Microsoft Inspire - Roadmap 2020

Microsoft Inspire Summary 2019

A couple of weeks ago­­ Lucidity’s CEO, Paul O’Brien and I commenced our 15-hour journey to the Nevada Desert for Microsoft Inspire which was hosted in Las Vegas.  Both being first time attendees, Paul and I weren’t exactly sure what to expect, and I think I speak for both of us when I say that the…

Understanding Business Wi-Fi

Over the past few years, Wi-Fi technology has improved greatly, however it isn’t a case of one-size fits all. The requirements for a business in a large office space with continual traffic utilisation from many devices is very different to the Wi-Fi needed at home for casual internet access. What is an Access Point? An…

Cloud Cover – Under The Hood

This blog is a follow-on of sorts from the current information available about our product called ‘Cloud Cover’, before reading the below I would suggest visiting the following link to give you a bit more context : https://www.lucidity.co.nz/cloud-cover/ As part of our Cloud Cover product, Lucidity uses a couple of tools to ensure that machines…

Lucidity 365 – May 2019 Update

The May 2019 updates for Lucidity 365 will simplify the permission management, allowing admins the option to restrict users from customising in their workspace. Furthermore, there are new features which will make it easier to collaborate with your colleagues or others. New: Restrict users from editing the workspace It’s great when people can edit and…

DNS – Why it’s always the problem

Many issues that users and businesses face are often caused by DNS, as illustrated by one of my favourite troubleshooting tools on the internet  – https://isitdns.com/   Mail failures, websites not loading, or even an inability to get into your Managed Desktop, most of the time it’s typically DNS. What is DNS? DNS stands for Domain Name System…

Aging IT Hardware – when it’s time for an upgrade

Here at Lucidity we endeavour to provide our customers with the best service possible. If our customers start having issues with their Lucidity services we carry out several checks to help identify the root cause. The first series of checks is looking at the infrastructure which these services run on. Once these checks have been…

How to deal with malicious emails

This is the third blog in our series about malicious emails. You can read the first two blogs, How to identify malicious emails and Is the mail really malicious by clicking on the links. What to do with a suspected malicious email The answer to this is quite simple: delete the email. You can ignore…

Is the mail really malicious?

Following on from yesterdays blog, How to identify malicious emails, today we will look at whether the email is actually malicious and some techniques scammers use to make it seem legitimate. Is the mail really malicious? Please note that you need to weigh all the red flags in yesterday’s blog if you want to rule…

How to identify malicious emails

We all get our share of spam, some more than others. But how do we differentiate between simple commercial spam and the types of emails that are sent with malicious intent. The unsolicited commercial spam email is generally easy to recognise, report, and discard, but what about more dangerous types of spam? How can you…