hero_it_support_friendly_support_icon

Friendly Support

hero_it_support-Unlimited-Support_icon

Unlimited IT Support

hero_it_support_Tech-Experts-icon2

Tech Experts

Hero-it-support-Shared-Objectives-icon

Maximise Your Performance

Hero-it-support-Max-Performance

We Have Your Back

All
  • All
  • Business IT Solutions
  • Business IT Support
  • Cyber Security
  • Events
  • Microsoft 365
  • VoIP & Connectivity
hero_it_support_pay_as_you_go

How to Choose a VOIP Solution

What is VOIP Voice over IP (VOIP) is a term used to define voice and multimedia services which run over the local area network and out across the public internet...
typing-849806_1280-1024x658

What’s your Technology Disaster Recovery Plan?

I'm sure you'll agree with me when I say life would be boring if everything could be predicted. The reality is just like in life, not all things can be...
Business-it-support-Hero-IT-support

3 IT Requirements for Setting Up a New Business

There are so many things to think about when setting up a new business. In this guide, I'm going to outline the key areas to focus on when setting up...

3 Steps to Keep Your Staff Cyber Secure

The single biggest cyber vulnerability to your business is your workforce.  You could invest millions in securing your IT systems (Equifax, Sony, Marriot, NHS) to name a few but the...
Google-Home-Page-e1550243484604-1080x675-1

Top Ten Google April Fool’s Day Pranks

Each year a series of Google April Fool’s Day pranks are released, becoming more crazy and more elaborate each time. Here are some of the most entertaining pranks we have...
Layout-Featured-Image-Blurred-768x487 (1)

Superhero Day 2018: Raising Money for Family Fund

As a company, we at Hero IT Support love to do our bit for charities and our local Brighton community. Whether it’s encouraging school children to take STEM GCSE’s or...
Website-Cookie-Management-1024x683-1

Cookies: Manage Your Cookies on Google Chrome

Computers iOS Devices Android Follow this guide to completely manage your cookies and cookie preferences on Google Chrome, giving you full control to complete actions such as deleting, setting preferences,...
Windows-10

Windows 10 was released on 29th July 2015

Microsoft has announced that Windows 10 is due to be released on 29th July 2015. For the first year they will upgrade those who are on genuine versions of Windows...
When-is-the-right-time-to-outsource-my-it-support-1024x683

When is the Right Time To Take On My Own In-house IT Person or Outsource My IT Support?

Maurice looks like he might cry. He’s been stuck under a desk, in someone else’s dust, following the instructions he googled 20 minutes ago. It’s not working! And he’s got...
woman-in-blue-suit-jacket-2422293-1024x728-1

What Makes a Good Computer for Business use?

I think you’ll agree with me when I say that if you’re trying to choose a new computer for your business, there’s a lot of choices. In this article, I’m...
Emails

WannaCry Ransomware: What happened, and what your business should do next

What is WannaCry and what happened? The NSA found a flaw in the windows operating system and had been exploiting it for some time to take control of remote computers....
How-To-Set-Up-Emergency-Contact-Information-on-a-Mobile-Device-1080x675

How To Set Up Emergency Contact Information on a Mobile Device

Download the iOS Guide Download the Andriod Guide If you or your child were to ever be in an emergency or an unresponsive state, those attempting to help can access...
Managed-VoIP-Header-1024x582-1

VoIP Phones: Empower Your Business

What are VoIP Phones? ‘Voice over Internet Protocol’ phones are digital and rely on the internet. VoIP phones are geared for businesses with efficient capabilities for employees. Businesses use VoIP as...
technology-background-1632715-1279x854-1-1024x683-1

These 2 Technologies are Going to Change Your Business

I’m sure you’ll agree – keeping up with the latest technologies can be difficult in today’s world. You just have to scroll through your, and it’s full on the next big...
Opening-emails-1-1

Turn off the focused inbox in Outlook

Download the Guide Here Microsoft Office’s Outlook app automatically sorts your emails into a ‘focused’ inbox and an ‘other’ inbox. Some people find this helpful as it places the seemingly...
shutterstock_577481197-1024x683-1

Threats to Your Business

Ransomware, Reyptson, Leakerlocker. These are all terms for some of the most common threats to your IT systems. Before I start and get into the nitty gritty – IT security...
leased_lines_hero_it-support2

The Shocking Truth About Connectivity That They’ve Been Keeping Secret From You For Years!!!

There are a few topics that can kill the soul of a conversation as quickly as one around (what we in IT call) ‘Connectivity’, or (what normal people call) ‘Broadband’....
typing-849806_1280-1024x658-1

The Most Important IT Security Measure’s You Can Implement for Your business

I’m sure you’ll agree with me when I say phishing emails are almost a daily occurrence in your inbox. In this article you will find out the most important IT...
Women-in-Technology-STEM-Event-2016-1024x645-1

STEM and Women in Tech at Hero IT Support

At Hero IT Support, we don’t like stereotypes and believe it is important to provide both men and women equal opportunities when it comes to work roles and career progression....
chiang-mai-thailand-january-04-2015-linkedin-is-a-social-networking-website-for-people-in-professional-occupations-on-apple-iphone-6-with-login-page_BPx-O1WOnfg-1-1024x683-1

Setting up Outlook on your iOS device

Download the guide here Whether it’s for business or personal emails, follow this simple, easy and free step-by-step guide on how to set up Outlook on your iOS device. You...
Opening-emails-1

Phishing Emails

23% of people that receive phishing emails will open them What is Phishing? Phishing is the fraudulent practice of sending emails purporting to be from reputable companies in order to...
Mouse-and-Hand-1

Phishing and How To Protect Your Business

3 Things that that could put you at risk from Phishing Opening attachments or clicking on links within emails that are unsolicited or unexpected, these are also called phishing emailsResponding to...
How-to-add-a-shared-Mailbox-on-the-Outlook-mobile-app-with-2018-update-1024x640-1

Keep more than 12 months worth of email history offline in Outlook

Download the guide here Outlook has a lot of default settings which few people know how to alter. One example is being able to download more than 12 months worth...
App-Passwords-Featured-Image

How to create an ‘App Password’ for Office 365 Multi-Factor Authentication

Download the guide here What is an ‘App Password’? Multi-Factor is the latest in two-factor authentication technology from Microsoft. Some apps such as Skype and the Outlook mail app on...
MFA-Featured-Image-1-1

Multi-Factor Authentication – The key to protecting your businesses Microsoft 365 accounts

Multi-Factor Authentication is our latest feature to help protect our customers as it has been concerning with the amount of email scams going around recently and as a business we...
Blog-on-Multiple-Devices-1024x735-1

Are you ready to save your website?

Mobile Optimisation: Is your website ready? What Is Mobilegeddon? On the 21st April 2015, Google are changing their search results and deciding whether your website is ‘mobile ready’, if your...
Business-it-support-Hero-IT-support

From Reactive to Proactive with Managed Services

What is a Managed IT Services Provider? A managed IT services provider (MSP) offers management and support of IT network-based services, applications and equipment. As businesses become increasingly dependent on...
Image-for-blog-post-1-1

8 Top Reasons Businesses Should Always Buy Unlimited IT Support

IT Support and Services Our Managed IT Support and services are far more popular with businesses than the pay per hour equivalent. It builds trust and rewards the results your...
Office-365

Is Microsoft Office 365 Right For My Business?

Microsoft Office 365 is one of the most popular and talked about cloud solutions for businesses. However, with the cloud being a new platform most business owners still find themselves...
Internet-Safety-Tips-for-Parents-2019-1024x683-1

Internet Safety Tips for Parents 2019

Download the GuideDownload Download and follow this free guide to implement the latest internet safety tips for 2019 to ensure you and your children remain safe when using the internet....
One-Drive-Scam

How to spot and avoid the latest email scams- ‘The Fake One Drive Login’

Recently we have received a lot of reports of email scams. However, these are becoming harder to spot. Especially when the email comes from one of your work colleagues real...
How-to-add-a-shared-Mailbox-on-the-Outlook-mobile-app-with-2018-update-1024x640-1

How to add a shared mailbox on the Outlook mobile app with 2018 update

Download the guide here The iOS Outlook app no longer has the ‘shared mailbox’ feature. However, follow this guide for a simple way to continue to gain access from the...
WIndows-2003

End of life for Windows server 2003

Windows Server 2003 End of Life Impact on Businesses The End of Life for the Windows Server 2003 family of products is July 14, 2015. On this date, all support...
Featured-Image-1

Encryption

What is it and why does your business need it? Encryption is the process of encoding digital data so that only those authorised can access it. Encryption effectively “renders the...
Safe-Internet-Searches--1080x675

How to Create an Advanced Search on Google

Download the Guide Use Advanced Search on Google to find exactly what you are looking for safely and securely: https://www.google.co.uk/advanced_search? To complete an Advanced search on Google, type what you are looking...
Communication-and-Social-Networking

Communication and Social Networking

Keep your employees and brand reputation secure when online Social networking and other forms of communication make both our personal and business lives easier and more efficient. However, due to...
Royal-Mail

Royal Mail Email Scam

Does this look legit to you? Would you follow the link provided? The scam, also known as CEO Fraud or Executive Impersonation Fraud, as well as the Big Boss Scam....
Big-Boss

How to spot and avoid the latest email fraud – The Big Boss Impersonation

The scam, also known as CEO Fraud or Executive Impersonation Fraud, as well as the Big Boss Scam. As a business owner or shareholder information about you is publicly available....
Deploying Business iPhones Across Your Company

Deploying Business iPhones Across Your Company

Benefits of Business iPhones iPad’s and iPhone’s can transform your business and how your employee’s work. There are many benefits to iOS for business such as better, faster connectivity, new...
Chris-and-Ragnar

Cybercrime with Chris Neilson

Cybercrime There are many different types of cybercrime, with new methods constantly being used. Some of the most popular cybercrime examples include phishing, malware attacks, The Big Boss Scam, as well as...
Cryptowall-Featured-Image

What is Cryptowall?

What is Cryptowall? Trojan Cryptowall is a Trojan horse that encrypts files on the compromised computer. It then asks the user to pay to have the files decrypted. After they...
National-Worship-of-Tools-1024x683-1

Our Top Three Business Tools

Virtual Business Tools As an IT company, we make sure that our technicians are always equipped with the right business tools to help our customers when on site. Each one...
startup-594091_1280-1024x682-1

Business Guide to Microsoft 365

Most people think Microsoft’s Office 365 (Microsoft 365) is Word/Excel/PowerPoint and a bit of email in the cloud.  It’s not.  Office 365 (Microsoft 365) is Microsoft’s name for a suite...
Padlock-Password-1

5 Password Tips and Tricks When Choosing Passwords

Strong passwords can slow or potentially defeat the various methods hackers employ to attack your systems, accounts and emails. Using these 5 password tips within your business will significantly reduce...
man-with-hand-on-temple-looking-at-laptop-842554-1024x674-1

3 Reasons Why Your Office is Not Running at Full Speed

I’m sure you’ll agree with me there’s nothing worse than when the web grinds to a halt. This can have a big impact if your IT services are running in the...
Social-Media

Social Media

How much data do your social media profiles reveal? Social media is a big part of modern day personal and business life. Whether it’s staying in touch with friends or...
Users-1024x724-1

User Accounts

Do you know who has access to what data? Having user accounts means you have control over who has access to what in your business as well as ensuring that...
Device-Disposal-1024x680

Safe Computer Disposal

Business Data Can be Found after a Factory Reset Whether disposing of a computer or a mobile, you need to ensure safe computer disposal is done properly, taking into consideration...
New-Blog-Post-on-Laptop-1024x683

Safe Blogging

Blogs Can Put You at Risk of Identity Theft Whether blogging for personal reasons or for your business, you need to understand the risks and prevent them to ensure safe...
6-reasons-Monitor-screen

Safe Apple Mac Use

Is your business implementing safe Apple Mac use? Apple Mac devices are known for being less vulnerable to viruses and Malware, however, this does not mean that they are completely...
Premium-Rate-Phone-Line-Scam-1024x683-1

Premium Rate Phone Line Scams

Excessive Fees for Phone Lines There are many forms that a premium phone line scams can come in. All of these have the potential to damage your business reputation, or...
you-x-ventures-BAanEbxe9No-unsplash-1

Physical Device Security

How to Maintain Your Physical Device Security Protecting your physical equipment from not only cybercrime, but theft, loss, accidental damage, fire and flood is also vital for the productivity, continuity and...
Operating-System-1024x633-1

Operating System Updates and Software Updates

Keep Your Businesses Up to Date Operating system updates along with software updates are more important than you may think. Not updating the operating system on your computer, laptop or mobile...
william-iven-SpVHcbuKi6E-unsplash

Mobile Device Security and Apps

Does your business provide company mobiles to employees? Many businesses can benefit from the use of mobile devices as this enables easier communication between staff, customers and suppliers. But no technology...
Internet-Calls-1024x726-1

Internet Calls Come with Risks

Internet calls such as Skype and mobile phone video calls are all very convenient and inexpensive for modern businesses. VoIP phones are becoming the standard phone system across businesses. This...
Mobile-Phone-instant-Message-1024x683-1

Instant Messaging

Not all instant messaging platforms use encryption. Who is reading your data? Instant messaging has replaced text messages. Especially with the capabilities of video calling and voice calling. However, there are...
online_security_safety_websites_hero-it-supoort

HMRC and Companies House Scams

Spot the HMRC scams and Companies House phishing emails that could put your business at risk…HMRC scams and Companies House scams are usually distributed through phishing emails to business’ accounts...
eccommerce-concept-4-1057068

Domain Name Scams

Have you ever heard of Domain Name scams?Creating a website comes with many risks. By creating or commissioning a website, you will need to purchase a domain. By doing so,...
Bitcoin-Cryptocurrency-1024x650-1

Cryptocurrency Investment Fraud

Cryptocurrency is a virtual currency and is becoming increasingly popular meaning there are increasing risks…Cryptocurrency is on the rise and so is the cybercrime relating to it. This is particularly...
Credit-Cards-1024x727

Credit Card Fraud, Cheque and Bank Card Scams

Learn to spot fake cheques, credit and bank card paymentsWhen taking payments in your business, you want to ensure it is legal tender. Equally, when paying for goods and services...
Call-Recording-on-a-Mobile-948x1024-1

Call Recording

Did you know that your call could be recorded without you knowing?You can pay a company for a call recording service. However, some cybercriminals set up call recording without you...
Safe-Contactless-Payment

Safe Contactless Payment

Is every contactless purchase a safe contactless payment?Contactless cards have been around for a while now, but are we using them safely? Contactless cards use a technology called Near Field Communication...
The-Office-Supply-Scam

The Office Supply Scam

Ensure your staff know who is ordering what…Ordering supplies can come with its problems, with orders being wrong, things being missed or out of stock. However, it’s important you ensure...
Online-Shopping-Fraud

Online Shopping Fraud

How often do you or your employees use online shopping?Online shopping has revolutionised the way that people shop these days, as it brings convenience, saves time and provides users with...
Courier-Scams

Courier Scams

Spot the signs of courier scams…Courier scams are mainly targeted towards individuals rather than businesses, however, it is still important to familiarise yourself with the scam, especially if you have...
Invoice-Scams

Invoice Scams

Can your accounts staff spot malicious invoice scams?Working in business accounts can be a risky place with the amount of cybercrime surrounding invoices, accounts and payments. Your accounts staff should...
Online-Banking-and-Transferring-Money

Online Banking and Transferring Money

Are you and your employees using online banking safely?…Transferring money via mobile and online banking is easy and convenient in both business and personal use. However, cybercriminals take advantage of...
Protect-Your-Website2

Protect Your Website

Protect your business reputation and customer base Do you know how to protect your website from cybercriminals? You want to make sure your website is secure at all times from...
copycat_website_hero-it-support

Copycat Websites

Learn how to spot copycat websites Could you identify copycat websites? These websites are fake replicas of real government department or agency sites, with everything from the branding and logos...
trade_websites_hero_it_support

Trades Recommendation Websites

Identify the signs of a trades recommendation website which may not be completely legitimate How do you know which tradesperson to contract for your business? If your business is looking...
hero_it_support_review_bg

Use of Cookies

Our websites use cookies to distinguish you from other users of our website. This helps us to provide you with a good experience when you browse our website and also...
safe-internet-hero-it-support

Safe Internet Use

Avoid malicious sites and optimise your security features Could you spot a fake website? Do you implement safe internet use in your business? Secure Websites When visiting websites, ensure there...
How-to-Set-Up-VPN-on-Mobile-1080x675-1-1080x675

How to Set Up a VPN on a Mobile Device

WiFi on your mobile device whilst working can be risky. However, using a VPN (Virtual Private Network) ensures that your online activity is safe from cybercriminals intercepting your activity through...
How-To-Set-Up-a-WiFi-Hotspot-on-Your-Mobile-1080x675-1-1080x675

How To Set Up a WiFi Hotspot on Your Mobile Device

Many people are increasingly relying on WiFi Hotspots when working on the go. This however, does come with cybercrime risks. In order to protect your personal and business data, you...
cyber_security_wiFi_hotspots

WiFi Hotspot Security

Do you regularly work on the go and rely on WiFi hotspots? The secure use of WiFi hotspots is important for both business and personal safety. If you are working...
cable-800x675

Which Broadband Should My Business Be Using? – A Brief History Of Connectivity

Confused by all the Broadband packages out there? What it is, where it came from, and who it’s for Dial Up – The first commercial incarnation of connectivity (made that screechy...