Our Latest Blog Articles

The Impact of COVID-19 on Grassroots IT and the IT Industry

2020 has been a year like no other, with none of us escaping the impacts of the global pandemic in both our personal and professional lives. Grassroots[...]

How to Get the Best from Your IT Support Team

It’s fair to say that you’ve invested a lot in your IT support team. If you have an IT support team in house, then you’ve spent time and money[...]

How to run a Daily Huddle using Microsoft Teams

With a team covering three countries, remote working is at the core of how Grassroots IT functions, and our daily huddle is crucial to maintaining a [...]

11 Ways to Stay Cyber Secure When Working from Home

The trend towards remote working and working from home has brought with it many opportunities and challenges for organizations of all sizes. These[...]

5 Tips for Successfully Outsourcing Your IT Support

A Managed Service Provider (MSP) can help your business stay up-to-date with the latest technology and remain competitive in today’s challenging[...]

The Essential Eight Cybersecurity Framework

Cyber-security threats and data breaches are becoming increasingly rampant, sophisticated and difficult to mitigate. Statistics from recent studies[...]

What is Microsoft Enterprise Management and Security?

With so many Microsoft products out there, many small business owners are left wondering how to choose the best Microsoft package for their unique[...]

Top 9 Ways to Secure Office 365 and Microsoft 365

Microsoft Office 365 has many security features and capabilities built in, however with a few simple steps you can greatly increase your cyber-security

My Three Big Takeaways from the Small Business Download 2018

 
Last week I had the immense pleasure of hosting clients, partners and other members of our community at our annual learning event – The Small[...]

3 Reasons you need to enable Multi Factor Authentication (MFA) today

Multi-factor authentication (aka MFA, 2-factor authentication, 2fa and so on) is a highly recommended, additional layer of security for the user[...]

1 2 3 4 5
... 19 ?