Unmasking Social Engineering Threats To Protect Your Data

To answer the question "why are Microsoft Intune and Autopilot crucial to a modern workplace?" you first need to understand specifically what it meant...
Microsoft Announce New Features to Defender for Endpoint

Microsoft have announced that Microsoft Defender for Endpoint customers will now be able automatically to disrupt human-operated attacks like ransomwa...
Automating Financials

At The HBP Group, we've been awarded the highest partner accolades from Microsoft for 13 years now. Up until recently, you might have known it as thei...
Tech Tip Rest Your Windows 11 Device

Our Senior IT Escalation Engineer, Andy Palmer, is always keen to share ways to use and understand your technology better. His latest tech tip is all ...
Unmasking Social Engineering Threats To Protect Your Data

In today's connected digital landscape, the need for robust cybersecurity has never been more critical. One such threat that has been on the rise and ...
Battery Life Blog

Modern Standby operates in two modes: Connected Standby and Disconnected Standby. As the names suggest, Connected Standby allows the device to stay co...
Password-Managers

The long and short of it is, password managers are safe to use. But what are the risks associated with them, do they outweigh the benefit and which sh...
The True Cost of Cyber Security Breaches

By considering both the direct and indirect costs of a cyber security breach, businesses can take steps to reduce the risk of a breach and the financi...
EOL-Software-Mobile

In this article we break down why End of Life Software should not be used in business and look at the security risks, lack of support and how you can ...