Changing IT providers can always be a worrying time, however please don't be too concerned!
Employ your own IT Staff, or do you Outsource?
Regardless of whether you employ your own IT staff, or whether you have decided to outsource your IT needs to an external person or company, there are a few rules which I highly encourage you to follow to ensure you get the very..
As you may be aware, a story recently broke surrounding exploits found in all major processor brands.
“Meltdown” affects every processor manufactured by Intel since 1995 (with a couple of minor exceptions) and although there are no direct links, ARM has also introduced..
Tekkers IT Solutions are open throughout the Christmas and New Year period.
Tekkers IT Solutions have plans in place to replace the entire company fleet of vehicles with electric vehicles (EVs).
We are delighted to have been shortlisted as finalists for the Best Customer Service, and Most Impressive Growth awards at the National Entrepreneur Awards 2017.
A severe vulnerability has been discovered in the latest macOS operating system, High Sierra, discovered by twitter user Lemi Orhan Ergin, which lets anybody log in to your mac with no password.
We see so much helpful information on the internet on how to Recognise and Avoid Phishing Attacks, that sometimes it becomes a bit overwhelming.
This IT Support Costing and Pricing guide is designed to help you develop and initial budget, as well as plan for the costs associated with IT Support.