10 May
Top 5 Phishing
Top 5 Phishing Subject Lines
Category: Blog, Care Home IT Support
05 May
Keeping focus of your people when implementing tech
Category: Blog, Care Home IT Support, Care Hom...
08 Mar
How vulnerable is your IT security? 
Category: Blog, Care Home IT Support
07 Jan
log4J vulnerability
Log4j Vulnerability – Your questions answered
Category: Blog, Care Home Technology
Log4j is popular with millions of computers running online services. The vulnerability poses a challenge for care homes as they find out which of their services use this component....
01 Nov
care home technology carer
Microsoft 365 For Care Homes
Category: Blog, Care Home Technology