Christmas is fast approaching, and with it comes the hectic period of Christmas shopping. Many of us prefer to shop for gifts online to avoid long queues and stress in stores. But did you know that 70% of all new websites that appear in this period are fake websites? These websites are designed to scam you and steal your personal information and money. Here's how to avoid it!
For most people, everyday life at work is characterized by a fast pace, quick decisions and ever-increasing demands for collaboration - both internally and externally. To succeed in this, you need tools that keep up, but also simplify and improve the way you work. We think Microsoft 365 is just such a solution. It's not just a collection of familiar and beloved Office programs, but a complete digital platform designed to optimize productivity, collaboration and security. So, what makes Microsoft 365 a game changer for the modern workplace?
We know that it is easy to see IT as something isolated. A practical necessity that "just has to work", and we know how frustrating it is when IT doesn't work. But IT is not just technology; we feel that it is the heart of modern business operations in 2024. Good IT creates a chain reaction of positive effects that affect everything from efficiency and well-being to income and long-term operations. Let's take a closer look at how everything fits together.
In October 2025, Microsoft will officially end support for Windows 10. This means that the operating system, which has been a reliable workhorse for years, will soon reach its "end of life". After this date, no more security updates, bug fixes or new features will be released for Windows 10. But what does this mean for you? In short: It's time to plan your transition to Windows 11.
For us, there are few things more frightening than the threats that come with the technological developments we see now. In recent years, we have seen a dramatic increase in complex cyber-attacks that affect both individuals, companies and national infrastructures. In 2024, the threat picture is no less frightening, and it is important to understand what kind of digital dangers we face. Here are the most terrifying digital threats and what you can do to protect yourself. Have a great Halloween!
In an age where cyber threats are becoming more advanced and frequent, it is important to establish a solid security routine that can protect both yourself and your business from attack. Without an effective security plan, you are more vulnerable to hacking, phishing, data leaks and other threats that can damage your digital identity or business reputation. In this article, we look at how you can build a security routine step-by-step, to effectively secure your digital assets.
In today's digital landscape, it is more important than ever to protect yourself against hacking and other security threats. Even the most experienced surfers can be exposed to phishing, malicious software or the loss of sensitive data. Taking simple precautions in everyday life can make a big difference to your digital security. Here are nine basic but effective security practices to help you reduce your risk of becoming a victim of cyber attacks. Whether you're browsing the web or handling emails, these measures are essential to protecting both yourself and your digital assets.
Have you been hacked? We know how stressful it can be, so here's what you need to do. In this guide, we will look at concrete steps you can take to deal with such an emergency effectively. It can feel overwhelming to discover that you've been the victim of hacking, but we hope that by following these steps you can quickly minimize the damage and regain control of your accounts and devices.
We have never been more dependent on e-mails, messages and online services for communication at work than now. But with this dependence also comes an increased risk of digital threats, especially phishing attacks. Phishing is a type of scam where attackers attempt to trick you into revealing sensitive information such as passwords, bank details or other personal information by pretending to be a legitimate source. But how can you protect yourself from such threats? Here are 7 signs you need to look for!
When new IT systems or tools are to be introduced, you must take on the cleaning job first. Most companies collect huge amounts of information, but without a clear system to manage and clean up the data. Only when new systems are to be introduced is it discovered how little control one has over the data. Therefore, you must invest time in data cleaning. Let us explain how data cleanup can take processes from stressful and chaotic to agile and secure.
Why can't you just do things yourself? If you're the one who does most of the IT dubbing at work, we think you know the answer. Things take time. In this article, we will show you what we as an IT supplier do so that you can spend your time on more important things than fixing the printer, assisting with password changes and much more. Let's answer: what does an IT provider actually do, and why is it important to have one?
In 2024, IT plays a critical role in all industries. From being "nice to have" it has become a necessity for everyone. We cannot manage without either systems or IT products to do our job any longer. For many industries, the effective use of IT is not only a competitive advantage, but often a critical part of their infrastructure within the business. How can you make the most of the IT solutions you need? Let's look at it together.
When we go on holiday, it's not just the body that gets to relax - our digital defense mechanisms do too. The holidays are a time for relaxation and enjoyment, but it is also a time when we turn down all work mode and become more vulnerable to digital attacks. In an age where our dependence on technology has never been greater, it is important to be aware of the risks that come with being online, even when we are far from our home or work.
Your passwords are one of the most private things you use in your digital everyday life, but despite that, we create passwords that are far too easy to guess. Why do we make it so easy? And are the simple passwords really enough? We have collected everything you need to know about passwords and password hygiene in this article.
Since Microsoft released its new AI tool, Copilot, we have been actively testing it in our daily work. Both because we are curious about what AI can do in relation to our work tasks, but also to find the great benefits of using it. We have also looked for potential pitfalls. We have now tested it long enough to give you clear answers about what we use and will use Copilot in the future!
Securing your own data and your own activities in our digital everyday life as best as possible is a race. A race against the ever-changing methods that malicious actors use to break through our defences.
On 29 April 2024, Copilot for Microsoft 365 became available in Norwegian. It means that Copilot finally understands everything you write to it. Now Norwegians can get the most out of the AI tool. Are you considering using Copilot for Microsoft 365? Let's look at why it's worth it and what you should do before everyone in your organization adopts it.
The National Security Authority (NSM) is the Norwegian authority that works to protect national security and contribute to increasing the general understanding of cyber security among us Norwegians. They publish a range of security tips and advice to help people protect themselves from online threats. In this BLOG post, we will consider their advice and give you a simple explanation of each of them.
Handling the IT systems yourself is something many people consider, but is it worth it? We look at why managing infrastructure, internet and interaction on your own can be a solution. In the same vein, we look at why you shouldn't. Then you can assess for yourself what is worthwhile for you and your company.
For the artificial intelligence of Microsoft to play you well, your data must be of high quality. That means it needs to be cleaned. Do you have an overview and control over who has access to what internally? Or if all the data finds its way to the cloud? We can help you get started. Our skilled consultant and AI expert, Espen, can help you with that. Let's get ready for Copilot together!
Copilot will soon be rolled out to Norwegian companies. For the artificial intelligence to play you well, three things must be in place. Let's take a look at why you should prepare and how to make the most of it.
In the run-up to Christmas, we shared many tips about security with you on Linkedin. Here you will find all the tips gathered in one. We can't wait to get started on the coming year and we hope you will join us to learn more about IT, security and many other IT solutions. See you in 2024!
In a digital age where technology rules and information is worth its weight in gold, no one is safe. Every business, regardless of size, is a potential target for hackers who are constantly looking for vulnerabilities to exploit. For hackers, there are few things needed before the motivation is great enough to take you and your company next time. Could you be a potential attack target? We look at what motivates the hackers, and give you practical tips on how you can prevent an attack.
Sustainability is no longer just a trend, it is a necessity. Companies of all sizes have an important role when it comes to taking responsibility for the environment, society and the future. Here are seven sustainable measures you can implement in your company, conscious purchases you can make and other good habits that have worked well for us.
Increasing threats from cybercriminals and potential vulnerabilities in IT systems make security an important task for companies around Norway. But what is the most cost-effective approach? The answer is simple: it is cheaper to prevent security problems than to fix them after the damage has occurred. Let's look at why.
Many probably associate October with Halloween, but we have something completely different in mind right now. We think hackers and digital attacks are much scarier than most thrillers and horror films. Therefore, we come up with three tips for a less scary October. Good luck!
There is a high chance that you or someone you know has experienced phishing. Mistyping or providing information to people you believe to be someone you know can lead to serious consequences. Let's see how you can avoid falling for this scam method!
There are many terms that professionals often talk about, but that "ordinary" people have hardly ever heard of. Therefore, on the occasion of safety month, we have put together our own safety dictionary. We hope this can be of help when you wonder what is what in the security world.
Microsoft has just introduced a groundbreaking innovation – Microsoft Copilot. This can become your daily AI colleague when you solve the tasks in 365 Arbeidsplass. Let's look at how you can use it when it is rolled out for Norwegian companies.
In an increasingly digitized world, IT is often the heart of many companies' operations. From financial transactions to customer data and communications, the IT infrastructure is critical to day-to-day operations. But what happens if something goes wrong? This is where an IT contingency plan comes into play. This article will look at what a contingency plan for IT is and why Norwegian companies should have one. Can you check off all the points?
Regardless of whether you already run a business with tens of employees or are about to start one, you probably know how important it is to have reliable and good tools to drive you forward. We believe that investing in the right technology is the key to success. Let us show you some of the keys we recommend!
In today's busy working life, it is extra important that your PC is not chosen in a stressful moment. Then suddenly you are sitting there with equipment that neither handles the number of files you use, too many tabs on the internet at the same time or that crashes every time you open a heavy program. Choosing a PC is a bit like choosing a car. Size, speed, capacity and flexibility count. Let us therefore give you five reasons why Lenovo should come home with you.
Buying equipment can be a big time-stealer. Especially if you are unsure of what you need. Since costs are a large part of the company's finances, we will take you through what it costs to have an IT supplier at your back.
A lot happens in our digital society every day and we who work with IT every day see it very well. New digital attacks are happening, many are unsure of what to do and people are trying to find their own solutions. The only problem is that IT moves at enormous speed. Can you keep up on your own?
Our fear of things is often rooted in the fact that we don't quite know what's going on or how things work. Therefore, we intend to get to know the hackers extra well in this article. Who are they, why do they choose you as a victim and how should we work to prevent them from getting hold of you and your values?
Your mobile does much more than just make calls and send SMS. It also has your driver's license, the online bank and all your money, your work email and secure apps that give you an overview of your children, your grandmother's health and much more. That's why it's more important than ever that you keep it safe. Here are 7 tips on how.
Despite the fact that pilots went on strike and the chaotic conditions at airports all over Europe, it was actually summer last year too. Were you ready for it? Anyway, we hope you managed to read this post last year. If not, you can read it now. Here are some tips on how to create a carefree summer while you stretch your legs. Happy reading!
What do you need? Everyone is aware that something to write on, something to save on and some internet is the minimum requirement you can make. Now we will go a little more in depth. We will also challenge those of you who work in the same way as when you started.
We always recommend taking several measures when it comes to business security. The easiest way is to upgrade equipment you have already put into use. Almost everyone needs a network in one form or another, and have you considered that the network box can also play a role in security work?
Summer is just around the corner and we are certainly not alone in preparing for a few weeks' holiday. We still have some time left before holiday responses can be activated. Are you ready for a dose of safety before that?
Debt is possibly a bad word in some people's eyes, but the vast majority of people have it, in one form or another. Most people live well with it too. We know that interest rates go up and down. Every month we pay down what we can, and in the long run the debt is gone. Technical debt, on the other hand, is a little worse. Let us explain!
Today, we will show you some simple rules to remember for those of you who are going to use a new IT tool. That is easier said than done. Introducing people to something new can take several paths, and in a work context it can lead to everything from new enthusiasm to frustration and loss of motivation. That's why we want to show you our three rules to remember. We call them the F's.
Do you also receive an email where it says "Your digest email" in the subject field every week? We too. Now we are tired of deleting it every time. That's why we decided this week to take a look at how Microsoft Viva is actually used and why we get this email. We got ourselves a real eye-opener. It turns out that one email can help you to shake up bad work habits. Just look here👇
In IT, you don't have to reinvent the wheel at all. However, you must be open to adopting new solutions. You need to do this in order to be safer online, better equipped in the face of crises and to have employees who can tolerate changes in their digital habits. Here are 7 reasons why you will be a winner if you digitize your organization!
A habit is what your brain does on autopilot. We all have some bad habits. But what happens if your digital habits are bad? Could it be dangerous? We give you an answer to that in this week's article. At the same time, you will get several tips on how you can prevent your habits from opening security holes in the future.
Changes happen every single day in most businesses. Some changes are so small that they are easy to implement, while others require more effort and time. Much more. Have you thought about how to get your people ready for the bigger changes?
The EU Parliament has set the requirements, and now it's up to you to set the standard. We recommend doing it quickly. The goal is to secure European jobs as best as possible.
IT is complicated. Not too complicated that everyone can't do it, but complicated enough that you shouldn't let Jens down the hall be the IT manager without the right background. Let's do the IT stuff properly.
In January 2022, we predicted a total of five big things for the coming year. All the predictions concerned our own industry. Did we get any of them right? Let's take a look.
90% of successful attacks happen because we, humans, have pressed something we shouldn't. The number of digital attacks is exploding. That is why we want you to create a higher degree of security internally. Don't wait until it's too late. Learn more about how to get started.