News & Blog

Cyber Security Bulletin – July 2022

Here are our top cyber security news items and information for your attention. These bulletin articles have been specially selected by our in-house Security Operations Centre (SOC) team. To find out more about our fully comprehensive range of cyber security services please CLICK HERE 1. The Works forced to close some stores after cyber-attack The Works, a retail shop that offers discounted books, crafts, and toys suffered a cyber attack forcing the closure of multiple retail stores due to an attack affecting critical infrastructure. The attack caused disruption to the operations of the company and The Works took precautions by...

Written by Phil Roch

Read More

Mission Critical IT – Feefo

Interview report paper with: Richard Sawney (CFO) Feefo - smart customer review and insights platform for businesses CLICK HERE to download and read our interview report. SYNOPSIS THE HEART OF BUSINESS Arguably the fundamental requirement of effective IT, delivering improved efficiency, productivity, and service delivery, and for the customer to have the best possible engagement with an organisation, hasn’t changed.   But delivering the answer couldn’t be more complex. In an age of constant digital change, have businesses the time and competence to stay on top of IT? The implications are increased vulnerability, as well as an impact on effectiveness,...

Written by Phil Roch

Read More

Cyber Security Bulletin – June 2022

Here are our top cyber security news items and information for your attention. These bulletin articles have been specially selected by our in-house Security Operations Centre (SOC) team. 1. Cyber Essentials - The Government backed scheme to help businesses to implement effective cyber security measures   Let's start off with a cyber fact: Up to 88% of businesses have suffered data breaches in the last 12 months. Take the important first step to securing your valuable IT infrastructure against hackers and cybercriminals by gaining a Cyber Essentials accreditation.   What is Cyber Essentials? Cyber Essentials is an effective, Government-backed scheme...

Written by Phil Roch

Read More

Mission Critical IT – Morgan Innovation & Technology

Interview report paper with: Nigel Clarke (CEO) & James Quest (CTO)       Morgan Innovation & Technology CLICK HERE to download and read our interview report.     SYNOPSIS THE HEART OF BUSINESS Arguably the fundamental requirement of effective IT, delivering improved efficiency, productivity, and service delivery, and for the customer to have the best possible engagement with an organisation, hasn’t changed.   But delivering the answer couldn’t be more complex. In an age of constant digital change, have businesses the time and competence to stay on top of IT? The implications are increased vulnerability, as well as an impact...

Written by Phil Roch

Read More

Cyber Security Bulletin – May 2022

Top 4 Security Issues Here are our top cyber security news stories from around the world. These stories have been specially selected by our in-house Security Operations Centre (SOC) team for being the most critically relevant to you.   1. Microsoft to disable Exchange Online basic authentication in October 2022 Microsoft has sent out a reminder post to inform users of the upcoming amendment to the way that authentication works for Exchange Online. Put simply, basic authentication allows the use of locally stored credentials (on the end-user device) and sends them – via plain text (not encrypted) – to servers,...

Written by Phil Roch

Read More

Mission Critical IT – Pallant Chambers

Interview report paper with: Alister Williams, Chief Executive   Pallant Chambers - Legal Services CLICK HERE to download and read our interview report. SYNOPSIS THE HEART OF BUSINESS Arguably the fundamental requirement of effective IT, delivering improved efficiency, productivity, and service delivery, and for the customer to have the best possible engagement with an organisation, hasn’t changed.   But delivering the answer couldn’t be more complex. In an age of constant digital change, have businesses the time and competence to stay on top of IT? The implications are increased vulnerability, as well as an impact on effectiveness, remaining competitive, achieving...

Written by Phil Roch

Read More

Tailor Made awarded NEC Premier Partner

We are delighted to announce that Tailor Made Technologies have been awarded the NEC Premier Partner and UNIVERGE BLUE Premier Partner accolades. Craig Rimmer, Business Development Manager for NEC Enterprise, came to our HQ in Whiteley and presented Tom Houston, Sales Director, with both plaques. Tom was more than proud to accept the awards on the behalf of Tailor Made: "To be awarded both accolades is testament to the long-standing relationship we hold with NEC and the recent development of their evolving portfolio of products. In Univerge Blue, NEC has understood the changing nature of business operations and developed a...

Written by Phil Roch

Read More

Mission Critical IT – Coles Miller Solicitors

Interview report paper with: Neil Andrews, Managing Director, & Tim Skue, IT Manager Coles Miller Solicitors CLICK HERE to download and read our interview report. SYNOPSIS THE HEART OF BUSINESS Arguably the fundamental requirement of effective IT, delivering improved efficiency, productivity, and service delivery, and for the customer to have the best possible engagement with an organisation, hasn’t changed.   But delivering the answer couldn’t be more complex. In an age of constant digital change, have businesses the time and competence to stay on top of IT? The implications are increased vulnerability, as well as an impact on effectiveness, remaining...

Written by Phil Roch

Read More

Cyber Security Bulletin – March 2022

Here is the latest Cyber Security Bulletin containing our top cyber security news stories from around the world. Specially selected by our in-house Security Operations Centre Team for being the most critical for your awareness. Top 5 Security Issues This Week 1. Geopolitical situation in Eastern Europe may result in a significant and drastic increase in cyber-attacks against all organisations. The fluid and dire situation in Eastern Europe is almost certain to have a dramatic effect on the amount and severity of cyber attacks against all organisations. There is a suspicion amongst our analysts, that the cyber “call-to-arms” from Ukraine...

Written by Phil Roch

Read More

INNOVATE 2022 – Technology Showcase Event Southampton

Discover the latest in IT and Communications Technology Wednesday 27th April ~ 9am – 5pm Aspire Lounge, St Mary’s Stadium, Southampton   🟣 Free to register and to attend the event 🟣 4 industry-leading technology providers showcasing their latest innovations 🟣 Thought-provoking presentations discussing the latest in IT & telecoms for business  🟣 Discover how your business can succeed through implementing technologies via Tailor Made 🟣 Free guided tour of the stadium – see parts of the site that you wouldn’t see on matchdays 🟣 Free parking on site 🟣 Complimentary Artisan lunch buffet 🟣 Complimentary Tea and coffee refreshments throughout the day 🟣 Light entertainment from...

Written by Phil Roch

Read More

Mission Critical IT – Biscoes Solicitors

Interview report paper with Alison Lee, Managing Director, Biscoes Solicitors CLICK HERE to download and read our interview report. SYNOPSIS THE HEART OF BUSINESS Arguably the fundamental requirement of effective IT, delivering improved efficiency, productivity, and service delivery, and for the customer to have the best possible engagement with an organisation, hasn’t changed.   But delivering the answer couldn’t be more complex. In an age of constant digital change, have businesses the time and competence to stay on top of IT? The implications are increased vulnerability, as well as an impact on effectiveness, remaining competitive, achieving sustainability, in addition to...

Written by Phil Roch

Read More

Cyber Security Bulletin – Top 5 Security Issues

Top 5 Security Issues This Week 1. NCSC (National Cyber Security Centre) encourage UK organisations to ensure effective cyber resiliency in response to the current RUS/UKR situation.  The NCSC has urged all UK organisations to shore up their cyber security in response to significantly increased cyber incidents, in and around Ukraine. There are similarities in Tactics, Techniques, and Procedures (TTPs) between this current increased activity, and the attacks against Georgia in 2017 (this includes the destructive NotPetya attacks).  Whilst there is no specific indication of any threat to UK organisations, the NCSC and GCHQ have provided guidance to help organisations...

Written by Phil Roch

Read More

Tech Thoughts Blog – Energy Transformations

Energy Transformation - Tech Thoughts Blog Introduction This is the latest in a series of Tailor Made Tech Thoughts, providing insight on tech matters that relate to SMEs. In these bulletins I look at recent developments in the tech industry as well as global trends, then attempt to evaluate opportunities for small and medium businesses to embrace those new developments. In the wake of the COP-26 summit in Glasgow, there’s now more focus than ever before on the environment. In this post, I’ve been thinking about what this means for SMEs and what practical steps can be taken to help...

Written by Phil Roch

Read More

Log4j Vulnerability – Critical IT Security Threat

Critical level IT system threat - Log4J / Log4Shell Vulnerability (CVE-2021-44228) and (CVE-2021-45046) UPDATE: 17/12/21 By now you have probably heard of a CRITICAL ‘zero-day’ vulnerability dubbed ‘Log4Shell’ – this vulnerability takes advances of a flaw in a Java-based logging component called ‘Log4j’. Java and Log4j are widely used by many organisations around the world, many of which you will be familiar with such as Amazon, Papercut, Dell, Broadcom, VMWare, Cisco, and IBM. A zero-day vulnerability/attack is a flaw within a system/software that is actively being exploited by attackers before there has been time to remediate vulnerable systems. If this...

Written by Phil Roch

Read More

Tech Thoughts – Blurring lines between Physical and Virtual Workspace

Introduction  This is the latest in a series of Tailor Made Tech Thoughts, providing insight on tech matters that relate to SME’s. In these bulletins I look at recent developments in the tech industry as well as  global trends, then attempt to evaluate opportunities for small and medium businesses to embrace those new developments. In this post, I want to think about the way that the physical world is being blurred with the virtual world, how we arrived at the current situation, what impact this could have on businesses today and how the current situation is likely to develop in the future.  Richard Hotchkin, CTO. Tailor Made...

Written by Phil Roch

Read More

Tech Thoughts – Microsoft Ignite 

Introduction  This is the latest in a series of Tailor Made Tech Thoughts, providing insight on tech matters that relate to SME’s. In these bulletins I look at recent developments in the tech industry as well as global trends, then attempt to evaluate opportunities for small and medium businesses to embrace those new developments. Recently Microsoft held their Microsoft Ignite event that showcases all the latest developments that they’ve been working on. I wanted to use this post to look at some of those developments and understand why Microsoft have been spending their time on these features.  Richard Hotchkin, CTO. Tailor Made Technologies  Key Highlights  The global pandemic...

Written by Phil Roch

Read More

Financial firms need to be taking their cyber security more seriously

Financial Technology Research Centre founder, Ian McKenna, has warned that financial firms need to be taking their cyber security more seriously as the UK regulator is likely to become stricter on this matter. In the US the SEC (Securities and Exchange Commission) is becoming progressively stringent with financial firms who fall under attack of cyber criminals. The SEC announced in September that they had actually sanctioned eight firms for failing to sufficiently update and regulate their cybersecurity policies and processes. The SEC’s orders against each of the eight firms found that they violated ‘rule 30(a) of regulation S-P’ – also...

Written by Phil Roch

Read More

House sales halted by security breach

Following a recent cyber-security breach to a property organisation, thousands of buyers and conveyancing transactions are in limbo. A Leicestershire based company were left unable to access their systems following a “security incident”, meaning multiple property purchases were put on hold. The problems caused by the breach left some movers stuck on completion day, unable to move into their new homes. The breach meant that customers were totally unable to get through to the company and had no timeframe given for a resolution. The breach meant that staff were unable to access their systems and emails, leaving no communications channels...

Written by Phil Roch

Read More

Tech Thoughts – Windows 11 & 365

Introduction  This is the latest in a series of Tailor Made Tech Thoughts, providing insight on tech matters that relate to SME’s. In these bulletins I look at recent developments in the tech industry as well as  global trends, then attempt to evaluate opportunities for small and medium businesses to embrace those new developments. Recently Microsoft have released a couple of landmark new products that will almost certainly touch all organisations in the coming years. I wanted to try to lift the lid on some of the new features of Windows 11 and also think about Windows 365 and who this product might be targeted towards.  Richard Hotchkin, CTO. Tailor Made Technologies  The Birth of Windows 11  With over 75%...

Written by Phil Roch

Read More

Tech Thoughts – AI

Tech Thoughts   Introduction  This is the latest in a series of Tailor Made Tech Thoughts, providing insight on tech matters that relate to SME’s. In these bulletins I look at some global trends and try to assess how these phenomena might impact on small and medium sized companies in the South of England. I’ve recently been thinking about AI and how it has impacted our lives to this point and where the next developments might take us.   Richard Hotchkin, CTO. Tailor Made Technologies  The Influence of AI as we move through the decade  Many years ago, I studied the development of Neural Networks at university. In those days the technology was really only just being...

Written by Phil Roch

Read More

Cyber-attack hits UK internet phone providers

Multiple voice over internet protocol (VoIP) providers have been hit by co-ordinated, professional cyber criminals. Industry body Comms Council UK have advised that many of their members had been targeted by DDoS (denial of service) attacks in recent weeks. DDoS attacks essentially attempt to overthrow websites by exponentially increasing the traffic on a website. If the hackers succeed, the website will go offline, making it inaccessible both internally and externally. In the past this method has been used as a form of political statement, but in these recent VoIP attacks, the hackers are ultimately aiming to extort the targeted companies....

Written by Phil Roch

Read More

Get a new phone system and £500 to treat your team!

Since Christmas is a time for giving we want to ensure you can make the most of the festive season with your team. So, this year we are offering £500 for you to spend on your employees with the purchase or upgrade of any phone system. To qualify for the deal your business needs to purchase a new telephone system, or upgrade an existing phone system with us. Our telephony systems include both on premises and cloud-based platforms, so there is a solution to suit every business requirement! Our Phone Systems Tailor Made empowers a flexible workforce by delivering cutting-edge...

Written by Phil Roch

Read More

The Tailor Made Tech Bulletin – November 2021

Introduction  Welcome to the first of many Tailor Made Tech Bulletins, providing insight on tech matters that relate to SME’s. In these bulletins I will aim to look at some global trends and then come up with some ideas of how these global factors might impact on the core Tailor Made customer base. I will aim to keep readers updated on some of the latest Microsoft developments, retirement dates to look out for and also look at other key vendors in the future and how their offerings might find relevance for readers.   Richard Hotchkin, CTO. Tailor Made Technologies    The Effect of Dominant Tech Giants Post Pandemic  Over recent months, the...

Written by Phil Roch

Read More

Scam of the week – APT35

Scam of the week – APT35 This week’s scam is run by a collective of cybercriminals called APT35. APT35 have been specifically targeting well known organisations from Government to Journalists and Education sectors. APT35 created fake websites for partners of their victim businesses and carried out the attacks by sending phishing emails to their targets. An example of the attacks they undertook included fake links to upcoming ‘Webinars’ their targets may have been interested in. As you’d imagine, the links then took viewers to the fake website they already had in place. The landing page included a registration form which...

Written by Phil Roch

Read More

Ransomware is a national security risk.

Since it’s #CyberAwarenessMonth we want to share all the latest cyber updates with you. Ransomware has been deemed the ‘most immediate danger to UK businesses’. Lindy Cameron, the chief executive of the UK's National Cyber Security Centre, issued her statement on the subject earlier this month. During the keynote speech, Cameron noted the multitude of cyber incidents over the past year, including attacks attributed to cyber criminals working on behalf of China. As well as attacks linked to China, there have been significant breaches linked to Russian intelligence, including the SolarWinds attack this year. Cameron also noted the urgency in...

Written by Phil Roch

Read More

The latest scam – The Verizon impersonation

Have you heard of the latest scam – The Verizon impersonation? In a recent scam, cybercriminals impersonated telecommunications provider, Verizon. While the real Verizon logo includes an asymmetrical ‘V’ hackers used symbols to imitate the logo. Using the fake logo, cybercriminals sent a phishing email that was masked as a Verizon voicemail. The email directed viewers to click the ‘Play’ button to listen to the voicemail. Once the button was clicked, viewers landed on a replica Verizon landing page. Before even getting the chance to listen to the voicemail, they were directed to log in to their Microsoft Office 365...

Written by Phil Roch

Read More

TMT’s Upcoming Cyber Security Seminars

Cyber security has never been more important. While it may seem extreme to be pre-empting cyber threats the risk is very real and the impacts are vast. Over 70% of business leaders in the SME market have claimed they are concerned about their business being impacted by cybercrime and over 65% of medium businesses have admitted to a breach in the past year. The protection of an organisation’s data is a complex, ever-changing and increasingly critical issue. Intellectual property and client data require the most robust levels of security from theft or attack, from both outside and inside the corporate...

Written by Phil Roch

Read More

Windows 11: Delivering better experiences in a hybrid world

Windows 11: Delivering better experiences in a hybrid world We’re in a new era of working styles and organisations need technology that empowers everyone to stay productive, wherever they are working. Windows 11 is now available! Having launched on Tuesday 5th October, Windows 11 is a free upgrade eligible to Windows 10 PCs and PCs that come pre-loaded with Windows 10. It’s powerful for employees, consistent for IT teams, secure for everyone, and created specifically with hybrid working in mind. It’s also built on the familiar Windows foundation, making it an effortless transition for employees who are used to their Windows...

Written by Phil Roch

Read More

We have been named Mimecast’s ‘Technical Excellence Partner of the Year’!

We have been named Mimecast's ‘Technical Excellence Partner of the Year’! We have been recognised as the winner for this category as Tailor Made are the Mimecast Partner who completed the most technical certifications during the year. Our Chief Operational Officer, Kevin James, has made a comment on this award "I am extremely pleased to see the large investment made by Tailor Made and Mimecast in training and developing our engineers continues to pay off. Working closely with Mimecast has enabled Tailor Made to deliver a volume of Mimecast solutions to our client base. Our customers tell us Security is massively important to them...

Written by Phil Roch

Read More

Tailor Made Rebrands and Launched New Cyber Security Packages

The re-naming is backed by the launch of a cyber-security service aimed at SMEs and a strong commitment to upskill staff. Tailor Made Technologies’ sales director Tom Houston outlines key changes that set the well-established business on a new course. As the world moves on from the coronavirus pandemic, Tailor Made Technologies is keeping one step ahead for its customers. “The new post-pandemic world, with increased remote and flexible working, is exposing unprepared SMEs to rapidly evolving risks. Cyber criminals and hackers are rubbing their hands, looking for weaknesses to exploit.” For many SMEs, the type of cyber security services...

Written by Phil Roch

Read More

Key Account Director appointed at Tailor Made Technologies

We are pleased to announce the appointment of Sam McCarthy as our Key Account Director. Sam has over 15 years’ experience working within the IT & Communications industry and has worked for the Tailor Made group for 7 years, previously in Account Manager and, most recently, Sales Manager role. Sam brings significant experience to the management team and board of directors at TMT. Speaking on behalf of the Board, CEO Darren Scott-Healey said; “We are proud to promote Sam to our board of directors. He has a fantastic track record in IT and communications, as well as having built strong...

Written by Phil Roch

Read More

Leading South Coast IT & Communications MSP, Taylor Made, Announce Launch of New Brand Identity

Formed by the 2018 merger of two of the most established managed service providers in Southern England, Taylor Made Computer Solutions today announced it is rebranding with immediate effect to “Tailor Made Technologies” (“TMT”) In 2018 Peach Technologies (Peach) and Taylor Made Computer Solutions (TMCS) merged to create of the South’s largest and most highly acclaimed Managed Service providers, with over 180 skilled employees dedicated to providing a one stop shop service for IT and communications specifically for small and mid-sized enterprises. Operating from its state-of-the-art facility at Whiteley since 2018 the group has grown significantly and now provides services...

Written by Phil Roch

Read More

How SD-WAN Can Boost Your Business Performance

Software Defined Network (SDN) prioritises automation, enabling faster service delivery and improved in-life management. Software-Defined Wide Area Network (SD-WAN) solutions are built upon these foundations, providing even greater visibility and control – all the way to individual users and applications. This article will explore how can SD-WAN solutions can benefit a business and what SD-WAN enables businesses to achieve. So, what is SD-WAN? SD-WAN is an acronym for a Software Defined Wide Area Network. SD-WAN combines MPLS, broadband, and other legacy networking interfaces, as well as wireless 4G/LTE, to connect enterprise sites around the country and give complete visibility and...

Written by Phil Roch

Read More

How To Create A Secure And Productive Remote Workforce

Before this year, many businesses may have never considered home working solutions and the implications of their workforce operating remotely. With a huge proportion of workers now set up on their kitchen table, or working from their home office, it has never been more important to keep your ‘work’ environment secure. Not only is there the sudden change in environment to consider, but with the switch to remote working came a significant increase in cyber-attacks during lockdown. Keeping your home workers secure is not just important for productivity, but also for your business security. In this blog, we will focus...

Written by Phil Roch

Read More

Empower Your Remote Workforce

Following the latest Government guidelines, most businesses will be encouraging their employees to work from home. Supplying your team with a laptop simply is not enough anymore. Therefore, businesses are having to become smarter to remote working in order to support the team. In this article, we will explore how you can empower your remote workforce.   Many businesses have had to quickly adapt to the new way of working over the last 6 months, with many deciding to make it a permanent fixture within their business. However, this presents a series of problems; an example of which is ‘how...

Written by Phil Roch

Read More

Should We Encourage BYOD?

Many organisations allow employees to bring their own devices to the office or use personal tech when working remotely (often referred to as BYOD). With flexible working now being widely adopted for the long-term, now is a great time to consider why your employees may be using their own devices, if they should be, and what steps you can take to keep your business data secure if you’re offering bring your own device. Staff may be using their own devices because it’s an easier option; it’s more convenient to utilise a home laptop or mobile than it is to lug...

Written by Phil Roch

Read More

EDR – End Point Protection for Cyber-Security

Cybersecurity threats are rising at an astonishing rate, with hackers now attacking, on average, every 39 seconds – that is 2,244 times a day! With security threats coming in the form of malicious email attachments, internal data breaches, spear-phishing and malware delivered by email, you need to ensure your cybersecurity is going to keep your business safe, so how is EDR different from Antivirus? While certain sectors have been under more pressure from cyber-attacks lately, including education and healthcare, cybersecurity shouldn’t be specific to a specific group – all businesses should be cautious and protected. In this post, we will...

Written by Phil Roch

Read More

The Growth of Healthcare IT

It has been predicted that Healthcare IT will grow by up to 10% in the next 6 months, with the global market forecasted to be worth over £312 billion by 2024. This vast growth in the sector is a result of new legislations, improved IT solutions available, the protection of sensitive data and the increasing pressure to reduce costs while improving service quality. This growth should offer upgraded data security, enhanced services and improved devices.   Why is Healthcare IT changing? Healthcare services cover a vast array of amenities, including (but not limited to) medicine, medical or surgical treatment, nursing,...

Written by Phil Roch

Read More

What Is the Real Cost of a Cyber Breach?

Cyber breaches are, unfortunately, becoming more and more frequent. We hear about them on the news but never think that something like that will happen to us. Have you ever thought about how much a cyber breach could cost your business? If you hold data on your customers/clients, it won’t take much for a hacker to get hold of this if your IT systems aren’t secure. In this blog, we’ll explain the damage a cyber breach could cause to your business, what the real cost of a cyber breach is, and how to ensure you are best placed to avoid...

Written by Phil Roch

Read More

What Happens When the Cloud Goes Down?

Most of us rely on the cloud on a daily basis. From our emails to our photo storage, from our auto-fill details to music – the cloud is everywhere. Public cloud environments are generally what individuals use, as well as a vast majority of businesses.   Most Public Cloud leaders will guarantee at least 99% uptime on their services, with 24/7 access to your data. But what happens when that percentage of downtime creeps up? Did you know a 99% uptime SLA means your applications can be down for 3 days and 15hours a year? That’s almost 15 minutes per...

Written by Phil Roch

Read More

Cyber-Attacks Have Risen By 30% In 2020

What Can You Do to Keep Your Business Safe? During 2020, there has been a considerable amount of reporting on the increase in cyber-crime. Some specialists believe that the current pandemic, the rise in home-working, and the lack of security may have created the perfect ground for hackers. New research shows that cyber-attacks on UK businesses have shockingly increased by nearly a third in the first few months of the year, compared to 2019.   Most of these business attacks were breaching databases and file-sharing systems, with companies being attacked, on average, more than once a minute. This is a...

Written by Phil Roch

Read More

We Welcome Three Industry Specialists to the Tailor Made Team

As a Multi-award-winning MSP, and one of Souths largest IT companies, we are proud to announce three new hires as part of our ongoing program to improve the products and services that we deliver to our customers, and the level of service that we can provide. Reaffirming our commitment to our employees as an Investor in People and to our customers as a leading MSP. We have seen continued success with our remote working and cybersecurity offering’s, before and during COVID-19. We attribute the success to our innovative approach in empowering businesses to normalise their operations, as well as continue...

Written by Phil Roch

Read More

How to Effectively Implement Home Working For Your Business

Remote working has become increasingly popular in recent years but in the current climate, this could be the first-time that remote working has been introduced to your workplace. Working remotely is an entirely new way of working, which may very well stay with us after the current pandemic. While it is fairly easy to set up home working in your workplace, there are certain obstacles that you may need to overcome. Primarily, how can you enable and encourage your team to continue working (and continue working productively) when they are not in the office? We hope this information will give...

Written by Phil Roch

Read More

A Message from Our Chief Operations Officer

“I would like to take this opportunity to introduce myself to you. My name is Kevin James and I have recently joined Tailor Made/Peach Technologies as Chief Operations Officer. I am currently making my way around our customer base and I am interested to hear feedback and advice from many of you.   “I have contacted many customers recently and in the forefront of their minds is the dreaded Coronavirus and how prepared we are in the event that the worst case happens. Today, we are running business as usual but like many of you we remain vigilant. We are...

Written by Phil Roch

Read More

Getting Your It Ready for A Second Lockdown

With the UK going into a second lockdown this week, are you confident in your businesses IT and its ability to ensure your employees can work from home seamlessly? In this article, we will explain how to ensure your home working arrangements are as robust as possible to ensure a smooth ride through the next few weeks. Homeworking is something we have all had to adopt in some way or another throughout 2020, and our IT and Telecoms have been more critical to businesses than ever before. With Homeworking for many organisations becoming more certain into the future, IT Security...

Written by Phil Roch

Read More

How Can You Run A Business from The Cloud?

Working from within a cloud environment gives your organisation clear benefits, irrespective of your industry, sector, size, or location. It is essential to understand the benefits of the cloud and how harnessing cloud infrastructure will empower your organisation to achieve security, scalability, and redundancy for if anything was to go wrong. The first step when looking at whether your organisation can operate effectively from the cloud is first to understand what it is. ‘The Cloud’ is a series of hyper-redundant servers that are accessed over the internet. The software and databases that run on these servers are what you use...

Written by Phil Roch

Read More

Don’t Let A Cyber Breach Ruin Your Christmas

When buying presents for your loved ones at Christmas, would you leave them on your doorstep for everyone to see or take? You should apply the same caution to your network, don’t leave your data open for cyber criminals to access. Hackers attack every 39 seconds, on average 2,244 times a day. In 2019 the average time it took to identify a security breach was 206 days! It has become more important than ever to ensure your business is cyber secure, especially with more and more businesses implementing home working as a permanent fixture. Unfortunately, cyber criminals attack any business...

Written by Phil Roch

Read More

Tailor Made’s 2020 Review

2020 is nearly over, so we wanted to review the year we’ve had at Peach and Tailor Made. While we have faced difficulties, like most other businesses, we have plenty to celebrate. We cannot wait to see what 2021 brings for us! March: Kevin James was appointed as our Chief Operations Officer. Kevin started before COVID-19 began and was able to implement fantastic guidelines for our company, and for the companies we work alongside. Kevin has helped our business thrive by introducing new systems within the company, switching our teams to improve effectiveness, and recruiting some brilliant new members of...

Written by Phil Roch

Read More

Tailor Made’s Award Recognition

Despite the difficult year we faced, 2020 allowed us to continue developing our skills and devoting more time and resources to our customers. We are excited that this hard work has been recognised as we were labelled a 501 MSP of the year and have been shortlisted for the Comms Business Awards! Channel Futures MSP 501 A few months ago, we were also recognised as one of the top 501 Managed Service Providers in the world, by Channel Futures. Every year the MSP 501 recognises the biggest and most successful MSPs from around the world, and we were thrilled to...

Written by Phil Roch

Read More

Building A Sustainable Workforce with Cloud Solutions

Remote working is the ‘new norm’ and with most businesses having quick-fix solutions in place, now is a great time to review your remote solutions. One of the fastest growing IT solutions is cloud infrastructure. Why? Because it is easy to implement, offers flexibility and resolves communication issues for remote workers. A lot of people may just consider cloud environments to be cloud storage, but this is not the case! There are a range of cloud solutions that enable businesses to build a tailored infrastructure, almost entirely cloud based. From Telephony, to cloud hosting, there are solutions for all businesses....

Written by Phil Roch

Read More

How Password Security Can Protect Against Cyber-Attacks

One of the most under-rated security measures in any business is password protection. Why? Because we underestimate the value of secure passwords and rational password policies. With small, and simple, changes to password protection, you can defend your systems against cyber criminals and save yourself a lot of trouble. Brute Force Attacks Studies have shown that around 11% of people are using ‘1234’ as their passwords, and on top of that, more than 6% of people use ‘1111’. Based upon this research, over 15% of your employees probably have one of those two passwords. To make matters worse, one of...

Written by Phil Roch

Read More

Big Energy Saving Week

Big Energy Saving Week has got us thinking about how technology can have a positive impact on our carbon footprint and energy efficiency. 📱 Working remotely offers huge advantages. Technology now allows us the option to work from almost anywhere, which reduces travel time. You can access applications that bypass the requirement for desk phones, VPN’s that allow access to the company network and collaboration tools that grant easy communication. ☁️ Cloud storage is a great way to securely store data, and not only that, but it has also been proven to be more environmentally friendly. A lot of companies opt for...

Written by Phil Roch

Read More