Reality Solutions

Latest IT News


You can now report suspicious emails to help shutdown scams

If you have received emails that you suspect are phishing attempts you can report them to the National Cyber Security Centre, part of GCHQ, using the email report@phishing.gov.uk With many of us working from home in the current crisis there is an ever-present threat from...

Read More

Is Zoom safe to use and what alternative software is out there?

In recent months video conferencing software has become one of the main ways we communicate. Leading the way has been Zoom, with its free plan and easy to use app. Meetings and social gatherings alike are taking place on the software or others like it....

Read More

Onsite vs. The Cloud

Storing data is serious business. The question is where is the best place to store your company’s data? Much of the internet now operates through The Cloud and many individuals will use some form of cloud storage whether they specifically asked for it or not....

Read More

Cyber Security Tools for Working Remotely

For a lot of employees, working from home means more than just video conferencing. There are a few other tools we think you should know about. Over the last few weeks you’ve probably seen some good lists of tools that improve working from home. Task...

Read More

Staying healthy and productive when working from home.

How are you finding your new working situation? So, you’re working from home. This is a pretty small ask compared to what some workers are facing during the current crisis, but it can be difficult. Our productivity and overall happiness when working from home is...

Read More

How do you protect against phishing attacks? Try Mimecast.

Mimecast – not to be confused with Minecraft – is a comprehensive cyber security solution which tackles email borne phishing attacks and much more. And just like the video game Minecraft, which is probably your son or daughter’s favourite piece of software, Mimecast will soon...

Read More

Patch It Chewie! Why you need Remote Access Management in your business.

An essential part of any business’s cybersecurity protocol has to be remote access management. You’re going to feel much safer knowing what’s going on under the hood and on the desktop of your employee’s PC’s. A remote management and monitoring platform provides you with a...

Read More

How to use Multi-Factor Authentication to make your business secure.

‘Please enter the OTP we’ve sent to your phone.’ ‘Where were you born?’ ‘We need to access your location.’ We’re assuming you’ve come across some of these requests when entering an account and perhaps greeted them with an eye roll. After all, how hard does...

Read More

Are Phishing Attacks still a threat?

  Are Phishing Attacks still a threat? With a third of all data breaches last year down to phishing - yes. This oddly named form of cyber-attack remains a big threat to users everywhere. For those who don’t know, phishing is where a user is...

Read More

You can’t afford not to have a firewall.

  Here’s why. We’re guessing you’ve probably heard of firewalls. In computers of course. We deal with people’s IT, not their fires after all. Thank God. Maybe you’ve had a notification about it pop up in the corner of your screen. In our day to...

Read More

Prepare for Windows Server 2008 end of life (EOL)

On January 14, 2020, support for Windows Server 2008 and 2008 R2 will end. That means the end of regular security updates. Don't let your infrastructure and applications go unprotected. We're here to help you migrate to current versions for greater security, performance and innovation.While...

Read More

How do you get the latest features of Microsoft Office 365?

  How do you get the latest features of Microsoft Office 365? Microsoft Office 365 is continuously being updated and enhanced with new functionality. As new Office 365 features become available, they are rolled out to all valid subscribers by default. However, the timing of...

Read More