Skip to content
G5 Technologies

G5 Technologies

Your Business IT Partner

Menu

  • Home
  • Cyber Security
    • Microsoft 365 Security
    • External Network Security Assessment
  • IT Support
    • IT Support Aberdeen
    • Connectivity
    • Cloud Solutions
    • IT Security
    • Wi-Fi – G5Zone™
  • Blog
    • Newsletter Sign-up
    • Blog Archive
  • About Us
    • Testimonials
  • Contact
  • Resources
    • Business Owners Guide to Email Security
    • Cyber Hygiene
    • Educational Guides
    • Has my email address been compromised?
    • How to become a hacker
    • How To Videos
    • Password Strength Test
    • Recommended Technology Platform
    • Switching IT Providers
    • Tech Tuesday Videos
  • Remote Support

Author: G5 Technologies

What’s Changing in the Cybersecurity Insurance Market?

Free A Paper beside a Person Typing on a Laptop Stock Photo

Cybersecurity insurance is still a pretty new concept for many SMBs. It was initially introduced in the 1990s to provide coverage for large enterprises. It covered things like data processing errors and online media. Since that time, the policies for

G5 Technologies 31st January 20231st December 2022 Cybersecurity Read more

What Cybersecurity Attack Trends Should You Watch Out for in 2023?

Free photos of Cyber

The new year has just begun and it’s a time of renewal as we plan for the possibilities to come in 2023. It’s also a time when you need to plan for resiliency in the face of ever-present cyberattacks. Sixty-eight

G5 Technologies 25th January 20231st December 2022 Cybersecurity Read more

Don’t Set Yourself Up to Fail: Tips for Safer Home Security Setups

gold Apple iPhone smartphone held at the door

The global home security market has been growing by leaps and bounds. By 2026, experts expect the market to expand at a rate of 20.1%. This is on top of an expected increase of 21.6% from 2021 to 2022. From

G5 Technologies 20th January 20231st December 2022 Cybersecurity Read more

Align Your Team to Company Targets with Microsoft Viva Goals

white laptop computer on white table

You often hear the words “digital transformation” and “collaboration.” But what do they actually mean? What do they mean for the day-to-day of running your business? Collaboration can’t happen without shared goals. When departments are siloed and unconnected, priorities can

G5 Technologies 15th January 20231st December 2022 Microsoft, Productivity Read more

7 VoIP Setup Tips for a More Productive Office

Free photos of Voicemail

The global pandemic put a big emphasis on the need to run a business from anywhere. Enabling employees to work remotely requires cloud solutions. This includes collaborative platforms like Google Workspace and Microsoft 365. VoIP (Voice over Internet Protocol) phone

G5 Technologies 10th January 20231st December 2022 IT Management, Productivity Read more

5 Ways to Balance User Productivity with Solid Authentication Protocols

Free photos of Cyber security

One constant struggle in offices is the balance between productivity and security. If you give users too much freedom in your network, risk increases. But add too many security gates, and productivity can dwindle. It’s a fine balance between the

G5 Technologies 5th January 20231st December 2022 Cybersecurity, Productivity Read more

What to Include in a Year-end Technology Infrastructure Review

Free illustrations of Checklist

When the year is coming to a close, it’s the perfect time to plan for the future. Most businesses begin the year with the hope of growing and improving operations. Much of how a business operates depends on technology. So,

G5 Technologies 31st December 20223rd November 2022 Cybersecurity, IT Management Read more

What Are the Advantages of Implementing Conditional Access?

Free illustrations of Neon

It seems that nearly as long as passwords have been around, they’ve been a major source of security concern. Eighty-one percent of security incidents happen due to stolen or weak passwords. Additionally, employees continue to neglect the basics of good

G5 Technologies 25th December 20223rd November 2022 Cybersecurity Read more

Tips for Overcoming Barriers to a Smooth BYOD Program

Free A Person Working on His Laptop Stock Photo

Bring your own device (BYOD) is a concept that took hold after the invention of the smartphone. When phones got smarter, software developers began creating apps for those phones. Over time, mobile device use has overtaken desktop use at work.

G5 Technologies 20th December 20223rd November 2022 Cybersecurity, IT Management Read more

Simple Setup Checklist for Microsoft Teams

Free illustrations of Checklist

Microsoft Teams is a lot of things. It’s a video conferencing tool, a team messaging channel, and a tool for in-app co-authoring, just to name a few. During the pandemic, the popularity of Teams skyrocketed. User numbers for MS Teams

G5 Technologies 15th December 20223rd November 2022 Microsoft, Productivity Read more

7 Things to Consider When Getting a New Computer to Avoid Buyer’s Remorse

Free Stylish workspace with computer and simple furniture Stock Photo

Have you ever bought a new computer and then had buyer’s remorse a few months later? Maybe you didn’t pay attention to the storage capacity and ran out of space. Or you may have glossed over memory and experienced constant

G5 Technologies 10th December 20223rd November 2022 IT Management Read more

7 Apps That Can Help You Improve Customer Experience in 2023

Free illustrations of Survey

Paying attention to your customer experience directly impacts your bottom line. Companies that are “customer-centric” are 60% more profitable than those that aren’t. In this digital age, customers also expect more from those they do business with. In today’s world,

G5 Technologies 5th December 20223rd November 2022 Business Continuity Read more

What Are the Most Helpful VoIP Features for Small Businesses?

Free photos of Voicemail

Just five or six years ago, VoIP was still considered a “different” type of business phone system. One that wasn’t the norm. But the pandemic changed that way of thinking. Now internet-based phone systems aren’t simply the norm. They’re mandatory

G5 Technologies 30th November 20225th October 2022 Business Read more

Simple Guide to Follow for Better Endpoint Protection

Free photos of Ransomware

Endpoints make up much of a company’s network and IT infrastructure. This is a collection of computers, mobile devices, servers, and smart gadgets. As well as other IoT devices that all connect to the company network. The number of endpoints

G5 Technologies 25th November 20225th October 2022 Cybersecurity Read more

Insider Threats Are Getting More Dangerous! Here’s How to Stop Them

red padlock on black computer keyboard

One of the most difficult types of attacks to detect are those performed by insiders. An “insider” would be anyone that has legitimate access to your company network and data. This would be via a login or other authorized connection.

G5 Technologies 20th November 20225th October 2022 Cybersecurity Read more

Everything You Need to Know About Microsoft Viva Sales

silver click pen

Data entry can be a real drag for salespeople. The time they spend on administrative tasks is time away from customer interactions. But that data is vital. It’s important to capture customer orders, quotes, needs, and more. Lead and sales

G5 Technologies 15th November 20225th October 2022 Business, Microsoft Read more

Checklist for Better Digital Offboarding of Employees

Free photos of Checklist

Digital footprints cover today’s modern workplace. Employees begin making these the moment they’re hired. They get a company email address and application logins. They may even update their LinkedIn page to connect to your company. When an employee leaves a

G5 Technologies 10th November 20225th October 2022 Cybersecurity, IT Management Read more

9 Urgent Security Tips for Online Holiday Shopping

Free Person Shopping Online Stock Photo

The holiday shopping season is taking off. This means that scammers have also revved up their engines. They’re primed and ready to take advantage of all those online transactions. Don’t forget to stay safe online during the buying frenzy that

G5 Technologies 5th November 20225th October 2022 Cybersecurity Read more

7 Pro Tips for Microsoft 365

Red Surface laptop on a checkered bed by a window

Microsoft 365 is the most popular of all major office productivity software. It has 48.8% of the global market share, just edging out Google’s apps, by a couple of percentage points. It’s used by individuals, small & mid-sized businesses, and

G5 Technologies 31st October 20223rd November 2022 Microsoft Read more

What Is Microsoft Defender for Individuals & What Does It Do?

Free Close Up of a Keyboard Stock Photo

When you hear about Microsoft adding security apps to M365, it’s often the business versions. But the pandemic has changed the way that we see the workplace. It’s now a hybrid world. One made up of several connected “mini-offices” located

G5 Technologies 25th October 20222nd September 2022 Cybersecurity, Microsoft Read more

The Biggest Vulnerabilities that Hackers are Feasting on Right Now

Free illustrations of Hacker

Software vulnerabilities are an unfortunate part of working with technology. A developer puts out a software release with millions of lines of code. Then, hackers look for loopholes that allow them to breach a system through that code. The developer

G5 Technologies 20th October 20222nd September 2022 Cybersecurity Read more

Small Businesses Are Attacked by Hackers 3x More than Larger Ones

person in black long sleeve shirt using macbook pro

Have you felt more secure from cyberattacks because you have a smaller business? Maybe you thought that you couldn’t possibly have anything that a hacker could want? Didn’t think they even knew about your small business. Well, a new report

G5 Technologies 15th October 20222nd September 2022 Cybersecurity Read more

Internet Explorer Has Lost All Support (What You Need to Know)

Free photos of Computer

After being the main entry to the internet in the late 1990s and early 2000s, Internet Explorer (IE) is gone. As of June 15, 2022, Microsoft dropped the web browser from support. IE ushered in the age of connection to

G5 Technologies 10th October 20222nd September 2022 Cybersecurity, Microsoft Read more

5 Mistakes Companies Are Making in the Digital Workplace

MacBook Pro on table beside white iMac and Magic Mouse

The pandemic has been a reality that companies around the world have shared. It required major changes in how they operate. No longer, did the status quo of having everyone work in the office make sense for everyone. Many organizations

G5 Technologies 5th October 20222nd September 2022 Productivity Read more

You Need to Watch Out for Reply-Chain Phishing Attacks

Free illustrations of Phishing

Phishing. It seems you can’t read an article on cybersecurity without it coming up. That’s because phishing is still the number one delivery vehicle for cyberattacks. A cybercriminal may want to steal employee login credentials. Or wish to launch a

G5 Technologies 30th September 20228th August 2022 Cybersecurity Read more

What Should You Do to Reduce Risk When Your Mobile Device Goes Missing?

Free illustrations of Cybersecurity

Few things invoke instant panic like a missing smartphone or laptop. These devices hold a good part of our lives. This includes files, personal financials, apps, passwords, pictures, videos, and so much more. The information they hold is more personal

G5 Technologies 25th September 20228th August 2022 Cybersecurity Read more

Microsoft Productivity Score Overview

white wooden door with silver door lever

Productivity can be challenging to track, no matter where employees are working. How do you know they’re using their tools as effectively as possible? How can you enable them to adopt best practices? These are questions that managers often ask

G5 Technologies 20th September 20228th August 2022 Microsoft Read more

6 Important IT Policies Any Size Company Should Implement

person holding pencil near laptop computer

Many small businesses make the mistake of skipping policies. They feel that things don’t need to be so formal. They’ll just tell staff what’s expected when it comes up and think that’s good enough. But this way of thinking can

G5 Technologies 10th September 202215th September 2022 IT Management Read more

6 Discontinued Technology Tools You Should Not Be Using Any Longer

Free vector graphics of Website

One constant about technology is that it changes rapidly. Tools that were once staples, like Internet Explorer and Adobe Flash, age out. New tools replace those that are obsolete. Discontinued technology can leave computers and networks vulnerable to attacks. While

G5 Technologies 5th September 20227th September 2022 IT Management Read more

How Using the SLAM Method Can Improve Phishing Detection

Free vector graphics of Hack

There is a reason why phishing is usually at the top of the list for security awareness training. For the last decade or two, it has been the main delivery method for all types of attacks. Ransomware, credential theft, database

G5 Technologies 31st August 20224th July 2022 Cybersecurity Read more

Did You Just Receive a Text from Yourself? Learn What Smishing Scams to Expect

Free illustrations of Cyber

How many text messages from companies do you receive today as compared to about two years ago? If you’re like many people, it’s quite a few more. This is because retailers have begun bypassing bloated email inboxes. They are urging

G5 Technologies 25th August 20224th July 2022 Cybersecurity Read more

How Often Do You Need to Train Employees on Cybersecurity Awareness?

Free illustrations of Security

You’ve completed your annual phishing training. This includes teaching employees how to spot phishing emails. You’re feeling good about it. That is until about 5-6 months later. Your company suffers a costly ransomware infection due to a click on a

G5 Technologies 20th August 20224th July 2022 Cybersecurity Read more

Home Security: Why You Should Put IoT Devices on a Guest Wi-Fi Network

Free photos of Computer

The number of internet-connected devices in homes has been growing. It’s increased exponentially over the last decade. A typical home now has 10.37 devices connected to the internet. PCs and mobile devices make up a little over half of those

G5 Technologies 15th August 20224th July 2022 Cybersecurity Read more

Get More Unplugged Laptop Time with These Battery-Saving Hacks

turn-on laptop displaying 97 percent battery

One of the big draws of a laptop computer is that you can use it anywhere. You don’t need to have it plugged in all the time because it has an internal battery. Your laptop may start out with several

G5 Technologies 10th August 20224th July 2022 Productivity Read more

5 Exciting Ways Microsoft 365 Can Enable the Hybrid Office

gray microsoft surface laptop computer on white table

“Hybrid office” is the new buzzword you’ll hear used in business discussions. It’s the mix of having employees both working at the office and working from home. This has become more than a buzzword and is now the reality for

G5 Technologies 5th August 20224th July 2022 Microsoft, Productivity Read more

Which Form of MFA Is the Most Secure? Which Is the Most Convenient?

Registration, Log In, Keyboard, Hand, Write

Credential theft is now at an all-time high and is responsible for more data breaches than any other type of attack. With data and business processes now largely cloud-based, a user’s password is the quickest and easiest way to conduct

G5 Technologies 31st July 20226th June 2022 Cybersecurity Read more

Top 5 Mobile Device Attacks You Need to Watch Out For

Displaying Top 5 Mobile Device Attacks You Need to Watch Out - raw image.jpg

Smartphones and tablets are often the preferred device for communications, web searching, and accessing many types of apps. They’re more portable and can be used from anywhere. We’re seeing the takeover of many activities that used to be performed on

G5 Technologies 25th July 20226th June 2022 Cybersecurity Read more

Signs That Your Computer May Be Infected with Malware

Hacker, Hack, Anonymous, Hacking, Cyber, Security

Approximately 34% of businesses take a week or longer to regain access to their data and systems once hit with a malware attack. Malware is an umbrella term that encompasses many different types of malicious code. It can include: Viruses

G5 Technologies 20th July 20226th June 2022 Cybersecurity Read more

Should I Consider Switching to Microsoft’s Edge Browser? (Top Features)

Laptop, Computer, Windows, Screen, Device, Desk, Office

One of the most important applications we choose is our internet browser. When on a computer or a mobile device, we work in that most of the time because many applications are now cloud-based, so accessing them means going through

G5 Technologies 15th July 20226th June 2022 Microsoft Read more

Pros & Cons of Using the Windows 365 Cloud PC

Cloud, Network, Website, Computer, Communication

While many companies have moved most of their workflows to the cloud, there is still a key component of office operations that is location-based. This would be employee computers. Most companies still rely on desktops and laptops to allow employees

G5 Technologies 10th July 20226th June 2022 Microsoft Read more

Are Two Monitors Really More Productive Than One?

Silver Imac on Top of Brown Wooden Table

When you see those people with two monitors, you may assume they do some specialized work that requires all that screen space, or they just really like technology. But having the additional display real estate that a second screen provides

G5 Technologies 5th July 20226th June 2022 Productivity Read more

What You Need to Know About the Rise in Supply Chain Cyberattacks

Cyber, Attack, Encryption, Smartphone, Mobile, Finger

Any cyberattack is dangerous, but the particularly devastating ones are those on supply chain companies. These can be any supplier – digital or non-digital – of goods and services. We’ve seen several attacks on the supply chain occur in 2021

G5 Technologies 30th June 20223rd May 2022 Cybersecurity Read more

What Are the Best Ways to Give an Older PC New Life?

Laptop, Mouse, Stethoscope, Notebook, Keyboard

Purchasing a new computer is a big investment. Many small businesses and home PC owners end up struggling with older systems because they want to get as many years out of them as possible. Have you found yourself banging on

G5 Technologies 25th June 20223rd May 2022 IT Management, Productivity Read more

Microsoft Teams Plan Comparison: Free vs M365 Business vs Teams Essentials

iphone screen with icons on screen

The shift to remote work over the last two years has caused companies to realign their digital tools. Now, many meetings default to being via video conference rather than in person, and working from home has become commonplace. Seventy-seven percent

G5 Technologies 20th June 202214th June 2022 Microsoft Read more

How to Protect Your Online Accounts from Being Breached

Cyber Security, Technology, Network, Internet

Stolen login credentials are a hot commodity on the Dark Web. There’s a price for every type of account from online banking to social media. For example, hacked social media accounts will go for between $30 to $80 each. The

G5 Technologies 15th June 202214th June 2022 Cybersecurity Read more

6 Ways to Combat Social Phishing Attacks

Phishing, Credentials, Data, Login, Password, Internet

Phishing is the number one method of attack delivery for everything from ransomware to credential theft. We are very aware of it coming by email, but other types of phishing have been growing rapidly. In recent years, phishing over social

G5 Technologies 10th June 20223rd May 2022 Cybersecurity Read more

4 Interesting Cloud Storage Trends to Watch for in 2022

Upload, Online, Internet, Files, Cloud, Technology

One area of cloud computing that is used widely, but often isn’t as flashy as the software side is cloud storage. Storing files in the cloud to make them easily accessible and shareable from anywhere was one of the very

G5 Technologies 5th June 20223rd May 2022 Business Continuity, Cloud Read more

5 Things You Should Never Do on a Work Computer

person using laptop

Whether you work remotely or in an office, the line between personal and work tasks can become blurred when working on your company computer. If you’re in front of a computer for most of your time during work, then it’s

G5 Technologies 31st May 20225th April 2022 Cybersecurity Read more

Alarming Phishing Attack Trends to Beware of in 2022

Hacking, Data Theft, Online Fraud, Cyber Crime, Hacker

In 2020, 75% of companies around the world experienced a phishing attack. Phishing remains one of the biggest dangers to your business’s health and wellbeing because it’s the main delivery method for all types of cyberattacks. One phishing email can

G5 Technologies 25th May 20225th April 2022 Cybersecurity Read more

Important Steps to Take Before You Recycle a Mobile Phone Number 

From above view of faceless person holding mobile phone with white screen and green recycle logo above marble surface

It’s not unusual to change a mobile number from time to time. For example, when you move, you may want a number that is local to the area you just moved to. Companies also may end up recycling mobile numbers

G5 Technologies 20th May 20225th April 2022 Cybersecurity Read more
  • « Previous

G5 Technologies

5 Abercrombie Court
Arnhall Business Park
Prospect Road
Westhill
Aberdeenshire
AB32 6FE

01224 443 896

info@g5tech.com

Registered No: SC 270539.
VAT number: 847 9379 61.

Connect with us

Subscribe to our newsletter

Visit the newsletter archive

  • Twitter
  • Facebook
  • LinkedIn

IT Solutions

  • IT Support Aberdeen
  • Dundee-IT-Support
  • Connectivity
  • Cloud Solutions
  • IT Security
  • WiFi

Latest News

  • What’s Changing in the Cybersecurity Insurance Market? 31st January 2023
  • What Cybersecurity Attack Trends Should You Watch Out for in 2023? 25th January 2023
  • Don’t Set Yourself Up to Fail: Tips for Safer Home Security Setups 20th January 2023
Copyright © 2023 G5 Technologies. All rights reserved. Theme Spacious by ThemeGrill. Powered by: WordPress.
  • Privacy Policy
  • Quality Policy
  • Vacancies

We would like to use cookies to give you the best experience on our website.

If you would like to find out more about which cookies we would like to use then click here: settings.

Please click accept if you are happy for us to use cookies.

G5 Technologies
Powered by  GDPR Cookie Compliance
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.

Google Analytics

This website uses Google Analytics which collect anonymous information such as the number of visitors to the site, and the most popular pages. It records Internet Protocol (IP) address in order to do this but we have it set up so that these IP addresses are masked.

Keeping this cookie enabled helps us to improve our website.

 

Please enable Strictly Necessary Cookies first so that we can save your preferences!

Privacy Policy

More information about our Privacy_Policy