2024-10-22

Your Guide to Navigating the Copper Shutdown

The Copper Shut Down Guide is a quick and easy visual tool designed to help you understand your options based on how you use your copper line/PSTN services. This guide provides clear and concise explanations, allowing you to see your choices at a glance. Throughout the entire process, Dunedin IT will be there to assist you every step of the way, ensuring a smooth and seamless transition.
2023-12-01

Navigating from 2023 to 2024: Insights and Aspirations of Our Team

We spoke with the team about the technology insights and their aspirations moving into the new year of 2024.
2023-06-13

Cyber Security Breakfast Briefing

Highlights from Our Breakfast Briefing In today’s interconnected world, where technology plays a critical role in every aspect of our lives, the importance of cyber security […]
2023-01-26

PSTN Switch Off – Is your business ready?

2023 has brought us ever closer to the shutdown of the UK’s PSTN network. Already, many exchanges no longer accept new orders for PSTN services and […]
2022-11-30

eSignatures: A Complete Guide for SMBs

What Are eSignatures?​ We believe eSignatures are crucial for any SMB looking to stay competitive.
2022-11-24

What is Double Extortion Ransomware?

One of the most dangerous forms of cyber attacks is ransomware. Any organisation, regardless of size or industry, can be affected by it. WannaCry ransom attacks, […]
2022-10-28

Top 9 Microsoft Azure Services for Businesses in 2022

Take advantage of the cost savings, security, and flexibility of the cloud by understanding some of the most commonly used Azure services.
2022-10-17

Power BI: Empower Your Business with Data Visualisation

What is Power BI? How can businesses use Power BI to make better decisions? What are the top benefits of this platform?
2022-09-27

Types of Malware and How to Protect your Business

Understanding the many types of malware is key to keeping your business secure. Do you know the difference between a virus, worm and botnet? Although there are over 1 billion malware programs infecting endpoints, there are several common malware types.