• Get Help

    Please enter the 6-digit code provided by your support representative:


    You will be prompted by your browser to download the file Support-LogMeInRescue.exe.

    Your Security
    • Remote sessions are sometimes recorded for traceability and training purposes.

    • You are in full control of your computer at all times.

    • You always have overriding control of your mouse and keyboard, and you can end the screen-sharing session at any time.

    Use of EasylifeIT™ Support Connection

    EasylifeIT Remote Support is for use by established clients only

  • Call us on 0800 043 9186
    • 22 Orton Enterprise Centre Bakewell Road, Peterborough. PE2 6XU

      Sales or support

      0800 043 9186
      01733 715930

      This email address is being protected from spambots. You need JavaScript enabled to view it.
      This email address is being protected from spambots. You need JavaScript enabled to view it.

    • Suite 2, Level 1, London house, 68-72 London street, Norwich, NR2 1JT.

      Sales or support

      0800 043 9186
      01603 562996

      This email address is being protected from spambots. You need JavaScript enabled to view it.
      This email address is being protected from spambots. You need JavaScript enabled to view it.

    • 22 Orton Enterprise Centre Bakewell Road, Peterborough. PE2 6XU

      Sales or support

      0800 043 9186
      01733 715930

      This email address is being protected from spambots. You need JavaScript enabled to view it.
      This email address is being protected from spambots. You need JavaScript enabled to view it.

  • IT Security and Cyber Essentials

    IT Security and Cyber Essentials

    YourITSecurity

    The use of internet and email has brought enormous benefits, but also considerable risk. Every day there are cyber-attacks against companies just like yours. We are an accredited Cyber Essentials Consultancy and can help keep you secure

    Read more

  • Expert IT Management, Support and Crisis Prevention

    Expert IT Management, Support and Crisis Prevention

    EasylifeIT

    Few things are so disruptive to your operations as when the IT misbehaves, and a poorly maintained and managed system is much more likely to go wrong. Delegate this responsibility to easylifeIT™ and enjoy much improved reliability and peace of mind

    Read more

  • IT Strategy and Consultancy

    IT Strategy and Consultancy

    YourITDirector

    A bewildering array of choices; unfathomable jargon. EasylifeIT™ will talk to you in plain English. We will help you make sense of your options and give you the confidence to make good decisions

    Read more

  • IT Project Preparation and Implementation

    IT Project Preparation and Implementation

    Let us plan, manage and implement the project for you, taking the weight off your shoulders while bringing years of cumulative experience to ensure its success.

    Read more

Strategy and consultancy

Strategy and consultancy
EasylifeIT™ Director
ConceiveIT. A bewildering array of choices; unfathomable jargon. EasylifeIT™ will talk to you in plain English. We will help you make sense of your options and give you the confidence to make good decisions

Read more

Preparation and implementation

Preparation and implementation
EasylifeIT™ Project Manager
ImplementIT. Let us plan, manage and implement the project for you, taking the weight off your shoulders while bringing years of cumulative experience to ensure its success.

Read more

IT SITE MANAGER and support

IT SITE MANAGER and support
EasylifeIT™ Site Manager
ManageIT. Few things are so disruptive to your operations as when the IT misbehaves, and a poorly maintained and managed system is much more likely to go wrong. Delegate this responsibility to easylifeIT™

Read more

IT SECURITY and Cyberessentials

IT SECURITY and Cyberessentials
EasylifeIT™ Security
SecureIT. The use of internet and email has brought enormous benefits, but also considerable risk. Every day there are cyber-attacks against companies just like yours

Read more

  • Two factor authentication – little pain, big gain

    previewThe rise and rise of the cloud

    The use of cloud computing continues to grow rapidly. Packages such as Microsoft Office 365 and Google G Suite are very widely used across businesses of all sizes for a multitude of purposes, including e-mail, file storage and file sharing.

    Legislative requirements are also driving wider adoption of functionally specific software, including cloud accounting to meet HMRC’s ‘Making Tax Digital’ requirements. Many businesses will be familiar with well known packages such as Xero and QuickBooks Online.

    Popular, but also a target

    Whilst cloud computing is flexible, easily scalable and often the most cost-effective solution (especially for small businesses), there are risks, particularly around security. Popular products attract the attention not only of people seeking the benefits, but also the attention of cyber criminals. It is inevitable a proportion of users will not take even the most basic precautions to protect themselves. And with millions of users, this makes them a target.

    The standard method for accessing cloud services is via a username and password. However, given the value of the data contained within businesses’ cloud based systems, this is now widely considered to be a disproportionately weak approach.

    Usernames are typically a person’s e-mail address; these are easy to find out or guess. And because people have so many different passwords nowadays, many resort to things which are easy to remember. Easy to remember, but therefore also easy for password-cracking software to guess. Examples of commonly used passwords are: QWERTY, Password123, Pa$$word123

    People also fall into the trap of using the same password across multiple systems. If one system is hacked, the door is then easily opened to many other accounts. For example, if your personal Facebook password is compromised, and you have used that same password for your work Office 365 account, then that work account becomes an obvious target. It does not take a criminal long via your LinkedIn profile to find out your current place of work, guess your work e-mail address and see if the password you used for Facebook gets you into the company systems.

    Two factor authentication – a big leap forward

    Users are often unaware of readily available tools to manage the potential downsides. Two factor authentication (2FA) is one of these key defence mechanisms. It is very strong layer of protection which can be enabled on most popular cloud software. A practical example would be receiving a unique code to your mobile phone; you need to enter this in addition to your user name and password before accessing cloud services.

    The common objection to 2FA is that it is an inconvenience to users. However, this objection needs to be compared with the significant uplift in security it provides. Consider the inconvenience and potential damage if your company’s cloud services were comprised by a cyber attack which would have been prevented by 2FA. And consider the inconvenience to the criminal who does not have your phone and therefore the code they need to attempt the hack in the first place.

    The UK Government recognises the value of 2FA. The National Cyber Security Centre (NCSC) has published advice for business on its website:

    https://www.ncsc.gov.uk/guidance/multi-factor-authentication-online-services

    In short, if 2FA is available and feasible to implement, the pros far outweigh the cons.

    Good advice for work and home

    2FA is one of the biggest single measures you can take to protect your business systems, but the advice is equally applicable to the services so many of us use in our personal lives. Facebook, Amazon and LinkedIn to name a handful of the most popular ones all support 2FA. The NCSC has also published information for individuals and families on this topic:

    https://www.ncsc.gov.uk/guidance/setting-two-factor-authentication-2fa

    JAMES ALLISON

    James AllisonSTRATEGIC IT CONSULTANT. EASYLIFEIT NORWICH
    JAMES IS AN EXPERIENCED AND VERSATILE BUSINESS PROFESSIONAL WHO HAS WORKED ACROSS MULTIPLE SECTORS. HE PROVIDES COMPLEMENTARY SKILLS TO EXECUTIVE TEAMS, ADVISING ACROSS A RANGE OF DISCIPLINES INCLUDING IT STRATEGY, BUSINESS CONTINUITY PLANNING AND IT PROJECT MANAGEMENT

    Read more

  • Windows 7 End of Life Security - IoD EoE Ambassador Report

    After 14th January 2020, Microsoft will no longer be providing security or critical updates for PCs running Windows 7. Although this is nearly a year away, businesses should be thinking about this now as it may involve a significant level of expenditure, particularly if they use the opportunity to invest in new PCs for their staff.

    Windows 7 was a very popular operating system; its successor – Windows 8 – was not popular and was not widely adopted. Many businesses carried on using Windows 7 longer than was anticipated as a result. Microsoft’s most recent operating system – Windows 10 - has been around for about 3 years and has proved popular and has been widely adopted. However, businesses that have not upgraded their hardware for a while may find they are still using Windows 7.

    Read more

  • James Allison appointed as IoD Ambassador for Tech in Norfolk

    previewThe Institute of Directors (IoD) has appointed EasylifeIT™‘s James Allison as Ambassador in IT, Digital and Technology, representing and supporting the views of the Norfolk business community.  IoD Ambassadors are experts in their industries and play a vital role in the development of the IoD regions.

    Read more

  • EASYLIFEIT™ CYBER SECURITY AUDIT

    James Allison

     TOO MUCH TO DO, TOO LITTLE TIME

    It’s hard work running an SME.  Limited time.  Limited resources.  Ever growing burden of regulation.  It can be difficult to know what to prioritise.

    One useful tool for setting priorities is to evaluate risk using a simple five step approach:

    • Identify all possible risks facing your business
    • Rate the likelihood of that risk becoming reality using a scale of 1 – 5 (with 5 being the most likely)
    • Rate the impact on your business if that risk became reality using a scale of 1 – 5 (with 5 being the most severe)
    • Multiply your ‘likelihood’ and ‘impact’ scores together.
    • A score of 15 or more represents a high risk. Prioritise taking steps to reduce that risk score.

    Read more

  • EasylifeIT™ partners with IT Governance for compliance and risk management services

    LindseyHall200It’s amazing how quickly things evolve. Just 10 years ago, the remit of an SME’s IT partner was covered by a fairly narrow set of requirements. The primary job centred around keeping the IT running and repairing things when it went wrong; IT security was just beginning to emerge as a distinct speciality. In those halcyon days, an antivirus and half-decent firewall was considered enough to tick the “due diligence” box for IT security. How times have changed.

    Read more

  • EasylifeIT™ recertified under the Cyber Essentials scheme

    James AllisonAs of August 2018, EasylifeIT™ is recertified under the Cyber Essentials scheme; which will assure you that we as a supplier practice the IT security that we preach.

    Cyber Essentials (CE) is a government-backed cyber security certification scheme that sets out a baseline of cyber security suitable for all organisations. The scheme's five security controls can prevent “around 80% of cyber-attacks”. Developed as part of the UK’s National Cyber Security Programme and in close consultation with industry, it provides businesses with clarity on good cyber-security practice.

    Read more

EasylifeIT™ Business Technology Support

Advice you can trust, technology management you can rely on

From conception, through implementation and systems management to securing your system and data, our team offers expertise and experience in the following key technology areas:

Established in 2006, EasylifeIT™ was born from an absolute conviction that there was huge room for improvement in our sector and we believed then, as we do now, that we can service our clients to a much higher and more professional standard than our competitors.

How to contact EasylifeIT™

  • Contacting EasylifeIT™ is easy. Call us on 0800 043 9186 (+44 1733 715930) if you would like to speak to one of our team. Alternatively, email This email address is being protected from spambots. You need JavaScript enabled to view it. or complete our short enquiry form.

    Please note that you will be redirected to our secure SSL portal to submit your details and returned when finished

    Contact Form

  • EasylifeIT™ is a cyber essentials certified company and consultancy

    Cyber Essentials (CE) is a government-backed cyber security certification scheme that sets out a baseline of cyber security suitable for all organisations
  • EasylifeIT™ is a Microsoft Partner

    Microsoft make resources available to us so we can more effectively plan, implement, deploy and support Microsoft technologies
  • EasylifeIT™ is a Trend Micro Partner

    Your business data and your systems protected in and out of the office
  • EasylifeIT™ is a Veeam Backup and Recovery Partner

    Veeam Backup Essentials delivers powerful, affordable and easy to use backup, recovery, monitoring and reporting for ALL  workloads — virtual, physical, and cloud
  • EasylifeIT™ is an ESET Partner

    Small Business, Server and Enterprise Computer Security
  • EasylifeIT™ is a CodeTwo Partner

    Award-winning tools for email signature management, Exchange and Office 365 migrations and backup as well as intelligent calendar and contacts synchronisation
  • EasylifeIT™ is a Nakivo Backup and Replication Partner

    NAKIVO offers VM backup, replication, failover, backup to cloud, backup copy, backup size reduction, screenshot verification, and multiple recovery options
  • EasylifeIT™ is an authorised Draytek reseller

    DrayTek is a leading manufacturer of business class broadband and networking solutions
  • EasylifeIT™ is a Zen Internet Partner

    Zen are a leading, independent provider of business broadband, lease lines and Iaas platforms for cloud systems