Year: 2022

Simple Checklist for Microsoft Teams Setup

Simple Checklist for setting up Microsoft Teams Microsoft Teams is a lot of things. It’s a video conferencing tool, a team messaging channel, and a tool for in-app co-authoring, just to name a few. During the pandemic, the popularity of Teams skyrocketed. User numbers for MS Teams jumped from 20 million in November 2019 to […]
Read More

The costs of not outsourcing your IT Support

The costs of not outsourcing your IT Support There comes a time in every business journey where you have grown to the point that some services simply can’t be managed by you or one of your team jumping on a problem as it arises. You also have yet to grow to a size that justifies […]
Read More

Insider Threats

Insider Threats Are Getting More Dangerous! Here’s How to Stop Them Here at Commstec, we believe that one of the most difficult types of attacks to detect are those performed by insiders. An “insider” would be anyone that has legitimate access to your company network and data. This would be via a login or other […]
Read More

As a Service…

IT as a Service: What is it? At Commstec IT, we like to keep our language jargon and tech speak free as far as we can. One of the most popular ways to describe what we do is “IT as a service, or ITAAS.” With ITAAS, the emphasis is on helping your business reduce the […]
Read More

Introducing Commstec IT and our “Why”.

I bought my first Personal Computer back in 1998, and within a year I had upgraded nearly every major component within it, probably voiding any warranty I had with PC World in the process. I quickly became fascinated with how computers worked and what made them tick, to then becoming even more interested in how […]
Read More

Understanding IT Security

What is IT Security? IT security protects the integrity of information technologies like computer systems, networks, and data from attack, damage, or unauthorised access. A business trying to compete in a world of digital transformation needs to understand how to adopt information security solutions that begin with design. This is what it means to “shift security […]
Read More