Blog
Help and ramblings from the Cheeky Munkey team
Cyber Attack
What is an IT security risk assessment and why is it important?Every business in today’s modern world depends on advanced technology for day-to-day operations. Although businesses rely on IT systems more than ever, cybersecurity still gets…
read moreIT Support
How to select the right IT procurement providerIT procurement refers to the process in which technology is acquired to assist with business operations. Some organisations may choose to invest in external IT…
read moreTelephony
The top 10 best VoIP phone systems for small businessesFinding the right VoIP phone system for your business isn’t easy, especially with so many different providers and systems to choose from. This hassle-free telecom…
read moreIT Support
Onsite Vs Remote IT SupportIT support is essential to all businesses, ensuring the smooth running of all digital business functions. When it comes to IT support, businesses have the…
read moreCloud Services
The green cloud: how sustainable is cloud computing?Cloud computing has become an integral part of our digital world, offering convenience, scalability and cost-efficiency. However, as our focus on sustainability grows, it is…
read moreCloud Services
How does cloud computing work?In the era of digital transformation, understanding the inner workings of cloud computing has become crucial. Cloud computing, a cornerstone of modern IT, revolutionises how…
read moreIT Support
Disaster Recovery vs Business Continuity: 5 Key DifferencesUnderstanding the distinctions between disaster recovery (DR) and business continuity (BC) is vital. While often used interchangeably, these two strategies have distinct focuses and goals….
read moreSecurity
AI: cybersecurity friend or foe?Scott Brooks, Technical Strategist at IT solutions provider Cheeky Munkey, shares his expertise. As artificial intelligence (AI) rapidly becomes more widely used, people are questioning…
read moreIT Services
What are the advantages of server virtualisation services?What is server virtualisation? Server virtualization is the process of restructuring a physical, single server into multiple isolated spaces using software applications. Single servers can…
read moreBackup
What is endpoint protection?What is endpoint security? Endpoint protection, or endpoint security, is the practice of securing endpoints (or entry points) of an end-users device from being exploited…
read more