Recent Posts by Keydata Solutions

Office 365 or Exchange ?

Which is best? Sometime we recommend Exchange, sometimes we recommend Office 365 or Exchange Online. It is best to discuss with us your requirements and then we can advise you of the most appropriate solution for you. The advantage of an on-premises Exchange, is that you are in possession of all your emails on site…
View Full Article

Add Email Account to Microsoft Outlook 2010

This article provides a step-by-step tutorial for how to add an email account to Microsoft Outlook 2010 to connect to an Internet Message Access Protocol (IMAP4) server.  Step 1 – Open Microsoft Outlook 2010 on your computer and choose the ‘File’ tab from the top. Step 2 – From the File menu, select ‘Info’ from…
View Full Article

iOS or Android – What’s right for you?

First things first, what is iOS and Android? – These are platforms which run on hardware such as smartphones and tablets. Apple is the company who develops iOS and Google are the company who develops Android. It is the operating system of the device, once you have an operating system you are able to download new content such…
View Full Article

Beware of Ransomware

Ransomware is a strain of malware (malicious software) that encrypts or locks all of the files on your computer or server and then demands a ransom payment to unlock your files.  Now that a real IT headache. There are many forms; Locky, Cryptolocker, Teslacrypt and Cryptowall, but as cyber criminals are getting more and more sophisticated, more are on their…
View Full Article

Sister Website Launched

Hello everyone, we have just launched our new RESPONSIVE sister site for IT Support Services based in and around Leeds and Yorkshire. This can be viewed by clicking the following URL:
View Full Article

Be Protected with AVG

It's essential to have a good Anti-Virus product We have tested many anti-virus solutions. All software packages have a number of things to consider. The first being how well the package can scan for viruses and keep you protected as/when the threat makes it to your computer. The second is its ability to do its…
View Full Article

Recent Comments by Keydata Solutions

No comments by Keydata Solutions yet.