The Macnamara Blog

Email Signature
Best practices

Why Use Managed Email Signatures?

While email signatures are not (let’s face it) the most glamourous aspect of IT, they are however often overlooked and under-appreciated. Not only can they be great for branding, they can even be used as an important element of your company security. There are also some regulatory reasons to have a signature on company emails too. ‘How can my email signature contribute to my security’ you ask? Good question!

Read More »
Windows 11
How-To

How To Personalise Windows 11

Windows 11 has been out for a while and it’s a great update (in our opinion) to Windows 10. But as with any operating system, getting the most out of it requires a little bit of effort to make it work for you. This could be as simple as changing the colour scheme to make it more pleasing on your eyes, or going further by customising the start menu or Explorer to put the things you use most within a few clicks.

Read More »
Outlook
How-To

How To Change Outlook Settings: View Settings

Whether you want to sort emails by date, categorize them, or filter them by sender, changing your view settings can enhance your productivity. With just a few simple steps, you can easily configure your view settings in Outlook to optimize your email workflow and stay organised.

Read More »
Browsers
Browsers

How to Remove Saved Passwords From Web Browsers

Web browsers make it convenient to save passwords for easier online access. However, there may be times when you want to remove saved passwords for security or privacy reasons, or perhaps simply because they have expired. This guide will show you how to do that in three popular web browsers: Microsoft Edge, Google Chrome, and Mozilla Firefox. By following these steps, you can keep your sensitive information secure and up to date.

Read More »
Cyber Criminal
Macnamara blog

Could You Have Been Breached And Not Even Know It?

If your account is breached, how would you know? A clever cybercriminal, on gaining access to an account, would not necessarily take immediate action. They may linger for some time, taking advantage of their access to explore what you have access to, examine your data, and read your email transactions, waiting for the moment to pounce. In this article by one of our security partners, we dispel some myths and examine some scary truths about how malicious actors take advantage of access.

Read More »
Best Practice
Best practices

How do you know if your IT company is doing the right things for your business?

Reviewing your IT Support is something that all businesses, large and small, should do periodically. IT is an ever evolving environment and the rapid pace of change presents new opportunities as well as threats. Yet, IT Support is a very different thing from IT Security. At Macnamara, we’re clear on the distinction. We do both, but they are NOT the same thing. In this great article by one of our security partners, we highlight some of the things you should consider when reviewing your service or choosing a new one.

Read More »
Outlook
How-To

How To Make Outlook Your Default Mail Application

Outlook is a popular email client developed by Microsoft, known for its robust features and user-friendly interface. By setting Outlook as your default mail application, you can enjoy a seamless email experience and easily manage your emails, contacts, and calendar events.

Read More »
Thumb Print Key
Best practices

Biometrics: Face The Future Of Digital Security

With 4 in 10 small businesses and a quarter of charities reporting cyber security breaches in the last 12 months * it’s more important to protect your personal and company data than ever before. With the increasing rise in cyber-attacks and data breaches, relying on a password alone can leave your computers, mobile devices, and online accounts in a vulnerable state. This is where passwordless sign-in can save the day.

Read More »
ChatGPT CE
Cloud Services

What Does ChatGPT Know About Cyber Essentials?

A day doesn’t go by when AI, and ChatGPT in particular, are not in the news. The Large Language Model (LLM) has absorbed every word on the internet up to the year 2021 and as a result it’s able to answer all manner of questions as well as write content for you based on the simplest of queries. It even threatens the once dominant status of Google as THE go to source of information. Curious, I asked it why Cyber Essentials is good for small business. Here’s what it said.

Read More »
recycle bin
How-To

How To Recover Files From The SharePoint Recycle Bin

If you accidentally delete files from SharePoint or OneDrive, it’s not immediately obvious where you would go to recover them, especially if you are used to accessing them as synced files on your computer, as they do not get sent to the normal recycle bin. Here, we’ll quickly show you how to you can easily recover them.

Read More »
OneDrive
Microsoft 365 Apps

What Do The OneDrive Sync Icons Mean?

The OneDrive app is a great tool to sync your files from OneDrive and SharePoint, but it can occasionally run into problems. Luckily, it’s very good at telling you if you know what to look for! Here, we’ll look at the most commonly seen icons and what they mean.

Read More »
Word Long File Path
Best practices

Why Is The File Path Length Important?

The file path length is the total number of characters in the file path. This includes spaces and backslashes. When working with files and folders, it is important to consider the file path length. The Windows operating system has a maximum file path length of 260 characters, but this limit is often reduced to 255 characters due to some reserved characters that take up extra space. In this blog, we’ll discuss why file path length is important and the potential issues that can arise if the length of the file path is too long. Additionally, what can be done if you are encountering an error caused by a long file path.

Read More »
Microsoft Authenticator
How-To

How To Transfer Microsoft Authenticator To A New Device

Great news! You have upgraded to a new phone or tablet and you’re keen to get set up and put your old device to bed. In the rush, one very important step that can be missed is transferring your 2FA accounts from the Microsoft Authenticator app to your new device. This guide will show you how to back up Microsoft Authenticator and restore it on to your new device.

Read More »
Previous Versions
How-To

How To Use Versions In Office

The modern Office apps come with all sorts of great features not previously available, and Versioning (alongside AutoSave) is one of those. If your files are saved in OneDrive or SharePoint it’s a great way of rolling back changes or comparing different iterations of your documents, spreadsheets or presentations.

Read More »
Unsecured Network
Best practices

Stay Safe Online: Why Public WiFi is a Risk You Can’t Ignore

Love using public WiFi? Beware! It can be dangerous. From hackers to identity theft, public WiFi can leave you vulnerable to all kinds of online threats. But do not worry, I have your back! In this blog, I will show you why public WiFi is so risky and give you some easy tips to stay safe. So, before you connect to that free WiFi hotspot, read on to find out how to protect yourself!

Read More »
Mobile Gold
How-To

How To Change Your 2FA Mobile Number In Your Microsoft 365 Account

We all know that 2FA is a great feature that helps to stop unauthorised people accessing your accounts. But it can be frustrating when you are locked out yourself. One common way that you can be locked out is if your mobile number changes but isn’t updated in your Microsoft account’s security information. Here are some useful steps to keep your security information up to date.

Read More »
3d rendering of computer monitors with stock market data on the display
Best practices

How to Configure Your Display and Monitor Settings

Are you tired of straining your eyes and feeling uncomfortable while working on your computer? In today’s digital age, we spend a significant amount of time in front of computer screens. Configuring your display monitor settings can greatly enhance your computing experience and improve your work comfort.

Read More »
Google Authenticator
How-To

How to transfer Google Authenticator to a new device

In the excitement of setting up a new device it can be easy to forget to copy across your 2FA accounts from Google Authenticator. Luckily there are some easy steps that will show you how to transfer this data across to the application on your new device.

Read More »
Scroll to Top