This is the third blog in our series about malicious emails. You can read the first two blogs, How to identify malicious emails and Is the mail really malicious by clicking on the links. What to do with a suspected malicious email The answer to this is quite simple: delete the email. You can ignore…
IT and Cloud Strategy
Starting with your business goals and challenges, we will work with you and design an IT strategy aligned with achieving your goals.
We recommend a strategy workshop:
- Pre-Workshop – collating current technical situation
- Workshop – Engaging with the business to understand your requirements
- Document – Writing up and providing recommendations
Our workshops are run by a senior IT leader with broad technology and business experience. The workshop allows you to focus on getting more out of technology to support your business.
Networking & Security
Use our skilled Network Engineers to design and implement advanced networking solutions for your business. Our goal is to improve your security position, network performance and resilience.
- Security & vulnerability assessments
- WAN Design and optimisation
- Network problem diagnosis
- Fortinet product and licensing advice
- Cloud network design and implementation
- Multi-path network design and implementation
- Disaster Recovery design and management
- Mail protection
Get real help with your networking and security requirement
If you have a substantial license spend with Microsoft, our expertise can give you an independent view as to how you can optimise your current spend.
This applies to Open Licensing, Azure, AWS, and Office 365.
We have tools which will help extract your current usage and identify waste and areas for consolidation.
We have our very own Office 365 license optimiser technology that checks daily for any unused Office 365 subscriptions and terminates them so you aren’t paying for licenses no longer needed by your organisation.
Lucidity by numbers
Related Blog Items
Following on from yesterdays blog, How to identify malicious emails, today we will look at whether the email is actually malicious and some techniques scammers use to make it seem legitimate. Is the mail really malicious? Please note that you need to weigh all the red flags in yesterday’s blog if you want to rule…
We all get our share of spam, some more than others. But how do we differentiate between simple commercial spam and the types of emails that are sent with malicious intent. The unsolicited commercial spam email is generally easy to recognise, report, and discard, but what about more dangerous types of spam? How can you…
Ben Williams, one of the stars of the Lucidity Service Desk, was announced as a winner of the inaugural 30 Under 30 Awards by Reseller News. He was one of the winners of the Technical Category. The requirements for this category were as follows: This award honours individuals who possess superior technical expertise and innovation…
Lucidity is pleased to announce the first range of updates for the Lucidity 365 product. These changes are going to be implemented on Wednesday night this week and will apply to all new and existing Lucidity 365 tenants. Announcement Centre The new Lucidity 365 Announcement Centre will allow you to create an announcement (including text,…
Recently we have been talking to more and more of our customers around the integrity of their data within cloud services, most notably Microsoft Office 365 but the concepts discussed here are also transferable to other cloud services. Office 365 is ubiquitous within business and Lucidity are constantly migrating customers and their data into the…