The Macnamara Blog

Macnamara blog

You have a new Fax!

When was the last time you received a fax? Possibly never. But, it might surprise some of you to know that millions of faxes get sent every day. In Germany, Japan and the US especially, they are alive and well, if not so much here in the UK. But how are they used in Phishing?

Read More »
Macnamara blog

Information Security

You can’t have IT without Security!

There, we said it, but what does that mean and perhaps more importantly, what does it mean for our customers?

Read More »
Best practices

To Save or to Auto Save?

Save as you go. If ever there was a golden rule of working with computers, this is it. Anyone who has ever worked on a document before losing their progress to an application crash or power cut knows only too well the dangers of not saving your work. So the introduction of Auto Save in Office seems to be, on the face of it, an absolute gem. But how does it work and what if you need to turn it off?

Read More »
Macnamara blog

Is The MSP (Managed Services Provider) Model Broken?

The evolution of the MSP started in the 1990s with the emergence of application service providers (ASPs) who helped pave the way for remote support for IT infrastructure. From the initial focus of remote monitoring and management of servers and networks, the scope of an MSP’s services expanded to include mobile device management, managed security, remote firewall administration and security-as-a-service, and managed print services.

Read More »
Cloud Services

Is Cloud-based Information Technology holding back progress for Architects?

That sounds a bit counter-intuitive, doesn’t it? There have already been great strides made by architects, engineers, and other related construction professionals to adopt cloud-based software such as Autodesk BIM360. Whilst these tools bring huge benefits, it still seems that it’s the domain of large practices and corporates. Why is that?

Read More »
Macnamara blog

Credit Card Fraud: Missed Delivery

Continuing our expose on Phishing, let’s take a look at this real example of a common scam where you’re asked to enter bank card details to re-schedule a missed delivery.

Read More »
Best practices

Phishing – How Does It Work?

Everyone gets phishing emails. Unfortunately they’re everywhere. Most get filtered through to your junk folder or caught before they are even delivered, but some still get through. But what they are and how they work isn’t always clear. Here we’ll try to de-mystify an all too common and potentially dangerous nuisance.

Read More »
Cloud Services

What is a Domain?

Domains are everywhere and they’re a vital part of the internet, not to mention your online company identity. A key part of our service is Domain Management so, by and large, if you’re a client of ours you don’t need to worry too much about what it is or what it does. But having some background on what they are and how they work is always useful.

Read More »
Macnamara blog

What is the difference between HTTP and HTTPS?

You may have noticed when browsing online that some website addresses start with https:// whilst others start with http://. But have you ever wondered what that means in practice?

In short, the difference is quite simple: one is secure (https) and the other is not (http).

Read More »
Scroll to Top