The Macnamara Blog

copilot-logo
Information Management

Copilot for Microsoft 365

Copilot for Microsoft 365 is here and in general release. This post is a summary (not by Copilot, but by us!) of some introductory documentation from Microsoft Learn on what it is, how it works, and how you can incorporate it into your Microsoft 365 experience.

Read More »
AI Support 09
Macnamara blog

IT Support vs IT Security – Are You Getting The Service You Deserve?

Small businesses are just as vulnerable – if not more so – as larger organisations to cyberattacks, data breaches, and other IT-related issues (including simply poorly maintained equipment) that can compromise their operations, reputation, and profitability. They also need an occasional helping hand with some of the more everyday helpdesk issues that arise, be they problems, or simply helping to get new staff set up on the systems.

Read More »
copilot-logo
Macnamara blog

Copilot and AI in Windows 11

Over the last 2 years AI has taken the tech world by storm, and for good reason. With the release of AI models such as DALL-E and ChatGPT, we have seen what AI is truly capable of and this is just the beginning.
Microsoft is keen to utilise this breakthrough in technology and is introducing a seamless integration of popular AI features into Windows itself. No more creating accounts on various platforms, or even downloading large models manually and using funky command lines (looking at you Stable Diffusion), it will all be at your fingertips within Windows.

Read More »
Cyber Criminal
Macnamara blog

Could You Have Been Breached And Not Even Know It?

If your account is breached, how would you know? A clever cybercriminal, on gaining access to an account, would not necessarily take immediate action. They may linger for some time, taking advantage of their access to explore what you have access to, examine your data, and read your email transactions, waiting for the moment to pounce. In this article by one of our security partners, we dispel some myths and examine some scary truths about how malicious actors take advantage of access.

Read More »
Best Practice
Best practices

How do you know if your IT company is doing the right things for your business?

Reviewing your IT Support is something that all businesses, large and small, should do periodically. IT is an ever evolving environment and the rapid pace of change presents new opportunities as well as threats. Yet, IT Support is a very different thing from IT Security. At Macnamara, we’re clear on the distinction. We do both, but they are NOT the same thing. In this great article by one of our security partners, we highlight some of the things you should consider when reviewing your service or choosing a new one.

Read More »
ChatGPT CE
Cloud Services

What Does ChatGPT Know About Cyber Essentials?

A day doesn’t go by when AI, and ChatGPT in particular, are not in the news. The Large Language Model (LLM) has absorbed every word on the internet up to the year 2021 and as a result it’s able to answer all manner of questions as well as write content for you based on the simplest of queries. It even threatens the once dominant status of Google as THE go to source of information. Curious, I asked it why Cyber Essentials is good for small business. Here’s what it said.

Read More »
Celebrating 20 Years 2003 - 2023
Celebrating 20 Years 2003-2023

Celebrating 20 Years 2003 – 2023: A Look Back

2023 marks a milestone for Macnamara, at 20 years since the company was founded, way back in 2003, by Ciaran, with a view to bringing the world of enterprise IT to the SME market. In 20 years a lot has changed in technology, but that same commitment to outstanding service hasn’t. We take a look back at some of the history of the company and how we ended up where we are today.

Read More »
Master Of Your Domain
Macnamara News

Chapter 3: DNS and Domains

In this excerpt from Ciaran’s upcoming White Paper ‘The Mail Must Get Through’ on email deliverability, we examine one of the core underlying features of the internet, DNS and Domains.

Read More »
Fax machine
Macnamara blog

You have a new Fax!

When was the last time you received a fax? Possibly never. But, it might surprise some of you to know that millions of faxes get sent every day. In Germany, Japan and the US especially, they are alive and well, if not so much here in the UK. But how are they used in Phishing?

Read More »
CE IASME
Macnamara blog

Information Security

You can’t have IT without Security!

There, we said it, but what does that mean and perhaps more importantly, what does it mean for our customers?

Read More »
Break/Fix
Macnamara blog

Is The MSP (Managed Services Provider) Model Broken?

The evolution of the MSP started in the 1990s with the emergence of application service providers (ASPs) who helped pave the way for remote support for IT infrastructure. From the initial focus of remote monitoring and management of servers and networks, the scope of an MSP’s services expanded to include mobile device management, managed security, remote firewall administration and security-as-a-service, and managed print services.

Read More »
3D plan drawing
Cloud Services

Is Cloud-based Information Technology holding back progress for Architects?

That sounds a bit counter-intuitive, doesn’t it? There have already been great strides made by architects, engineers, and other related construction professionals to adopt cloud-based software such as Autodesk BIM360. Whilst these tools bring huge benefits, it still seems that it’s the domain of large practices and corporates. Why is that?

Read More »
Phishing
Best practices

Phishing – How Does It Work?

Everyone gets phishing emails. Unfortunately they’re everywhere. Most get filtered through to your junk folder or caught before they are even delivered, but some still get through. But what they are and how they work isn’t always clear. Here we’ll try to de-mystify an all too common and potentially dangerous nuisance.

Read More »
Sign Post sm
Cloud Services

What is a Domain?

Domains are everywhere and they’re a vital part of the internet, not to mention your online company identity. A key part of our service is Domain Management so, by and large, if you’re a client of ours you don’t need to worry too much about what it is or what it does. But having some background on what they are and how they work is always useful.

Read More »
Best practices

Why you need a secure password

A strong password is essential for preventing others from gaining unauthorised access to your account or device. The stronger the password the more difficult it will be for a hacker to crack.

Read More »
Best practices

How to make a secure password

It can be hard to think of a password that you can remember when you need it, let alone multiple passwords and variations. What can make this is easier is using a methodology or naming convention for your passwords.

Read More »
Scroll to Top