Cyber Security.
ACS Systems acquired by multinational technology company
ACS Systems has been acquired by multinational technology company, Bechtle. Founded in 1983, Bechtle is now one of Europe’s leading IT providers with a presence in 14 countries. In the past, Bechtle direct UK and ACS have delivered a number of successful customer ...
Evolution of the MSP
Watch Sessions After almost three years, ACS returned to the University of Northampton for their ‘Evolution of the MSP’ event. Guest speakers included Steve Horobin of Arrow, Greg Bayliss of Cymulate and Stephen Harley of ACS. Arrow is a global supply chain partner ...
Strengthening your first line of defence
As businesses fight the war against phishing attacks and cyber security breaches, staff are, in the words of one data systems manager, both the weakest link and the first line of defence. Doug Frost, IT Manager at Ozo Innovations in Kidlington, near Oxford, has ...
Microsoft Defender for Business Bitesize
Microsoft Defender for Business is an endpoint security solution designed especially for the small and medium-sized business (up to 300 employees). With this endpoint security solution, your company’s devices are better protected from ransomware, malware, phishing, and other threats. In these bitesize videos from ...
Upgrade Your Businesses Cyber Security
Why cyber security is important for SMB’S Security is a key challenge for small and medium businesses. In fact, in the past year there has been over a 300% increase1 in ransomware attacks, with over 50% of those targeting small businesses. And the ...
Bolstering your cyber defences
Since the Russian invasion of the Ukraine, the National Cyber Security Centre (part of GCHQ) has been calling on organisations in the UK to bolster their online defences. For SMEs across the country, however, understanding what practical steps to take is challenging. Embracing the ...
The Evolution of the MSP – Event Recording
Join ACS Office Solutions, your local strategic IT provider, as we aim to simplify how and why you should choose the right Managed Service Provider (MSP).
What should you expect from a strategic IT partner?
Join ACS Office Solutions, your local strategic IT provider, as we aim to clarify how and why you should choose the right Managed Service Provider (MSP).
Microsoft New Commerce Experience & Price Increases – What Does It All Mean?
There are two major aspects to these changes first a global price increase on some of the most popular licensing products for commercial clients.
WELCOME TO MICROSOFT 365 & SURFACE: THE MODERN WORKPLACE IS EVOLVING.
Microsoft 365 and Surface deliver the experiences employees love, the protection organisations demand, and flexibility for teams to work their way. Encourage productivity, engagement, and collaboration with Surface for Business.
HP WOLF SECURITY – ADVANCED SECURITY IN-THE-BOX
The world’s most secure and manageable PCs are designed to be resilient against the attacks of tomorrow.
Cyber Security For Small & Medium Businesses
Professional Cyber Security Services For Small & Medium Businesses (SMBs) ACS Office Solutions uses the latest cutting-edge cyber security technology to protect small and medium businesses, and larger corporate organisations, from cyber attacks. With one comprehensive cloud-native platform, we defend companies and organisations by ...
Protecting Your Business Webinar Recording
The way in which businesses quickly adapted to the pandemic left security systems vulnerable to cyber attacks and criminal infiltration. In this blog, we discuss the top five cyber frauds you should be aware of in the current climate and the ways in which you can minimise the risks.
Meeting The Needs Of Today’s Workforce
As we began to consider the return to the office post-pandemic, there was one particular item or space that really seemed to highlight the development that we'll need to take on board and that also summed up how ACS hopes to help its clients.
ACS Transforms BMTC’s IT Infrastructure
Like so many businesses, 2020 was a challenging year for BMTC. New ways of working and the requirement for a complete IT overhaul called for some real expertise to see them through, which led BMTC to ACS.
Top 5 Types Of Fraudulent Activity To Be Aware Of During The COVID-19 Pandemic In The UK
The way in which businesses quickly adapted to the pandemic left security systems vulnerable to cyber attacks and criminal infiltration. In this blog, we discuss the top five cyber frauds you should be aware of in the current climate and the ways in which you can minimise the risks.
O’Riordan Bond – A Partnership Based on Trust
O'Riordan Bond have partnered closely with ACS for 21 years, purchasing IT hardware, office furniture, and receiving tailored IT Managed Services.
How ACS Transformed CABE’s IT Infrastructure
CABE knew that their IT systems were causing both productivity and security headaches, but simply didn’t know where to begin.
Cyber-security in the post-COVID business
In the last 12 months the challenges of keeping business cyber-secure has evolved dramatically, as we accelerate and change, the way we use IT business must adopt a tiered, 360 degree approach to protecting data.
Keeping business secure during crisis
The massive increase of home working has meant that IT teams have had to work quickly to ensure that our people can stay connected and productive in an exceptionally short timeframe.
Cyber Essentials for Business
As an IASME Licensed Certification Body ACS offers certification for organisations seeking to secure Cyber Essentials and Cyber Essentials Plus security standards.
Trust Every User Webinar Recording
Businesses have been adapting to new ways of working throughout the pandemic and during this time, Cisco Meraki have been enabling many companies to support this shift, while ensuring network connectivity remains secure, simple and reliable.
Optimise your Security Controls in Minutes – Webinar Recording
Cyber attacks on your business are continuous, and so your defences need to be too. But how often can you check or test for vulnerabilities, especially against zero days or when you deploy new apps or infrastructure?
Mimecast Email Security 3.0 – Webinar Recording
Nearly all cyber attacks leverage email. That’s because email is always on, it’s a trusted communication channel between organisations, it carries links and attachments, and it’s easily impersonated.
The Future of Work is Flexible and Mobile – Webinar Recording
We will discuss how our use of IT has changed dramatically over the last several weeks and how the applications and the geographical dispersion means that just as use has changed, so must our Cyber Security stance.
The Last Line Of Defence – Webinar
Security awareness coupled with frequent simulated phishing training will help employees make smarter security decisions every day.