facebook
Skip to content
020 8099 5540
Instagram page opens in new windowLinkedin page opens in new windowX page opens in new windowFacebook page opens in new window
  • Help & Support
  • Chat To Our Team
Top Bar Menu
Search:
GoodChoice IT – The Leaders In Intelligent IT Support Services Across London & Surrey
Strategic IT Support to grow your business
GoodChoice IT - The Leaders In Intelligent IT Support Services Across London & SurreyGoodChoice IT - The Leaders In Intelligent IT Support Services Across London & Surrey
  • About us
    • IT Support Services
  • IT Managed Services
    • IT Support for Hybrid Working & Virtual Teams
    • Backup & Disaster Recovery
    • Managed IT Support Sutton
    • Business Broadband & Communications
    • Help with Office Moves
  • Cloud Computing
    • Microsoft 365 Support
  • Cyber Security
    • Windows 10 Migration to 11
    • Microsoft Office365 Security
  • Artificial Intelligence
    • The AI Navigator
    • Virtual AI Manager for Business | Managed AI Service | GoodChoice IT
  • Virtual CIO Services
    • Fractional IT Director
    • Virtual CIO Services in Construction
    • Virtual CIO Services for Educational Institutions
    • Virtual CIO Services for Financial Institutions
    • Virtual CIO Services for Healthcare
    • Virtual CIO Services for Hospitality
    • Virtual CIO Services for Retail Businesses
    • Virtual CIO Services for Real Estate
    • Virtual CIO Services for Startups
    • Virtual CIO Services for Non-Profit Organisations
    • Virtual CIO Services for Professional Services Firms
  • Blog
    • Artificial Intelligence
    • Business Continuity
    • Cloud Computing
    • Construction Industry
    • Cybersecurity
    • IT Management
    • Microsoft
    • New Technology
    • Online Presence
    • Part-Time IT Director / Fractional IT Manager
    • Productivity
  • Contact Us
  • About us
    • IT Support Services
  • IT Managed Services
    • IT Support for Hybrid Working & Virtual Teams
    • Backup & Disaster Recovery
    • Managed IT Support Sutton
    • Business Broadband & Communications
    • Help with Office Moves
  • Cloud Computing
    • Microsoft 365 Support
  • Cyber Security
    • Windows 10 Migration to 11
    • Microsoft Office365 Security
  • Artificial Intelligence
    • The AI Navigator
    • Virtual AI Manager for Business | Managed AI Service | GoodChoice IT
  • Virtual CIO Services
    • Fractional IT Director
    • Virtual CIO Services in Construction
    • Virtual CIO Services for Educational Institutions
    • Virtual CIO Services for Financial Institutions
    • Virtual CIO Services for Healthcare
    • Virtual CIO Services for Hospitality
    • Virtual CIO Services for Retail Businesses
    • Virtual CIO Services for Real Estate
    • Virtual CIO Services for Startups
    • Virtual CIO Services for Non-Profit Organisations
    • Virtual CIO Services for Professional Services Firms
  • Blog
    • Artificial Intelligence
    • Business Continuity
    • Cloud Computing
    • Construction Industry
    • Cybersecurity
    • IT Management
    • Microsoft
    • New Technology
    • Online Presence
    • Part-Time IT Director / Fractional IT Manager
    • Productivity
  • Contact Us

Cybersecurity

Padlock protecting an email envelope.

Secure Your Emails: A Simple Guide to Understanding Your Online Risk

Cybersecurity, Online PresenceBy Dave Lane19th March 2026

Many business leaders don’t realise just how exposed their email systems are to attacks. This new tool, SecureMyEmails.com, aims to change that by giving you a straightforward security score out of 100. It helps you see exactly what needs fixing to protect your business. What is SecureMyEmails.com? This tool was created because finding a simple,…

Digital sword splitting, one side menacing, one side protective.

AI’s Double-Edged Sword: Protecting Your Business from Evolving Cyber Threats

AI, Business, CybersecurityBy Dave Lane19th March 2026

Artificial intelligence is set to transform businesses over the next five years, but it’s also making cyber threats much more dangerous for companies, especially smaller ones. Attackers can now use AI to find weaknesses and send out personalised scam emails much more easily. This means businesses need to spend more on security to avoid serious…

Broken email icon on a cracked computer screen.

Why Your New Software Fails at Email—And How to Fix It with DMARC, DKIM & SPF

Cybersecurity, Online PresenceBy Dave Lane18th March 2026

Switching to shiny new software for your business always sounds fun—until you notice none of its emails arrive. So you double-check your settings, and still, nothing. Even your IT team is scratching their heads. The culprit? Usually, it’s a security thing called DMARC. Let’s break down what goes on. Key Takeaways DMARC, DKIM, and SPF…

Office computer screen with abstract digital interface.

Why You Should Ban New AI Browsers Like Atlas and Comet at Work—For Now

AI, CybersecurityBy Dave Lane17th March 2026

AI at work promises to make life easier, but sometimes new tools show up before they’re safe to use. That’s exactly what’s happening with the recent release of ChatGPT’s Atlas and Perplexity’s Comet browsers. They look handy, but for now, keeping them out of your business is the smartest move. Key Takeaways Atlas and Comet…

Digital lock and shield icon for system security.

How Often Should We Run Vulnerability Scans? A UK Guide to System Security

Cybersecurity, IT Management, Tech Tips / How-ToBy 12th March 2026

Keeping your digital systems safe is a big job, and one of the main ways to do that is by running vulnerability scans. But how often should you actually be doing them? It’s not a simple ‘one size fits all’ answer, really. The truth is, it depends on a few things about your organisation and…

Digital network with glowing red vulnerability points.

What is Vulnerability Scanning and What Does It Uncover in Your Business Network?

Business, Business Continuity, Cybersecurity, IT ManagementBy 5th March 2026

In today’s connected world, keeping your business network safe from cyber threats is a big deal. You hear a lot about security, but what does it actually mean for your company? One important tool in the fight against hackers is vulnerability scanning. So, what is vulnerability scanning and what does it find in a business…

Cyber and AI risk ownership in business.

Who Really Owns Cyber and AI Risk in Your Business?

AI, Business, CybersecurityBy Dave Lane5th March 2026

Many businesses still think of cyber security and AI governance as purely IT issues. But the truth is a bit more complicated than that. Often, when you ask who’s in charge of IT governance, the CEO points to the IT manager, and the IT manager points right back to the CEO. When no one is…

Staff learning about phishing prevention during a training session.

Effective Phishing Training: How to Train Staff Without Causing Annoyance

Cybersecurity, IT Management, ProductivityBy 26th February 2026

Phishing attacks are getting smarter, and frankly, they’re a real pain. We’ve all been there, staring at an email that looks *almost* right, wondering if it’s legit or a scam. The problem is, most of us already know not to click dodgy links. The real challenge is spotting those sneaky ones that slip through when…

Free attack unsecured laptop vector

The MFA Level-Up: Why SMS Codes Are No Longer Enough (and What to Use Instead)

CybersecurityBy Dave Lane25th February 2026

For years, enabling Multi-Factor Authentication (MFA) has been a cornerstone of account and device security. While MFA remains essential, the threat landscape has evolved, making some older methods less effective. The most common form of MFA, four- or six-digit codes sent via SMS, is convenient and familiar, and it’s certainly better than relying on passwords…

Staff attending a phishing awareness training session.

Phishing Awareness Training: What It Is and How Often Staff Need It

Cybersecurity, IT Management, ProductivityBy Dave Lane19th February 2026

Key Takeaways: Human Error is the #1 Risk: Over 90% of successful cyber attacks start with a phishing email. Your staff are your first and last line of defence. Training is Not Optional: Regular, engaging phishing awareness training is a fundamental control for any business handling sensitive data. Simulations are Crucial: Simulated phishing attacks are…

←123456…
78910111213141516171819202122232425262728
29→

Copyright 2026 Goodchoice IT Ltd. Registered address in England,
Berkley House, 86 High Street, Carshalton, SM5 3AE Company No. 5719949. Terms and Conditions

Go to Top