Useful Downloads

Specialist Services

Consultancy

Route planner and guide to our approach

Cyberwise

IT Support 365’s Cyberwise is a consultancy based solution covering a wide range of digital security issues.

Internet Usage Monitoring Datasheet

IT Support 365’s Internet Usage Monitoring Service pinpoints precisely which systems, and even which computers, are transferring data through your broadband service, at any point in time. It allows you to track all Internet activities back to the point of origin, enabling you to address the problems at source.

Mobile Device Management Datasheet

IT Support 365’s Mobile Device Management service minimises the risks arising from loss, theft or misuse of mobile devices. It tells you where they are and what they’re being used for at all times, allowing you to remain in control of all the mobile devices on your network.

Voip Broadband Telephone Datasheet

IT Support 365’s VoIP service can help your team work more effectively through improved digital connectivity. Your VoIP system can share data more efficiently, by communicating directly with email and other digital systems. New plug and play handsets can be added and managed easily, and from a single location.

Case studies

AFL Telecommunications

Removing the pain with outsourced IT services

Input Joinery

Disaster recovery that’s worth its weight in gold

KMCO Group

Staying secure with mobile device management

Mustoe Shorter Solicitors & Advocates

Spending to save. Legal firm upgrades from Windows XP.

News Bites and Insights

Break free of traditional telephone technology

The internet has revolutionised how we communicate with one another. You can set up, in an instant, a video call with a client on the other side of town or the other side of the world. You can launch a live broadcast from almost anywhere, using just a smartphone.

Defend your business against cybercrime

Cybercrime is now one of the biggest threats to your business. Over 5.6 million fraud and other computer misuse cases were reported in the year to September 2016. And the police admit that many cybercrimes go unreported.

How to protect your business data from children and hackers

It can take a while to build a strong business or organisation. But all that hard work can be threatened by just one click or tap by a child.

How to stay safe in your mobile office

Ten years ago, your staff would never have considered taking their office computer home with them at night.

Internet Usage Monitoring

Because maintaining a fast, effective web connection is so important to our customers, we have introduced an internet monitoring service and we’re offering our customers a two-week free trial.

Keeping your children safe online

The summer holidays are here! Smartphones, games consoles, tablets and desktop computers are probably going to feature quite heavily in your children’s holiday fun.

Protect your business against cybercrime

Are you worried that cybercriminals may be targeting your business?

Ransomware - if in doubt, don't click

More and more companies are falling victim to ransomware attacks.  Ransomware, malicious code that locks you out of your own business systems denying access to valuable, critical data, is a very real problem right now. Even without paying the ransom itself, the cost to businesses affected by a ransomware attack can run into thousands of pounds.

Uninterruptible Power Supply (UPS)

Keeping the Lights on When the Power Goes Off

General Guides

Cloud Computing Guide

Has your business booked its space on the cloud?

Cyber Security Guide

Ensuring your business is protected.

Cyber Security Tips

Staff handout on combating cyber crime to stay safe on computers and mobile phones.

Disaster Recovery Planning

Are you prepared should the unthinkable happen?

Effective Perimeter Security

It's impossible to create an IT network that's 100% secure but it's relatively easy to significantly increase security by implementing the right tools and keeping them up to date.

Endpoint security delivering cyber protection in depth

Adopt a layered approach to digital security and make it very difficult for nasty-ware to do any damage. Security layers include endpoint security – a set of software tools that provide active threat protection.

Outsourcing Guide

Best practice guide for outsourcing - gain without pain

Server Room Management

Is your server room a disaster waiting to happen?  Organisations are continually being reminded of the need for disaster recovery planning.