- About Us
- Be IT Planet-Friendly with Our Free Sustainability IT Checklist
- Book a 15-minute call with Ben
- Change Request Form
- Contact Us
- Current Vacancies
- Cyber Security Webinar for Non-Profits
- Data Processing Addendum
- Form Confirmation – Caught in the Crosshairs
- Form Confirmation – Contact
- Form Confirmation – Environmental IT Audit
- Form Confirmation – Frustrated with your IT?
- Form Confirmation – IT Security Guide
- Form Confirmation – Maxed Out
- Form Confirmation – Outsource your IT?
- Form Confirmation – Risk Results Form
- Frustrated with your IT?
- GDPR Statement
- Get remote support from ITGUYS
- Home
- How We Do It
- HTML Website Sitemap for itguys.com
- ITGUY London Limited – Privacy Policy
- ITGUYS Newsletter – Thank You for Subscribing
- Legal Terms
- Managed IT Services for Non-Profits
- Managed IT Services London
- Microsoft 365 Licensing Explained
- Mission Statement
- Modern Slavery & Human Trafficking Policy
- Outsource Your IT, Grow 25% Faster.
- Privacy Policy
- Resources
- Results
- Risk Matrix Results
- Subscribe
- What’s in it for me?
- #1 Mistake Businesses Make With IT Security and How to Avoid It
- #1 Mistake Charities Make With IT Security and How to Avoid It
- 3 Steps to Make Your SME’s IT More Sustainable
- 5 Key Reasons to Outsource IT Support for Non-profit Organisations
- 5 Signs Your Business Should Consider Outsourcing IT
- 5 Signs Your Charity Should Consider Outsourcing IT
- 5 Steps To Improve Your Ransomware Resilience
- 6 Steps to Protect Your Endpoints
- 7 reasons why Cyber Essentials Certification is a game-changer for BCorps and purpose-driven SMEs
- Are my breached passwords for sale on the dark web?
- Are you looking for a new IT support company?
- Beyond the Price Tag: Your Tech’s Impact on Finite Resources and the Environment
- Calculate your Carbon Footprint
- Caught in the Crosshairs
- Cutting Carbon with IT: The Metrics That Matter
- Cybercrime: Your business’s 5-step plan to prepare and protect
- Do I need a cyber security risk assessment?
- Do I need to have cyber-insurance for my business?
- Do Macs get viruses?
- Embracing Sustainability in IT Hardware Procurement: A Guide for Small and Medium Businesses
- Environmental Concerns are Nothing New: Why I Bang the Drum
- EVERYTHING you need to know about password managers for your business
- Five steps a charity can take to ensure IT confidence
- How can I justify my cyber security budget?
- How do I keep my business data secure when my employees are using their own devices?
- How do I know if I am under attack from ransomware?
- How to choose your IT Managed Service Provider (MSP)
- How To Reduce Risk Whilst Running A Successful Business
- Improve profits with your IT partner’s Proactive Problem Prevention
- Is it safe to save my passwords in my browser?
- IT Security Checklist for Businesses to Enhance Cybersecurity
- IT Security Checklist To Ensure Your Charity Is Cyber Secure
- IT Security Guide
- IT Security: Have your cake and eat it
- ITGUYS: A Certified B Corporation™
- Kenny Wax Productions – Case Study
- Key considerations for developing an IT strategy for businesses
- Key considerations for developing an IT strategy for charities
- Maxed Out
- Microsoft 365: 10 Apps you didn’t know you had
- Password Security Checkup
- Phishing: Careful you don’t get reeled in
- Repair or replace?
- Should I pay a ransomware cyber-attack?
- Should my organisation have Managed IT Support instead of Pay-as-you-go?
- Six IT Policies every company should have
- SMBs, how to get started with a more sustainable approach to IT
- The Bridge Renewal Trust – Case Study
- The Environmental Impact and Efficiency of Powering Down Computers: Challenging the Time Loss Myth
- The ICO and your business
- The Institute of Measurement and Control (InstMC) – Case Study
- The IT Security Onion
- The Laptop and the Train!
- The Next 10 years: 8 tech trends you’ll need to be ready for
- The Power of an Environmental IT Audit
- The real cost of insider attacks and how to prevent them
- The Reality of a Cyber Breach for Charities
- The Reality of a Cyber Breach for Small Businesses
- The team in your organisation are your weakest cybersecurity risk
- Understanding Cyber Essentials and Its Significance for Small Businesses and Charities
- What are the security risks of my team using their own smartphones for work?
- What happens in a Strategic Review?
- What is 2FA and why should I have it?
- What is a Cyber Security Incident Response Plan?
- What is a good backup strategy for my business?
- What is a Managed Service Contract?
- What is a password manager and why do I need one?
- What is a Re-manufactured laptop and how is it different from a Refurbished one?
- What is a secure password, and how can I tell if it is easy to crack?
- What is an IT strategy and why do I need it?
- What Really Goes On Behind the Hack
- What security protection do I need for my creative business?
- Where should I store my personal data?
- Why do I need to back up my cloud data?
- Why every organisation should implement cyber security awareness training for their team.
- Why risk assessments help with your cyber security
- Why should my user account not have administrative privileges?
- Working From Home security checklist
- Would my business pass a data security challenge?
- Your 8 Point Digital Offboarding Checklist
- Your office is on fire! Do you have a Disaster Recovery Plan?