Installing the Network and Security Remote Assist Agent

A guide on how to install our remote desktop software allowing us to access your computer remotely and fix any issues you might have.

Not yet rated

Getting Starting with Office 365 Applications Only

This article is designed to help to get you up and running with the applications only version of Office365, getting it installed and working.

Not yet rated

How to get started with your new basic email account

How to get sign in and change the temporary password of your new basic email

Not yet rated

Resetting my Office 365 Password

Quick how to guide for what to do when you receive your new password from us.

Email
Not yet rated

How do I set up my basic email account on my Apple Device

We share the instructions on how to set up your service with us on your Apple Devices

Email IMAP
Not yet rated

SEO Audit

SEO Audit for business

Not yet rated

How does our service help protect my business

Our service is designed to help both public and private sector organisations detect and mitigate cyber threats that leverage stolen email addresses and passwords.

Dark Web
Not yet rated

I see fake emails (False positives). Why is this important?

Fake email accounts are routinely created by employees as a “throw away” when wanting to gain access to a system or piece of data.

Dark Web
Not yet rated

The password identified does not meet our network criteria. Why should we care about this?

Employees often recycle passwords throughout their work and personal networks. If your internal requirement is to have a capital letter and special character, it’s common practice for employees to use a password they are familiar with, and add a capital letter and exclamation mark.

Dark Web
Not yet rated

What is the difference between a privileged user and standard user?

The Standard User does NOT have access to view passwords.

Dark Web
Not yet rated
  • Previous