News

Hub

News, tech updates and alerts for small businesses and home users. Straight from the hub. 

Infographic for our IT Resource Hub

Latest News

Should your business be using Exclaimer?

Effective email communication is a crucial aspect of running a successful business. While establishing creative and professional consistency across your company is vital in ...
Read Article
what is voip?

What is VoIP?

VoIP stands for "Voice over Internet Protocol," and it refers to a technology that allows you to make phone calls over the internet instead of ...
Read Article

Find us on Facebook

11 months ago

🥳🎄Christmas is nearly here!🎄🥳Below are our opening hours for the festive period.We will, of course, remain accessible to our contract clients for emergencies throughout. See MoreSee Less
View on Facebook

1 years ago

Is your data backed up and easily accessible? As part of your approach to business continuity, you need to back up your data.What happens if you can’t access core systems because of an attack or hardware failure?Having easily accessible copies of your data allows you to continue operating and helps safeguard against ransomware and system failures.Don’t be tempted to think it won’t happen to you. Many assume because they aren’t in a supply chain related to national defense, or energy or aren’t a large company with mountains of data, that they’re safe. They’re not. We have personally seen a small, local company fall victim to a ransomware attack, severely disrupting their business. Don’t let it happen to you!#CyberSecurityAwarenessMonth #TeamZOOC #NewtonAbbot #Devon #ITSupport See MoreSee Less
View on Facebook

1 years ago

Recent years have seen a rise in ‘phishing’ that aims to acquire login credentials or other sensitive information. We regularly see fraudulent emails that cleverly mimic popular sites such as Office 365, Gmail, and PayPal, prompting users to log in to read a message, perhaps, or verify something.We are all human, and even the best people sometimes get things wrong (or click the wrong things!). If your environment is unsecured; where users have access to everything and use similar passwords across multiple accounts, you are providing scammers with more opportunity to gain access to sensitive information. Think outside the box – who else have you given access to? Does your accountant access your bookkeeping software? Or does a marketing freelancer look after your social media accounts? The buck doesn’t stop with your own team!Fortunately, there are things you can do right away to help safeguard your data; start by conducting a quick stock-take on ‘who’ can access ‘what’ and ensure that MFA (Multi-Factor Authentication) is enabled on all accounts.Data security doesn’t stop there, though! Need some help? We offer FREE IT health checks to all clients new to ZOOC – we’d be happy to guide you. #CyberSecurityAwarenessMonth #TeamZOOC #NewtonAbbot #Devon #ITSupport See MoreSee Less
View on Facebook

1 years ago

Topic three is all about data management.If you run a small company, it is highly likely that your entire team has access to a lot of company information. Have you considered ‘who’ specifically needs to access ‘what’, and ‘why’? If not, your data is at a higher risk of being exposed. #CyberSecurityAwarenessMonth #TeamZOOC #NewtonAbbot #Devon #ITSupport See MoreSee Less
View on Facebook

1 years ago

What is Phishing? 🐠‘Phishing’ is the fraudulent practice of sending messages to deceive individuals into revealing sensitive information. This information is then used to access important accounts and can result in identity theft and financial loss. It is highly likely you have received at least one of these attempts; the most common form being an email.Such messages will often divert you to a convincing website that may ask for login details or even payment information. They also sometimes use attachments to install malicious software (malware) or ransomware on your device. The malware could let criminals see your every keystroke, access your data, or shut down your systems and demand a ransom. This is why it is so important to keep your team trained in what to look for; have regular conversations and encourage reporting of suspicious emails and accidental clicks. These emails are becoming more and more advanced, so you really need to know what you’re looking for! #CyberSecurityAwarenessMonth #TeamZOOC #NewtonAbbot #Devon #ITSupport See MoreSee Less
View on Facebook

Industry & Security

ZOOC Become a CiSP Approved Member

ZOOC has been approved to join the National Cyber Security Centre's Cyber Security Information Sharing Partnership. The Cyber Security Information Sharing Partnership (CiSP) is a joint ...
Read Article
VoIP for small business UK

Are you ready for the PSTN switch off?

Everyone, including homes and businesses that currently use PSTN-based services, will need to migrate to another service before 2025. While 2025 may seem a while ...
Read Article
The benefits of hybrid working for small businesses

Understanding the Benefits of Hybrid Working

Hybrid working can bring commercial and employee benefits when implemented well. Reduced office space and demands on IT and other services can save businesses costs, ...
Read Article
Help to Grow Digital UK Government Initiative - person working from home, using a tablet

The Governments Help to Grow: Digital scheme. Should you take a look?

We explored the software available, and while limited, the Help to Grow: Digital initiative provides essential platforms from categories that will benefit most businesses. The ...
Read Article

Datacomms

Should your business be using Exclaimer?

Effective email communication is a crucial aspect of running a successful business. While establishing creative and professional consistency across your company is vital in ...
Read Article >>

What is VoIP?

VoIP stands for "Voice over Internet Protocol," and it refers to a technology that allows you to make phone calls over the internet instead of ...
Read Article >>

ZOOC Become a CiSP Approved Member

ZOOC has been approved to join the National Cyber Security Centre's Cyber Security Information Sharing Partnership. The Cyber Security Information Sharing Partnership (CiSP) is a joint ...
Read Article >>

Are you ready for the PSTN switch off?

Everyone, including homes and businesses that currently use PSTN-based services, will need to migrate to another service before 2025. While 2025 may seem a while ...
Read Article >>

Should your business be using Exclaimer?

Effective email communication is a crucial aspect of running a successful business. While establishing creative and professional consistency across your company is vital in ...
Read Article

Are you ready for the PSTN switch off?

It’s coming, sooner than you think, and it affects everyone! Don’t leave it until the last moment when demand will be high.