Excellence IT Blog
12 FOLLOWERS
Excellence IT was founded twenty years ago by two experienced IT professionals: Andy Beer and Andy Green. From charities to manufacturing, professional services to construction companies, we can help any business use its technology to transform. Our Insights section combines explanations of important IT topics with hints and tips to help you work more efficiently and stay safe online.
Excellence IT Blog
2d ago
Protect Your Cardiff Business with IT Support
Cardiff, like any other region, faces distinct challenges when it comes to cyber security and IT Support. Despite the universal nature of cyber threats, Cardiff businesses are particularly vulnerable to specific dangers, including phishing attacks and malware. Recent analyses indicate an uptick in such incidents locally, underscoring the critical need for robust cyber security measures for your business.
Fundamental Cyber Security Measures
Network Security
It is crucial to maintain the security of your Wi-Fi network by ensuring that access i ..read more
Excellence IT Blog
4d ago
Annual Cyber Security training is often a box-ticking exercise. Yep, you know what we mean. Complacency can be a costly mistake. Yet, many companies are stuck in the outdated annual cyber security training routine, which no longer cuts it.
Why has this once-standard practice become ineffective, and what better alternatives are available to businesses keen to safeguard their operations?
The drawbacks of annual training are glaring: it fails to engage, can’t keep up with the fast pace at which cyber threats evolve, and wrongly assumes that a yearly refresher is enough to keep sta ..read more
Excellence IT Blog
3w ago
Phishing Email Scams
Phishing is when cybercriminals use misleading messages with dangerous links to trick people into downloading harmful software or visiting fake websites. While it started mainly with emails, this approach has now spread to texts, social networks, and phone calls. Phishing is the leading type of cybercrime, with about 3.4 billion spam emails sent daily.
Phishing emails aren’t a new scam; they’ve been ongoing for decades. However, the latest technologies have made creating clone brand emails easy. With criminals taking advantage of this, the younger generation is getti ..read more
Excellence IT Blog
3w ago
In the latest report released by Patchstack, a comprehensive analysis reveals a concerning uptick in vulnerabilities within WordPress platforms, particularly those categorised as high and critical. Cross-site scripting (XSS) vulnerabilities have surged, representing over half of all newly identified threats in the WordPress ecosystem.
21% of vulnerabilities are attributed to issues within the Freemius framework—a commonly used component across numerous WordPress plugins, affecting upwards of 7 million websites. This situation highlights the complex problems caused by weaknesses in the s ..read more
Excellence IT Blog
1M ago
Google Drive Vs OneDrive – Cloud Storage ComparisonGoogle Drive or OneDrive?
Microsoft OneDrive vs Google Drive, the two most popular cloud storage solutions, but which is better for business?
Cloud storage has become an integral part of our daily lives, allowing us to store and access our files anywhere. In this article, we compare OneDrive and Google Drive in terms of features, pricing, and overall performance to help you make an informed decision depending on an organisation’s requirements.
If you’re looking for a particular section of this article, use the links below:
What is OneD ..read more
Excellence IT Blog
1M ago
Managed IT services refer to outsourcing IT support and services to a specialised/external provider that proactively monitors, maintains, and manages an organisation’s technology infrastructure. This approach enables businesses to prioritise their core operations while delegating their IT needs to a team of experts.
Outsourcing IT support and cyber security has become increasingly popular over recent years, with Managed Service Providers offering various services and skills compared to in-house IT teams.
What does a Managed IT Service Provider do?
Managed IT services are a solution that allow ..read more
Excellence IT Blog
1M ago
Guide on how to edit your signature in Outlook [Working in 2024]
Are you unable to edit your signature in Outlook?
Microsoft released an Outlook update, addressing some security issues and risks.
The security update fixed and improved vulnerabilities in Microsoft Office. The main fix was stopping an issue that could allow remote code to open a dangerous office file. There is a full report on the file called ‘CVE-108-0791’ here.
Although this issue was fixed, another problem occurred. Outlook users required to switch between email signatures or wanted to add a new signature found the program w ..read more
Excellence IT Blog
1M ago
Add a Room List to your Outlook Calendar
How many times have you been to a training or conference room and found out it’s booked?
Well if you’re wondering how to add a room list to your Outlook calendar, we’ve created an easy step-by-step guide.
How to add a room list to Outlook Calendar:
Open Outlook Calendar
Look for the ‘+Add’ button on the top menu
In the drop down menu, click ‘From a room list’
In the pop up, select the room calendar you’d like to view
Double click the room and press ok
The calendar will appear on the right hand side of your screen
If you’re more of a visual learner ..read more
Excellence IT Blog
1M ago
5 Best and Funny Hacking Stories WorldwideBest Hacking Stores Worldwide
You’ve seen it in cinema blockbusters, a master hacker types at the speed of light and unlocks all the security in a blink of an eye. Is it completely unbelievable?
With our services auditing businesses through Cyber Essentials and Cyber Essentials Plus, we know how criminals can access company data. We’ve even detailed some of the most common methods, as well as the different types of malware there are.
If IT jargon isn’t your strong point, you can find a list of popular IT jargon.
However, we are always impressed by some ..read more
Excellence IT Blog
1M ago
Using the Emoji Keyboard on Windows PC
Emojis help us show our feelings in messages. But using them on a computer isn’t always easy. Our video and blog post will show you how to easily use emojis on your PC, making your messages fun and expressive.
8 highly useful Emoji shortcut keys:
or for a smiley face
or for a sad face
or for a wink
or for a big grin
:'( for crying
or for sticking out the tongue
(y) or (Y) for thumbs up
(n) or (N) for thumbs down
How to use the Windows Emoji Panel
To use emojis on your Windows PC quickly:
Press Windows key + . (period) or Windows key + ; (sem ..read more