01827 219540

sales@mtservices.co.uk

Slide background

SystemCare

Redefining IT for your business

Find out more >

Slide background
Slide background

Frustrated with your IT Support?

Talk to us about our SystemCare plans

Slide background

• Share key information across all departments

• Manage cash flow effectively

• Saves time & money

Slide background

• Visitor & Staff Management

• Contractor Compliance

• Permit to Work Management

Find out more >

Slide background

To stop Ransomware

You need a cloud based multi-engine sandbox

Find out more >

Slide background

Find out more >

Make Work Less Work

Workflow that just works

Blog

Mondelez International (Minworth) continued commitment to Health & Safety.

  • August 10th, 2015 - Mondelez International (Minworth) continued commitment to Health & Safety.
  • Mondelez International (Minworth) continued commitment to Health & Safety. Mondelez International (based in Minworth, West Midlands) are committed to the safety of each and every employee, visitor and contractor. After installing the Sinica Visitor and Staff Management System the detailed process of ensuring that all visitors to site are fully aware of and abide by

    [Read More..]

    Sinica Exhibits at the Facilities Show!

  • April 30th, 2015 - Sinica Exhibits at the Facilities Show!
  •  Sinica Exhibits at the Facilities Show!       As Sinica continues to enjoy a period of growth and success, we have decided to exhibit at the UK’s largest facilities management event in June 2015. We now have an established Sinica client base across various sectors and are looking forward to the opportunities the Facilities Show will bring, following further

    [Read More..]

    Protect your business from the dangers of the web.

  • April 29th, 2015 - Protect your business from the dangers of the web.
  •   Protect your business from the dangers of the web. Every business now depends on the internet to some extent, unfortunately the web can be a dangerous place populated with inappropriate content, cybercriminals, hackers and people tracking your usage, which is why we would always recommend Web Protection as part of a multi layered security

    [Read More..]

    How do MT Services use Office 365?

  • March 18th, 2015 - How do MT Services use Office 365?
  • How do MT Services use Office 365? While not an in depth explanation of how every feature of Office 365 can be used to the full, below is a description of how MT Services have implemented various features of Office 365 to meet a number of business requirements.  We use the Office 365 Enterprise Plan

    [Read More..]

    What is Microsoft Office 365?

  • March 4th, 2015 - What is Microsoft Office 365?
  • What is Microsoft Office 365? What is Office 365? Office 365 is a solution that has been heavily marketed by Microsoft, but in our experience many business decision makers are confused.  The most common questions we are asked about this product are ‘what is it?’ and ‘what are benefits for my business?’ The name itself

    [Read More..]

    Microsoft pulls the plug on Windows Server 2003 Support.

  • February 3rd, 2015 - Microsoft pulls the plug on Windows Server 2003 Support.
  •   Microsoft pulls the plug on Windows Server 2003 Support. Microsoft will end support of its much used but antiquated Windows Server 2003 Operating System on July 14th 2015. Industry experts estimate that there are more than 10 million servers still running Windows Server 2003 and of these a sizeable portion are Microsoft Small Business

    [Read More..]

    How Managed Encryption can protect your business.

  • January 13th, 2015 - How Managed Encryption can protect your business.
  •   How Managed Encryption can protect your business. It is common to hear reports of laptops or USB Drives being stolen, lost or left on public transport which contain sensitive information. This information is often reported to be ‘Top Secret’, ‘Bank details’ or ‘Medical Files’ but what would you class as your sensitive data and

    [Read More..]

    How Cyber Criminals use Christmas to their advantage!

  • December 11th, 2014 - How Cyber Criminals use Christmas to their advantage!
  •   How Cyber Criminals use Christmas to their advantage! Cyber Criminals have become adept as using certain times of the year to launch attacks, alongside the tax year end, Christmas is a major opportunity for them. This year, as like many more before it, we expect to see cyber-attacks, phishing scams as well as fraudulent

    [Read More..]

    How Cryptolocker takes hold of your data

  • November 17th, 2014 - How Cryptolocker takes hold of your data
  •   How Cryptolocker takes hold of your data. What is Ransomware? Ransomware is the generic term for any malicious software that, as its name suggests, demands a ransom be paid by the computer’s user. Why would you want to pay a ransom? Because the ransomware has done something unpleasant to your computer, and potentially to

    [Read More..]

    Top 10 Security Threats to be aware of for 2015!

  • November 4th, 2014 - Top 10 Security Threats to be aware of for 2015!
  •   Top 10 Security Threats to be aware of for 2015! Phishing is a scheme that tricks users into opening an email attachment, usually pretending to be from a trusted source, for example ‘missed parcel delivery’ from Amazon. The attachment may appear perfectly normal, however behind the supposed PDF, DOC, or PPT is an executable

    [Read More..]