
Talking all things IT and cyber security
Our blog includes informative articles on cyber security and IT from the CloudTech24 Team
Rated 4.9-Stars on Google in 247 Reviews
Rated 5-Stars on Trustpilot in 4 Reviews
View our recent blogs
We’re passionate about helping your business operate smoothly and securely. Our blog covers the latest cybersecurity threats, IT support tips, and technology best practices, keeping you up to date with practical insights and guidance.

OneDrive vs. SharePoint: A comparison
Microsoft 365 gives users access to a handful of great cloud services, but organisations are often confused about the differences between OneDrive and SharePoint. The platforms do have some strong similarities. Both let you store, sync, and share files, so organisations often assume they can be used interchangeably. However, the two services actually serve very…
Read more

What is brute force?
Brute-force attacks remain one of the simplest yet most effective techniques used by cybercriminals today. Attackers continue to exploit weak passwords, reused credentials, and poorly protected login systems. Understanding what a brute-force attack is and how to stop one is essential for any organisation looking to reduce the likelihood of a data breach or cyber…
Read more

Picking a Workspace plan: Starter vs Standard vs Plus vs Enterprise
Designed for the way modern teams work, Google Workspace is fast, flexible, and collaborative. It brings your emails, files, and shared documents into one suite. But with multiple plans available, each offering different features and access, the challenge is knowing which one best matches your organisation’s needs, where you are currently and where you could…
Read more

Is Google Workspace free?
Google Workspace is one of the most widely used business productivity suites in the world. The big question is, is it free? While Google does offer limited free options for individuals and small teams, most business features require a paid plan. Ultimately, what matters is what you and your business want out of Google Workspace.…
Read more

Handling IT in a school – what you need to know
From their management systems to the use of iPads and computers, schools rely on technology every single day. In fact, schools rely on it so much that if their technology and systems fail, their entire daily operations are disrupted to the point where schools may even be forced to close. For instance, Budehaven Community School…
Read more

NEW: Funding to help small businesses tackle cyber threats
Small and medium-sized enterprises (SMEs) in the UK are constantly facing risks from cyber threats and IT concerns. 43% of UK businesses experienced a cyber-attack in the past year. Trying to grow your business is hard enough for these companies without the damage a cyberattack or data breach could cause. That’s why Innovate UK is…
Read more

Google direct vs reseller for Workspace
Should businesses get Google Workspace straight from Google or through a reseller? Well, to decide, you have to take into account a number of factors that will ultimately determine which option you choose. In this blog, we’ll cover the differences between buying Workspace directly and from a reseller, when to choose direct, when to choose…
Read more

Do you need a Disaster Recovery Plan?
One common myth is that “some businesses are too small to be targeted by a cyberattack”. That couldn’t be further from the truth. 43% of cyber attacks target SMEs, and 60% of those companies go out of business within six months of an attack. No matter your company’s size, location, or industry, a cyber attack…
Read more

How to manage IT support tickets in a big company
Managing IT support within a large company isn’t easy. Expect hundreds or even thousands of tickets to be sent every day, ranging from simple fixes like password resets to data-threatening critical system issues. It’s crucial to keep everything organised; otherwise, support will become overwhelmed, unorganised, and inefficient. Because of this, your company needs an IT…
Read more

AI-powered phishing: A new threat in email security
Artificial intelligence (AI) is an exciting technology that has the power to do things we never thought possible. Its rapid growth in such a short time suggests an even more promising future for technology. However, as AI improves, its potential for harm in the wrong hands also increases. The National Cyber Security Centre states AI…
Read more

Here’s why you need an Internet policy for staff
You use the internet at work every day. Whether that be for research or writing emails, it’s essential to what you do. This is why internet policies exist. Internet polices are essentially a set of rules for your workplace, helping you and your team understand what’s okay (and what’s not) on the company network. Not…
Read more

Why people are the weakest link in cybersecurity?
Why are people the weakest link in cybersecurity? New technology brings new cyber threats, and what follows is a tightening of cybersecurity measures to keep your data safe. But despite stronger security systems and advances in technology, there is still a lack of guidance around human behaviours in cybersecurity. This post looks at why people…
Read more