Author: Louise Howland
Louise heads up the marketing function at ramsac and is responsible for the business' communications, events and digital strategies. Louise's career spans over 18 years working as a marketing specialist in the IT sector, she is passionate about delivering IT content in language that is simple to understand. Outside of work Louise lives in Surrey with her husband and 2 sons.
Microsoft Loop vs. OneNote: Which Collaboration Tool is Right for Your Team?
Discover the key differences between Microsoft Loop and OneNote in our comprehensive comparison. Whether your team needs real-time collaboration or efficient note-taking, find out which tool is the best [...]
Upgrading from Microsoft Teams to Teams Premium: Why organisations are making the switch
In this blog we outline the compelling reasons why organisations are making the switch from standard Teams to Teams Premium. [...]
Empowering users with self-service password resets
At ramsac, we strive to empower our clients with efficient and secure IT solutions. Self-service password resets are a simple yet powerful tool that enhances security, saves time, and [...]
“Take me to the cauliflower” – a customer service parable
“Take me to the cauliflower” has become a phrase that both embodies what we do, and also allows anyone to challenge another colleague if they think they could be [...]
Understanding Microsoft 365 Business Premium: A smart choice for your organisation
Explore how Microsoft 365 Business Premium can elevate your organisation's productivity and security in this comprehensive blog. [...]
Embrace the future: The opportunities and challenges of AI in your organisation
AI training is vital to use AI responsibly and securely in this blog we explain how you can claim government funding to help finance your AI training [...]
What is data theft and how do you prevent it?
In any size organisation, data theft can be a huge issue. From disgruntled employees to large scale cyberattacks, data theft can severely impact your business. According to a report [...]
6 steps to designing an Identity Access Management strategy
An IAM strategy is a powerful mechanism for controlling and monitoring access to your company’s IT network and assets, ensuring robust protection against cyber threats. [...]
AI-Powered PCs: Rob May discusses the next wave in computing
In this insightful Q&A, AI expert Rob May delves into the evolving landscape of AI-powered PCs [...]