The Danes, 2 Reindeer Court, Potterspury, NN12 7FB

OPENING TIMES: Mon-Fri: 8:30 to 18:00

Your Security is our primary focus

Google Apps brings simplicity to Enterprise Mobility Management

Enterprise software can often be complex and difficult to navigate. Unlike consumer software which has gravitated towards simplicity. Google, therefore believes that, Google Apps Admins should have an Enterprise Mobility Management (EMM) solution that is simple to operate, which delivering enterprise grade security.

In order to make it easier for Google Apps Admins to set up and define mobile management policies, Google has launched three new features:

Mobile Management can now be set up with one click

By simply clicking MANAGE NOW on the Admin console landing page, admins can set up Mobile Management with a predefined set of security policies.

manage-now-01

Android for Work can now be set up with one click

No longer must admins complete fifteen steps spread across different pages in the admin console, cutting and pasting security tokens, to set up Android for Work. With a single click, admins can begin managing and whitelisting mobile apps for their Android for Work devices in their domain.

 

Device management settings are now easier to find and use

With the continued evolution of device management and application management capabilities, an ever-growing list of policy settings on a single page has become unwieldy for admins. That is why Google has redesigned the device management experience by logically categorising all device policy settings, making them easier to find and use

 

Enterprise mobile devices can now be managed from anywhere, anytime

With the latest version of Google Admin App, mobile device management capabilities are now at admins’ fingertips. Google Admins don’t need to reach their desk to handle a device security breach. They can view the list of all managed devices and take remote actions like account wipe or even block user devices right from our Admin app anywhere, anytime.

Google Workspace Apps

Check out our latest Tech Tip Videos

Choosing the Best IT Hardware for your Business

DEC 2024

Cloud Telephony vs. VoIP – which is best for your business?

Nov 2024

What does your email signature give away about you?

Oct 2024

Cyber security isn’t just a problem for IT

Sept 2024

It’s time to say goodbye to Windows 10

July 2024

Cyber attacks are more common than you think

June 2024

A cyber attack will probably start with an email

May 2024

Here’s how to save time, money, and stress on your IT

April 2024

Encryption: the difference between chaos and calm

March 2024

Watch out for that digital storm!

Feb 2024

You’re not still handling your own IT, are you?

Jan 2024

Your 2024 cyber security considerations

Dec 2023

Are you neglecting your home office security?

Nov 2023

Could AI be key to growing your business?

Oct 2023

Are you paying for productivity apps you’re not using?

Sept 2023

The Metaverse explained: How it could affect your business

Aug 2023

Human error is your biggest cyber security risk

July 2023

Back up your data and save your business

June 2023

How to plan a big IT project

May 2023

All businesses should adopt MFA

April 2023

Discuss these things with your technology partner

March 2023

3 ways to protect your business email

Feb 2023

3 steps to better cloud security

Jan 2023

3 tech trends to look out for in 2023

Dec 2022

Boost your business’s Wi-Fi speed

Nov 2022

How much do you really know about phishing scams?

Sept 2022

The perfect video call setup

August 2022

How to stop Teams opening when you startup Windows 11

July 2022

Let’s Talk Password Managers

June 2022

Password Manager

May 2022

Microsoft Lists for Team Efficiency

April 2022

Keep your webcam secure!

March 2022

The Real Helpdesk Test

Feb 2022

Would your Staff Click That Link?

Jan 2022

Accurate IT Hardware Budgeting

December 2021

Stop Apps from Loading at Start-Up

Nov 2021

Manage Your Chrome Passwords

Oct 2021

What Is Multi-Factor Authentication

Sept 2021

So you clicked a bad link on your phone

Aug 2021

The Top 5 Phishing Scams and How to Protect Yourself

May 2021

How To Improve Your Video Call Quality

April 2021

Terrible Domino Password Effect you Need to Check

March 2021

New Laptops Slowed by Bloatware

Feb 2021

Your Cloud Works Cyber Security Tips

Jan 2021

Upgrade You Business to a VoIP Phone System

Dec 2020

Secure Business Password Management

Nov 2020

Awareness – Fake Covid-19 Online Scams

Oct 2020

End of Lockdown IT Security

Sept 2020

Collaboration with Microsoft Teams

Aug 2020

Connecting Remotely with MS SharePoint

July 2020

Microsoft Planner In Teams

June 2020

Stop Ransomware Early

May 2020

The Worldwide Chip Shortage

April 2020

Take the 60 Minute Security Test

March 2020

Collaboration with Microsoft Teams

Feb 2020

Connecting Remotely with MS SharePoint

Jan 2020

Microsoft Project

Episode # 67

Your Biggest Cyber Security Risk

Episode # 66

Your Business Continuity Plan

Episode # 65

Sharepoint Document Management

Episode # 64

Spoofed Public Wi-Fi

Episode # 63

To-Do is Making Your Life Easier

Episode # 62

Access Database Management

Episode # 61

Never Too Small To Be Hacked

Episode # 60

MyAnalytics 365

Episode # 59

Secure Password Manager

Episode # 58

The Paperless Office and You

Episode # 57

Microsoft Whiteboard for Collaboration

Episode # 56

Moving your Business to the Cloud

Episode # 55

Teams Just Keeps Growing

Episode # 54

Delete Your Data Remotely

Episode # 53

Microsoft Editor

Episode # 52

Making Collaboration Easier

Episode # 51

Brute force Password Attacks

Episode # 50

How Strong Is Your Firewall?

Episode # 49

Safe Staff Means Safe Business

Episode # 48

OneNote for Translation

Episode # 47

Training Your WFH Staff

Episode # 46

Microsoft 365 Mobile Apps

Episode # 45

3 Values of Password Managers

Episode # 44

Powerpoint with Audio and Voice

Episode # 43

Has your email been compromised?

Episode # 42

Mileage Tracking with O365

Episode # 41

Smart Lookup for Excel

Episode # 40

Be Aware of these Malware Traps

Episode # 39

Sensitive Data on Lost Mobiles

Episode # 38

A Business Tech Upgrade

Episode # 37

How Strong is your Password?

Episode # 36

A Word About MS Word

Episode # 35

VPNs for Secure Home Working

Episode # 34

The Power of 2FA Security

Episode # 33

Getting the Most From Microsoft 365

Episode # 32

The 111 rule of Email Security

Episode # 31

Is Old Tech Slowing you Down?

Episode # 30

Secure Data For Home Workers

Episode # 29

Data Security WFH

Episode # 28

Lost & Stolen Laptops

Episode # 27

Review Your Backups

Episode # 26

Proactive Support

Episode # 25

Two-Factor Authentication

Episode # 24