Category Archives: Information

COVID-19

Keydata Solutions Limited is fully committed to delivering a service to our clients and dealing with all matters throughout the developing COVID-19 situation. Our technology and procedures support working from home. We also provide IT Support in the Leeds and surrounding areas. Following updated UK Government guidance on social distancing, we have now made arrangements…
View Full Article

Secure FTP Upload

Recently a client of ours emailed us saying they had undertaken a security audit and the old method of uploading client data used standard FTP was not secure. They now needed to upgrade those systems to use Secure FTP so that client data uploaded to the internet was encrypted during transmission. This was an extract…
View Full Article

Office 365 or Exchange ?

Which is best? Sometime we recommend Exchange, sometimes we recommend Office 365 or Exchange Online. It is best to discuss with us your requirements and then we can advise you of the most appropriate solution for you. The advantage of an on-premises Exchange, is that you are in possession of all your emails on site…
View Full Article

Add Email Account to Microsoft Outlook 2010

This article provides a step-by-step tutorial for how to add an email account to Microsoft Outlook 2010 to connect to an Internet Message Access Protocol (IMAP4) server.  Step 1 – Open Microsoft Outlook 2010 on your computer and choose the ‘File’ tab from the top. Step 2 – From the File menu, select ‘Info’ from…
View Full Article

iOS or Android – What’s right for you?

First things first, what is iOS and Android? – These are platforms which run on hardware such as smartphones and tablets. Apple is the company who develops iOS and Google are the company who develops Android. It is the operating system of the device, once you have an operating system you are able to download new content such…
View Full Article

Beware of Ransomware

Ransomware is a strain of malware (malicious software) that encrypts or locks all of the files on your computer or server and then demands a ransom payment to unlock your files.  Now that a real IT headache. There are many forms; Locky, Cryptolocker, Teslacrypt and Cryptowall, but as cyber criminals are getting more and more sophisticated, more are on their…
View Full Article