Comms Cabinet Tidy Up

Comms Cabinet Tidy Up

Before and After pictures of a comms cabinet at a customer site which was recently worked on by one of our engineers. Safe to say the customer was very pleased with the result.

Nimbus are on hand to offer help in respect of getting your comms cabinet and general IT Infrastructure in shape and optimized to meet your business requirements.

Contact us on: 028 900 800 30  or Email:

Job Vacancy: PA to the Managing Director:

Job Description

Main duties, tasks and responsibilities (not exhaustive)

• Director Support: Reactively supporting and assisting Director with day to day matters arising as required. Producing reports for Director. Supporting Director with supply and maintenance of business services such as company credit cards / business insurance cover / mobile phone contracts / utility suppliers etc. Supporting Director with continual improvement of internal systems and processes. Communications with all staff to share updates / requests / cascade information from Director. Organising and booking business travel arrangements and accommodation

• Meeting Co-ordination and Client Liaison: Organising internal and external meetings, communicating with all relevant parties, producing meeting agendas, taking minutes and carrying out follow up actions as required. Booking catering and organising refreshments as relevant.

• Human Resources: Administering and recording all internal HR matters including annual leave, sickness, complaints and disciplinary matters. Co-ordinating employee reviews and staff training. Administration of recruitment activities and preemployment processes. Organising staff training and Team events and socials. • Building / Office Management and Maintenance: Carrying out scheduled H&S checks and maintaining fire safety testing schedule. Liaising with contractors / third party organisations to co-ordinate repairs / maintenance / improvement works to office premises. Maintaining stocks of office supplies and equipment.

• Accounts / Finance: Liaising with Accounts Officer to update on changes to customer accounts and feed back relevant financial information.

• General Administrative: General day to day tasks including word-processing, preparing printed documents, scanning etc. Opening mail and actioning / distributing as appropriate.

• Personal Attributes: In all above tasks, maintaining confidentiality and discretion to the highest degree, and a courteous approach to clients and staff at all times. Flexibility is key within this role and the postholder will be expected to perform different tasks as necessitated by their changing role within Nimbus as a growing and evolving organisation.

For further details contact:

Three mistakes businesses make when outsourcing IT support

Three mistakes businesses make when outsourcing IT support

Hiring IT support can be a huge benefit for your business. Not only does it allow you to make vital business savings, but it can allow you to get the best from your computer network, allowing you to be more productive.

However, when seeking out IT support from outsourcing providers, a number of mistakes can be made. Here are the most common mistakes businesses make, and how you can avoid them for a better relationship and more fulfilling service.

1. Going for the cheapest option

In today’s gig economy there are numerous options available when it comes to finding IT support. However, not all are equal. The cheapest options aren’t good for your business. Sometimes they’re foreign based and have different cultures, expectations and resources than you need.

In addition, the cheapest options often mean they aren’t investing in their own infrastructure. They might also not be so tight on EU or UK legislation when it comes to security and data privacy. You should always be looking for a competitive price, but one that offers you a quality service as well.

2. Thinking IT support is a short-term service

There are numerous businesses who contact IT support providers looking for a quick, short contract, break-fix or PAYG. However, this can often leave your business losing out technically and opening up your company to risk.

Long-term contracts offer stability for your IT network that enable it to continuously improve and not feel like a hotchpotch of systems melded together. In addition, one long-term vendor can offer you better security assurances than lots of different vendors who might not know that other vendors haven’t implemented important security updates.

3. Not having a manager

While you’re outsourcing your IT needs, it doesn’t mean you can’t have an IT manager. You still need someone in your business who manages the computer networks, making decisions and giving direction to your IT support team. This person can also give feedback to the other leaders in the business.

Having an IT manager also allows for better, more consistent communications as everything will go through them. It also helps the IT support vendor as they have a single person to contact, with whom they can build a long-term, successful working relationship that will only benefit your computer network.

Talk your I.T. needs over with Nimbus CS

Cyber threats: how your business might be at risk

Businesses used to be able to easily understand the threats they faced: financial liquidity, changing customer behaviour, and staff morale. However, while these threats will always exist – and still pose a significant threat to businesses to this day – cyber threats are now a factor for virtually every business. The two attacks described in this article, DoS and Phishing, are not new: however, they are still important to understand and mitigate against for all businesses.

Denial of Service attack (DoS)

A denial of service attack, or a distributed denial of service attack, is the name given to an attack which overwhelms a computer system. The most common form of DoS attack is through a coordinated effort to disrupt the service of a website, by instructing automated bots – sometimes referred to as bot nets – to target web hosting servers with repeated requests. This leads to the hosting servers becoming overwhelmed and failing for all users who are legitimately trying to access the website.

The threat of these attacks can best be mitigated through a dedicated IT support team which can respond in real time to DoS attacks. IT professionals can blacklist the threat coordinators and bots from accessing the servers, limiting any impact on the website.

Phishing Attacks

Phishing attacks are among the most common cyber attacks businesses face in the modern age. They work for one very simple reason: they rely on human beings as the last line of defence.

Cyber Security

In a phishing attack, a cybercriminal will attempt to fraudulently gain access to a computer system using social engineering or electronic manipulation. One particularly common method involves a criminal spoofing an email address, making it appear legitimate to the recipient. The email would usually include a link to a website which prompts the receiver to enter sensitive data, such as their username and password. Once the criminal has the sensitive data, the damage they can cause to a business system is immeasurable.

The best preventative against these attacks is education around cyber threats and how email spoofing works. This can be delivered most effectively through a dedicated IT support team, who will have the knowledge to share with colleagues best practices and what steps to take if they suspect a phishing attack is taking place.

Nimbus CS

Common misconceptions about cybercrime

Common misconceptions about cybercrime

Cybercrime is a big part of business. However, business leaders of companies of all sizes make many assumptions about cybercrime. Here are some of the biggest misconceptions about cybercrime. If you know the true extent of the threat, you’ll be better at defending your business.

1. Knowing a threat exists doesn’t protect you

Employees know that emails from unknown sources aren’t trustworthy. In addition, they know that they shouldn’t investigate the links in the emails to see where they lead, but that doesn’t stop 78% of employees from clicking on them.

Just because you know a threat exists, it doesn’t mean your business is protected. You need to actively pursue ways to enforce your cyber security that will protect your computer networks and servers. For instance, your business should install firewalls, anti-virus software and continuously educate staff to follow proper network security.

2. Protecting yourself is all you need to do

While protecting your computer networks is a good start, that doesn’t mean your computer networks are defended. Third parties that you work with, who might handle your data, can be a weak link, and this is where cyber criminals sometimes gain access. This was the case with Universal Music Group when a contractor left an Apache Airflow server open to attack.

Ensure when you speak to third parties, that they have the right protection in place. This should include email encryption, firewalls and other measures to protect sensitive information you both have access to.

3. Cybercriminals are really clever people

The truth is that the tools to commit cybercrime and infect your computer networks are readily available online. Those wanting to attack your business can buy the tools for very little, if anything. Plus, many of the most successful cybersecurity threats to your business are really simple, they just require a file attaching or link inserting into an email. 

You should also remember that cybercriminals can be anyone. While there’s a lot of news about cybercriminals in Africa and Asia, anyone, even those in your own business, could be a cybercriminal. A study by IBM found 60% of cyber attacks are inside jobs. So, you’ve got to be vigilant. 

Restrict access to data, servers and IT networks to anyone who doesn’t need access. Limiting access can be one of your strongest defences.

4. You’ll never be a target

All companies, of all sizes, have been attacked in recent years. Sony had a Denial of Service attack that prevented players to access online game areas, Facebook had a breach where information for 50 million users was stolen and NASA had employee information taken by cybercriminals. 

Your business has a lot of value in it and criminals can, and will, target you at any time.

Always assume that you’re a target and adjust your cyber security initiatives with this philosophy in mind. You’ll be better prepared for what may come, than if you believe there’s no danger.

Whatever your business, cyber security is a major part of your operations. If you’re not sure about how you should protect your business’ computer network, you should outsource your IT needs. Professionals in IT support companies are experts in offering computer security services and can ensure you’re less at risk from cybercriminals.

Cyber-security threats to be aware of in 2019

All business owners know that IT and digital solutions play a key role in what they do now. From better communication, to email or video calls, to more sales through eCommerce stores, being online is essential for modern businesses. Unfortunately, all business owners will also know about cyber-crime and how vital staying safe online is. Data breaches or infected networks can cost huge amounts of money to fix and really harm your company’s reputation.

With this in mind, it is important to place great importance on your cyber-security arrangements. As we head into 2019, it seems likely that cyber-attacks will continue to happen and with increasing regularity. Although you may know about the most common ones like malware, here are some others to keep in mind for 2019.

Cryptocurrency hijacking

We are all aware of cryptocurrencies like Bitcoin. However, malicious individuals use cryptocurrency for their own gain. One scam is to infect networked computers with software that then gets them mining for cryptocurrency. It uses the resources of the computers it infects to do this which slows them down and harms your productivity. It also allows the criminals to make money from mining these digital coins without it costing them anything. With the increasing difficulty of mining and the falling value of cryptos, hopefully this is one attack that may decline. No doubt the hackers will think up another use for your stolen cpu cycles.


They’ve been around for years, but this is something not many business owners will have heard of but may be big news in 2019. It sees hackers take control over a powerful network of computers without the user’s knowledge. They then use this massive network of machines to perform DDoS attacks, brute force attacks and steal sensitive data.


OK, this is not a new issue for 2019 but it is still set to be the major news in cyber-security. This sees hackers gain access to your servers or network of computers to lock all end-users out of them. They will only unlock the machines once you have paid a huge ransom. Naturally, this is very bad for your profits and also all the working time lost while the issue is being resolved. The sheer profitability of this kind of attack for cyber-criminals means it will continue to cause problems for years to come.

Let Nimbus CS keep you safe

The real problem for most businesses when it comes to cyber-security is having the time and expertise to keep it as tight as possible. This is especially true in large corporations where one vulnerable machine out of hundreds could be the way hackers get in. We offer comprehensive cyber-security services to help review your current IT set-up and help manage any improvements needed. Contact us today to find out more.

Look No Further. Get Started Today.

Get in Touch