Our Insights

Latest Blog Posts

Will your business be hacked on January 14th 2020?

This is what is likely to happen to your business if it is operating on Windows 7 and hasn’t been upgraded to Windows 10. (Read more)

Greystone Case Study: Wireless Leased Lines

Search Engine Easy is a leading Google Ads agency in the UK and Ireland. Read how we used Microwave leased line technology to provide their internet and site-to-site data connectivity

Use Multi-Factor Authentication to Secure Shared Root Accounts

This master account is highly vulnerable as it is often shared between several people and has the highest levels of access. If it was compromised by a hacker, they could...

Greystone achieves Cyber Essentials Accreditation

We are proud to announce that we are now Cyber Essentials Accredited!

How to Setup and Manage SPF records to help prevent SPAM

SPF or “Sender Policy Framework” to me and you is an amazing tool in your anti-spam arsenal, but it is not well understood in the SMB world and can sometimes...

How to Secure your online accounts with 2FA

Wikipedia says MFA is "is an authentication method in which a computer user is granted access only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism"