Get a Quote

CMIT Indy BLOG

PowerPoint: Raising the game with audio

PowerPoint: Raising the game with audio

Love it or hate it, PowerPoint is the most useful way to influence colleagues during a meeting or video call. Because it visually supports...

Continue Reading >
The data security equivalent of leaving your windows open

The data security equivalent of leaving your windows open

We all take great care to keep our homes secure. Yet some business owners and managers don’t have the same attitude towards their business’s...

Continue Reading >
Crisis: Your office is on fire

Crisis: Your office is on fire

Read and Download our new guide Crisis: Your office is on fire. This is something none of us wants to experience. But it does...

Continue Reading >
Have your emails been compromised?

Have your emails been compromised?

There are lots of different ways to communicate and collaborate. But most businesses still rely heavily on email. And that’s why it’s so popular...

Continue Reading >
MileIQ: An automatic mileage tracker

MileIQ: An automatic mileage tracker

Do your team forget to track their mileage when driving for business? Tracking mileage can be a real pain – especially if you’re out...

Continue Reading >
Excel: Making productivity easier with ‘Smart Lookup’

Excel: Making productivity easier with ‘Smart Lookup’

Excel isn’t just for crunching numbers. It’s got a host of very clever features to make your life easier and work more productive. If...

Continue Reading >
Keep a lookout for these malware traps

Keep a lookout for these malware traps

We’ve been warning businesses for years that their email is the most likely place for a cyber-criminal to try to break into their IT...

Continue Reading >
Millions of smart phones are lost each year

Millions of smart phones are lost each year

Did you know that for every 100 devices your business buys, up to 5 of them will be lost or stolen? That’s the average...

Continue Reading >
Cyber-crime: Your business’s 5 step plan to prepare and protect

Cyber-crime: Your business’s 5 step plan to prepare and protect

Read and Download our new guide Cyber-crime: Your business’s 5 step plan to prepare and protect. Two years ago, two-thirds of all organizations reported...

Continue Reading >
How to spot a ransomware attack before proper damage is done

How to spot a ransomware attack before proper damage is done

One of the most terrifying things that can happen to your business is a ransomware attack. This is where hackers take control of your...

Continue Reading >