Blog

Help and ramblings from the Cheeky Munkey team

Telephony

4 ways cloud telephony can improve the customer experience

There are many elements that need to work together to deliver an exceptional customer experience; with communication being one of the most important. Most businesses…

read more

Cyber Attack

FAQ’s for SMB Cybersecurity

In this blog we will answer some of the FAQ’s related to SMB cybersecurity. In the past couple of years hybrid working has taken over….

read more

Encryption

Identity Access Management (IAM)

In order for employees to work productively, they must have access to data required to do their job. That said, it is also possible for…

read more

IT Support

Benefits and challenges of outsourcing IT services

Many businesses have decided to outsource their  IT service  requirements. This is down to a number of  factors, including the current digital skills shortage. Even…

read more

Cyber Attack

How Employees can reduce cybersecurity risk

Businesses across all industries are constantly at risk of falling victim to a cyberattack. In order to reduce this risk, it is essential that businesses…

read more

IT Support

Azure Virtual Desktop (AVD) vs. Windows 365: Which is right for your business?

There are numerous technologies that can support businesses when moving to a hybrid working model. Microsoft has two technologies designed to enable effective hybrid work…

read more

IT Support

How businesses can move to a paperless future

In the past, all businesses relied on paper processes and printing for all business operations. As businesses have piloted new technologies, they have also reduced…

read more

IT Support

How to make the most of the modern workplace

The concept of an ideal workplace has constantly evolved; from the Action Offices of the ‘60s to the rise of office cubicles and the introduction…

read more

Cyber Attack

The role passwords play in a world of cybercrime

For businesses, one weak password can be the cause of a major cybersecurity incident. For this reason, businesses should take measures to ensure they are…

read more

IT Support

What is Shadow IT and how can businesses combat it?

Employees are always looking for ways to work more efficiently and effectively. This may include anything from installing an application to check for grammar and…

read more