Backup Your Computer for Moving Offices

Are your premises changing?

Moving office is a stressful and difficult process for many; packing hundreds of boxes, organising removal vans and people to pack them, plus having to direct exactly where all your furniture goes. In the blur of moving day, you can often forget about the little things such as your computer and computer equipment when moving out.

With so much going on on moving day, things are easily missed or broken, meaning your computer could be one of the items that should go missing or get broken.

So how can you prepare ahead in the event your computer from getting damaged or misplaced on moving day?

Ghost IT Solutions Essex provide a variety of IT services in Essex for businesses, including cloud services, IT support and remote monitoring. As experts in the IT industry, Ghost IT Solutions have helped many businesses to backup their computers ahead of moving offices.

Our experts suggest:

●      Make Sure You Backup Your Computer – If your computer has been misplaced or damaged, it could put you out of work for weeks without any of your important documents and systems. That’s why it is vital to backup your computer onto a spare hard drive or cloud system – that way you can access your documents from a laptop or spare machine if yours is broken.

●      Keep Everything Together – There’s nothing worse than moving offices and realising you have left something vital like your keyboard or mouse in your old space. If you’re not prepared to make an embarrassing phone call to your ex-landlord about collecting your equipment, then waiting for a spare one to arrive could be a long stretch. When you’re packing up your computers, make sure to label each computer screen with the user’s name as well as their mouse, keyboard and any other additional equipment.

●      Cover your Phones and IT on Moving Day – Moving day is particularly stressful, and the last thing you need is phones ringing off the hook and disastrous internet crashes. At Ghost we offer a business continuity service, providing assistance for any unexpected disasters, problems and issues. We act as your office away from office, taking care of the phone calls and everything IT related.

Are you moving offices in the near future and need our backup services? Why not get in touch with the team here at Ghost Services on 01708 390370 and find out more information.

Buying Computer Hardware from Ghost Services

Updated computer hardware can be a vital factor in a smooth-running business. Here at Ghost Services we have a range of hardware available, all of which are incredible quality and trusted brands. Below are several reasons as to why you should choose Ghost Services for your hardware needs.

A large variety of hardware – There is no need to travel here, there and everywhere to find the perfect piece of IT equipment. Our website has a wide range of products available for you to choose from and all at the comfort from your own office or home. From laptops to servers we will find the correct hardware for your exact requirements.

Our experience and knowledge – Here at Ghost Services we pride ourselves in our expertise and friendly personal service. We will answer all of your questions, listen to your needs and find the perfect match for you and your business.

All in one – Not only can we source and supply the computers but we can provide your company with complete IT services. We’re able to install, maintain and monitor your hardware, as well as advise and educate you and your staff as to how to receive the best outcomes from your new systems. We can offer your business a whole range of hosted services that can be tailored to your exact requirements.

Streamlined communication – Due to our IT experts being able to cover all aspects of your IT support there would no longer be a dip in communication throughout the installation process, where equipment has been purchased from and who maintains them. We will have the knowledge of all this information and be able to monitor your IT systems thoroughly and with ease.

Here at Ghost Services, we can be your IT department, anytime, anywhere. By purchasing our hardware, you will be able to trust our services and have complete peace of mind that should anything go wrong, we will be on hand to help. For more information visit our website today or call a member of our team on 01708 390370.

Looking After Computer Hardware with Ghost IT Support Essex

When investing in computers for your office space you want to make sure these new machines are well looked after by your employees. We’re all guilty of treating our hardware a little carelessly from time to time but it can be detrimental and costly in the long run.

We’re not asking you to invest a lot in the care of your computers but there are some simple tips you can follow to ensure your system runs at it’s best and serves you well for as long as possible!

To help you with this, Ghost IT Solutions Essex has created a guide to caring for your computers, which you can give to your employees.

Fight Dust

Unfortunately, dust is the enemy of the interior of a PC and can cause heat to build up inside the computer meaning your computer may need to reboot or worse! Keep your work station clean but be careful not to use cloths that are too damp as water can get in the air vents and damage things further. Canned air to spray into your vents can blow out any potential dust just be careful you don’t spin the fans in the process.

 Keep it off the Floor

For your employees, desk space may be limited but try not to put your PC on the floor. Not only will this avoid building up dust within your machine, but keeping the computer off the floor will protect it from feet kicking out plugs, out of control vacuum collisions and guards it from carpet-generated static electricity as well as over heating.

Eat Away from the Keyboard

 While it may be tempting to stay at your desk for lunch and pop on your favourite YouTube video, the odds are that the occasional crumb or splash of drink will have made its way into your keyboard or laptop. These small intrusions into your keyboard can interfere with the function of your keyboard, mouse or even computer so keep them away.

 Turn Your Computer Off

Maybe you have important work you like to keep open on your computer or you’re impatient and want to get out of the door bang on 5pm? However tempting it is to leave your PC on 24/7, just like you, it needs a rest every so often and so you should turn it off each night. It is one of the most draining things to do to your computer and will affect its working lifespan.

At Ghost, we provide IT services in Essex as well as providing the hardware a business would need to have a complete IT setup. With everything from servers, desktops and laptops, we have everything you may need and can help you know how to care for them!

For more information about our hardware, call 01708 390370 or email [email protected]

Making Sure Your Computers Are Secure Over The Summer Holiday

We can bet students and teachers are looking forward to a well-deserved break over the summer, but even when no one is in the offices and classrooms you will need to protect your school’s computers from hacking and viruses.

So how can you make sure your school’s computers are secure over the six weeks?

Introduce a Computer Defence System

Malware is a type of software that is designed to damage your computer or gain unauthorised access to your personal information. This can include viruses, worms, Trojan horses and spyware. Most malware can be distributed across the internet and can be bundled into other software.

While it may sound obvious, just like your home computers, your school’s PCs need to be protected by security software too using antivirus, anti-spyware and anti-malware.

Our IT support in Essex suggests installing antivirus software such as Bitdefender, Norton or Kaspersky to protect against viruses. This software will help prevent malware getting into your computer and remove it if already present.

Back-up your Computer

As a school, it Is expected that you will be in possession of personal information belonging to parents and students so is important that this data is protected.

While it may be possible to repair your computer, when data is lost your files may be lost forever resulting in a stressful few weeks back after the holidays and major inconveniences for staff and students if the school is unable to run efficiently. You can prevent this happening when you back up your files on an external hard drive or by using an online backup service.

Run Disk Cleanups

Windows has an internal disk cleanup program in the Control Panel to get rid of any temporary files and other files stored on your computer. It quickly scans your computer for these files before giving you the option to delete them to free up space on your hard drive.

At Ghost IT Solutions, we like to take a more holistic approach to IT support, aiming to be a one-stop shop for all aspects of business IT support.

We currently provide IT services in Essex for businesses, but could be a valuable asset to your school’s computer security; providing cloud services, IT support and holiday cover for your IT department.

To find how we can help your school’s security, call 01708 390370 or email [email protected]


Are you concerned your IT systems are not up to date?

The Ghost team are offering a free audit, call now on 01708 390370 to book an appointment.
One of our trained technicians will carry out and inspection of your business hardware and advise on any findings. They will check your operating system performance and make any appropriate recommendations. A review of all system and software updates will also be carried out and advice will be given on overall machine and network performance. Don’t miss out on this great free check-up opportunity, call us now.

Data back-up: it’s essential

Your data is probably your most valuable business asset. It holds all the facts, figures and connections for your team and your clients and your company as a whole.  But just how often do you consider how secure, reliable or trustworthy your current data back-up provisions are?

A number of companies rely on either USB memory sticks or portable drives to back up their data either on a daily or weekly basis. Unfortunately this is an extremely risky way of doing so – especially since many people keep their USB on the same fob as their car keys, or in their pocket with loose change – which isn’t good for the device or the data it holds. Alternatively, they often keep their portable drive on the edge of the desk or on top of the computer base, where it is vulnerable to knocks, falls and any kind of spillage.

Your USB or portable drive is designed primarily for data transfer rather than data storage, and to rely on something that isn’t shockproof and is easy to misplace, lose or corrupt to hold such a valuable asset is a recipe for a cyber catastrophe.

Protecting your data is fast, easy and most importantly secure with the Ghost Computer Services “Cloud” based data back-up service. And it all comes at a very reasonable price.

We remove the risks associated with some of the more primitive ways of backing-up your valuable data, plus there is no requirement for you to have any expensive physical hardware or even a member of staff to initiate the back-up. Ghost Computer Services will do it all for you at a pre-specified day and time, and we will even email you once it has been successfully completed for your peace of mind. It will also keep your regulator happy.

As a heightened security measure, we use three independently separate UK-based data centres to store your data, using military-grade advanced encryption to ensure all your data is secure. All of our data centres follow strict Network Reliability Monitoring & Environmental Controls set by Ghost, so should you require a data restore, we can have this completed quickly and without any hassle.

Benefits of Ghost’s Hosted Data Back-Up

  • 1 single monthly fee
  • Future data requirements are easily scalable
  • Automated back-up with E-mail confirmation
  • Ability to speedily restore to “Point in Time”
  • Military-grade advanced encryption at multiple UK-based data centres
  • No need for expensive hardware or additional staff to undertake back-up
  • Removal of risks associated with using easily lost and corruptible USB/portable drives
  • Complements existing business continuity strategies

If you would like further details on the Ghost data back-up service please click- please click

Bugs & Hackers – Top Targets in 2015

It’s estimated that 96% of all corporations have been hacked – and the list includes a surprising number of well-known names. Here’s our round-up of famous firms (and faces) who have been targeted by the career cybercriminals this year:


British Airways, Merseyside Police, Wirral Council, The Conservative Party, Crimestoppers (and 300 others) – all forced offline by just one hacker, Ian Sullivan, who was sentenced to eight months in jail this year for his wild spree of cyberchaos.

British Gas – even with tight security, cybercriminals can still find a way in. Over 2000 customers had personal details published online by hackers earlier this year.

JD Wetherspoon – it was recently revealed that a case of hacking led to data theft at the popular pub chain.

Washington State Department of Correction – resulting in the early release of prisoners!

V-Tech – even toymakers aren’t immune. Hackers stole data on 200,000 preschoolers in this sting.

The US Prison Service – the information from 70 million phone calls from inmates went astray, and a lot of it ended up in the hands of journalists.

CIA – Their director  John Brennan discovered hackers had broken into his private email account.

FBI – The CIA hackers also managed to get into a law enforcement portal here.

Donald Trump – Some people might admire their cheek – hackers fed malware into the wannabee US President’s hotel chain and stole all kinds of credit card data.

Patreon – Crowdfunding is big business and don’t the hackers know it. Patreon’s whole database was breached – and made public – by hackers this year.

Ashley Madison – 37 million patrons of the cheater’s website  were mortified to find their data had been exposed. You can only imagine the hackers feeling as if they had the moral high ground here!

Hacking Team – Ironically, this Italian security and surveillance company had its whole network breached and posted online by – yes – hackers.

CVS – The huge US pharmacy chain was hit by hackers who are thought to have got in through its photo-processing website.

TalkTalk – several times, and most famously by teenagers…

T-Mobile – …a similar problem was experienced by TalkTalk’s  fellow telecoms giant…

Carphone Warehouse – …and the attack on this cellphone retailer was UK’s biggest breach of 2015. 2.4million customers had data stolen, including 90,000 cases of encrypted credit card data theft.


… and finally…

someone tried to pay Raspberry Pi to spread malware; very sensibly the Pi’s response to that was a huge cyber-raspberry…

Cybersecurity over the Festive Season: Ten Top Tips

If you’re looking forward to the Christmas holidays, the hackers are too. And while you’re relaxing or on the work from home tick-over roster, they’re rubbing their hands in glee at what is considered a cyber version of open season: there is usually a sharp rise in hacker attacks around Christmas and New Year when there’s a lot going on elsewhere.

Here are a few ideas to help ward off the opportunists this Christmas:

  • Most hacks begin with an email or SMS, with a link or a document that once opened, lets in malware. If you don’t trust something – bin it.
  • Businesses considering an IT refresh in 2016 take notice – it’s a good idea to buy devices that allow you to reinstall the operating system as this is what the miscreants like to target.
  • Passwords – you’ve heard it before and we’ll tell you again – make them complex, keep them secret, change them regularly. If you have very sensitive data, it is well worth ensuring that this is protected on a higher level: not just by the usual username and password method.
  • A hacker might be able to use a USB stick to instal malware. Guard your device and encrypt your hard drive to help deter anyone cheeky enough to make a physical attack.
  • Being tracked is a burden of the modern age, but you can use a browser with a private mode. Again, it isn’t watertight but its scrutiny might not be as focused as that of others.
  • Encryption is great but even this is not watertight any more – try for encryption that is known to be tough, like Advanced Encryption Standard (AES).
  • If you use physical, USB recovery keys, lock them up somewhere safe and certainly never clip tem to your key-ring!
  • There’s no end to the “inventive” ways a hacker can upload their grubby codes – as several big brands and areas of the public sector will tell you. Be aware that they can insert code into web forms and embedded adverts.
  • As we said earlier, the hackers are constantly developing ways of getting into anything to spread chaos or steal data. So update your virus checker and operating system on a regular basis – do this before checking emails or visiting any kind of financial website.
  • If in doubt about anything regarding cybersecurity – ask the experts. We are here to help and we would rather arrest a problem in its tracks than see you try something that doesn’t work and have to give you that bad news that you have lost your data – or worse.


Savvy Security for Smartphone Addicts

Smartphones – they’re like part of the human body, aren’t they? Part everyday communication tool, part business asset, part entertainment centre, part comfort blanket,  they’ve become so ubiquitous as to be indispensable.

But you have to unplug yourself, put it down and leave it alone sometimes… and that’s where your phone or tablet can be lost or stolen, any old random can gain access to your personal and business data, and the problems can start. Did you know that technically, if you leave your smartphone unattended and unlocked, it’s a breach of data security laws if someone gets in – on their part and on yours?

The easiest way to deter thieves (and general nosey-parkers) is to set a lock operated by a PIN, password or fingerprint scanner.

Device-specific locking mechanisms can be set up relatively easily with a timeout period, pattern and code to suit your needs. Here are the inroads:

  • On an iPhone: Go to Settings > General > Passcode Lock.
  • On Android: Go to Settings > Location & Security > Set up Screen Lock. Timeout setup can be arranged by going to Settings then Display.
  • On a BlackBerry: Go to Options > Security Options > General Settings > Password.
  • On a Windows Phone7: Go to Settings then Lock & Wallpaper and take it from there.

A word about letting your fingers do the locking…

Fingerprint ID is good but not totally foolproof. It isn’t proven that fingerprints are totally unique and it’s believed that family members can share aspects of particular patterns and combinations (we personally know cases of a mother and son, and of fraternal twins, who can open the same iPad fingerprint scanner). As we get older, too, the skin of our fingerprints loses elasticity and the patterns become harder to identify – in extreme cases this can erase the fingerprints totally.

And be aware that if you use a join-the-dots swipe pattern to lock your phone, a very determined thief may be able to trace the pattern by smudges your finger leaves on the screen when you use that lock method.

IT Security In Your Pocket

If you’re anything like us, your mobile device is so important to you that it’s a part of the business and a part of the family – heck, it’s practically part of the body.

So in that case, security is an unavoidable issue.  Here are a few handy hints to keep your phone safe and protected:

  • If you think you’ve been hacked, seek advice from the network provided as soon as you can.
  • Lock it with a password and keep that password secret: it’s amazing how many people leave their device open or store their passwords on their phones!
  • Password power: a strong password is an asset so take a look at our post for some advice on setting the best password.
  • Take updates when they are offered: most phone and tablet manufacturers regularly circulate these and they invariably involve security updates.
  • Apps from people or sources you don’t know or trust can be dangerous – so be careful what you download. This includes links from banks too.
  • Unsecured public wi-fi, such as  that offered by McDonalds and other cafes, is great for casual surfing but not for anything that would involve your email or financial details.
  • Don’t shop over the internet on a public network on your device either: even if the providers say it’s secure, the hackers are always one step ahead.