The Macnamara Blog

Password Manager
Best practices

LastPass Password Manager

Password management can be a bit of a nightmare. We’re always told to use complex passwords that are hard to guess, and to never re-use passwords. But, in practice this can be a challenge to remember them all! Most of us may have dozens if not hundreds of online services that require a username and password to access. How on Earth are we supposed to have a different complex password for them all and be expected to remember them without writing them down?

The good news is, you don’t have to remember them, or write them down!

Read More »
Fax machine
Macnamara blog

You have a new Fax!

When was the last time you received a fax? Possibly never. But, it might surprise some of you to know that millions of faxes get sent every day. In Germany, Japan and the US especially, they are alive and well, if not so much here in the UK. But how are they used in Phishing?

Read More »
CE IASME
Macnamara blog

Information Security

You can’t have IT without Security!

There, we said it, but what does that mean and perhaps more importantly, what does it mean for our customers?

Read More »
Disk
Best practices

To Save or to Auto Save?

Save as you go. If ever there was a golden rule of working with computers, this is it. Anyone who has ever worked on a document before losing their progress to an application crash or power cut knows only too well the dangers of not saving your work. So the introduction of Auto Save in Office seems to be, on the face of it, an absolute gem. But how does it work and what if you need to turn it off?

Read More »
Break/Fix
Macnamara blog

Is The MSP (Managed Services Provider) Model Broken?

The evolution of the MSP started in the 1990s with the emergence of application service providers (ASPs) who helped pave the way for remote support for IT infrastructure. From the initial focus of remote monitoring and management of servers and networks, the scope of an MSP’s services expanded to include mobile device management, managed security, remote firewall administration and security-as-a-service, and managed print services.

Read More »
3D plan drawing
Cloud Services

Is Cloud-based Information Technology holding back progress for Architects?

That sounds a bit counter-intuitive, doesn’t it? There have already been great strides made by architects, engineers, and other related construction professionals to adopt cloud-based software such as Autodesk BIM360. Whilst these tools bring huge benefits, it still seems that it’s the domain of large practices and corporates. Why is that?

Read More »
DPD
Macnamara blog

Credit Card Fraud: Missed Delivery

Continuing our expose on Phishing, let’s take a look at this real example of a common scam where you’re asked to enter bank card details to re-schedule a missed delivery.

Read More »
Phishing
Best practices

Phishing – How Does It Work?

Everyone gets phishing emails. Unfortunately they’re everywhere. Most get filtered through to your junk folder or caught before they are even delivered, but some still get through. But what they are and how they work isn’t always clear. Here we’ll try to de-mystify an all too common and potentially dangerous nuisance.

Read More »
Sign Post sm
Cloud Services

What is a Domain?

Domains are everywhere and they’re a vital part of the internet, not to mention your online company identity. A key part of our service is Domain Management so, by and large, if you’re a client of ours you don’t need to worry too much about what it is or what it does. But having some background on what they are and how they work is always useful.

Read More »
Macnamara blog

What is the difference between HTTP and HTTPS?

You may have noticed when browsing online that some website addresses start with https:// whilst others start with http://. But have you ever wondered what that means in practice?

In short, the difference is quite simple: one is secure (https) and the other is not (http).

Read More »
Best practices

Why you need a secure password

A strong password is essential for preventing others from gaining unauthorised access to your account or device. The stronger the password the more difficult it will be for a hacker to crack.

Read More »
Best practices

How to make a secure password

It can be hard to think of a password that you can remember when you need it, let alone multiple passwords and variations. What can make this is easier is using a methodology or naming convention for your passwords.

Read More »
Cloud Services

Teams or Zoom?

Both applications do the job of video conferencing well, and they’re not the only ones (e.g. Google Meet, Starleaf, Webex). But what’s the real difference, and when should you use one over the other?

Read More »
how to be calm and resilient during a work crisis
Office Impact

How To Stay Calm and Be Resilient During a Business Crisis

You can’t escape the C-word at the moment. 

And by C-word we’re not referring to “coronavirus” – nor “COVID-19” (though, you can’t escape those either).

The word of the day is crisis. Because you know what – COVID-19 is just one crisis. It’s surely not the first, and it won’t be the last.

So here’s one particularly valuable thing you can learn from this situation: how to stay calm and logical in the face of any crisis – big or small – that impacts your company.

Read More »
Scroll to Top