does come with cybercrime risks. In order to protect your personal and business data, you...
cyber_security_wiFi_hotspots

WiFi Hotspot Security

Do you regularly work on the go and rely on WiFi hotspots? The secure use of WiFi hotspots is important for both business and personal safety. If you are working...
cable-800x675

Which Broadband Should My Business Be Using? – A Brief History Of Connectivity

Confused by all the Broadband packages out there? What it is, where it came from, and who it’s for Dial Up – The first commercial incarnation of connectivity (made that screechy...