ramsac team

IT Blog

ramsac dell blog

Removing the Dell Driver vulnerability

IT

We have compiled simple to follow instructions for how to download Dell’s security update tool that will detect and automatically remove the vulnerability from your machine. [...]

ramsac data protection 1

How secure is your data? A guide to data backup and disaster recovery

Cybersecurity

Discover how secure your business’ data is and how data backup and disaster recovery can mitigate the impact of data loss with ramsac’s helpful guide. [...]

ramsac people working in an office with lots of tech 1

When is it time to upgrade your computer?

Remote working

When is the best time to upgrade your computer? Get support and advice for the best times to upgrade, or learn the signs that your computer needs replacing... [...]

Web

Social distancing in offices – IT considerations

Coronavirus

A practical look at the IT considerations that need to be thought about over the coming weeks when planning the reopening of your office. [...]

ramsac Meeting transcription in teams blog play

How to: Live Meeting Transcription in Microsoft 365 Teams

Microsoft 365

We have created a short video to demo Microsoft 365 Teams' new feature, Transcription, using this feature, Teams can record who said what, when and produce an on the [...]

ramsac zero day blog

How organisations should react to zero-day threats

Cybersecurity

A zero-day threat is an attack that exploits a potentially serious software security weakness that the vendor or software developer may be unaware of. This blog explains what it [...]

Screenshot 3

A guide to Microsoft MyAnalytics (now Viva Insights)

Microsoft 365

From wellbeing to productivity, find out how Microsoft’s business analytics tool, MyAnalytics, can help to better manage team workloads. Find out more here. [...]

ramsac Breakout room blog

How to set up Microsoft Teams breakout rooms

Microsoft 365

Microsoft Teams is constantly evolving, as Microsoft develops new features to improve its collaboration capabilities. A significant new feature allows users to set up 'breakout rooms' during meetings. In [...]

Cyber Security Concept  Man Hand Protection Network With Lock Icon

A guide to UK cybercrime legislation + helpful links

Cybersecurity

Cybercrime is everywhere online.   As well as this, cyber-risks are increasingly harder to identify as cyber-crime becomes more sophisticated and harder to identify. With threats posed by everything from [...]