Securing your Mac

It does not seem that long ago I would hear Mac users say “I don’t need Anti-Virus”, or “Mac’s are not affected”. To a certain extent they were right. Apple’s use of tightly controlled application approvals reduced the surface area for attack. Mac...

How secure is your cloud IT? Is it as safe as you expect?

Your cloud computing can be safe and secure, or open and vulnerable – the choice is yours. With the rise of hacker activity and cybercrime, it’s essential to lock down your cloud and protect it from threats. For most businesses, the standard 365 settings...

What would you do Canterbury? Incident Response Workshop

Mastering Cybersecurity  What would you do? Table-top exercise Join us for an interactive table-top simulation exercise. Imagine – you are busy going about your day when suddenly your meeting is interrupted.  “No one can access their files” or...

Have you met Microsoft Loop?

Have you noticed the Microsoft Loop icon in your 365 screen? (It’s been there for a few months) Loop is a comparatively new collaborative app that allows users to create, share, and work together on various types of content, including notes, tables, lists, and...

Is your Teams calling giving the actionable data you need?

Like many businesses, we rely on Microsoft Teams for our messaging and voice/video calling  It’s easy to use, works well on all our devices and is highly reliable. But the standard reporting wasn’t working for us. We were completely frustrated We knew our...

Fractional CIO, vCIO, ITMaaS – what’s the difference?

Kinetics has been providing IT strategy advice and leadership to a number of clients for many years now. We have found that there are a number of organisations who are mature enough to realise they require a more strategic approach to technology, however they cannot...