Our News

How can we help?

Don't hesitate to get in contact...

Leave blank for all. Otherwise, the first selected term will be the default instead of "Any".
  • Surplus IT Equipment

    From time to time we accumulate surplus IT equipment which we are giving you the opportunity to purchase for below cost price. Perfect for making those upgrades you were planning or replenishing your IT supplies.

    Read More
  • Office 365: More than Word

    First of all, excuse the feint reference to Extreme’s iconic ballad from the 90s, although its timing may well contextualise where we were and where we are now in terms of software. In the pre-cloud days it was easier to talk about software. Why? Because it was a thing. Something tangible like a box, CD or even a disk. When we talked about Office products it was something that was contained within that box, which you purchased from a shop. When you needed to upgrade you went back to the shop and invested in a slightly shinier box.

    Read More
  • BT recent power outage leaves pure fibre unaffected

    BT have reported a major outage causing problems around the UK this week, which has been put down to a power failure in London. However for CityFibre's pure fibre connectivity customers, their business activities continued as normal - due to the networks' state-of-the-art digital infrastructure which is complete seperate to the BT network. 

    Read More
  • Are you using the 3-2-1 rule?

    The 3-2-1 rule states that to prevent the risk of data loss you need:

    - Three separate copies of your backup data
    - Stored on two types of media e'g disks and tapes
    With one backup copy being off-site (Cloud)

    Read More
  • Have you thought about growing your business with grants and funding?

    At Blue Logic are always looking at ways to help you move your business forward through technology change. However we understand that with all business decisions there is a commercial inevitability that can affect how fast or how far you progress.

    Read More
  • Windows 10 free upgrade ending soon!

    Microsoft are ending their free upgrade offer to Windows 10 Pro on the 29th July, which means if you've still not upgraded you need to do so as soon as possible. Why wait and have to pay to receive the benefits of Windows 10? Act now before it's too late.

    Read More
  • A Massive Thank You!

    A massive thank you to everyone who joined us at the Business Technology Forum on the 16th June. It was another successful event, and we hope you enjoyed it as much as we did!

    If you have any questions regarding the event, the services we showcased or any of the supporting vendors please get in touch by filling in the right hand contact form.

    Read More
  • Cyber Security Report 2016

    It's not if, but when...

    With 2.5 million cyber crimes reported in 2015, a 38% increase in the number of incidents reported in 2014, the threat of a cyber attack has no longer become a case of if it will happen, but when it will happen! 

    Read More
  • Golf Day 2016

    Blue Logic tees off....

    As is our yearly tradition, we are pleased to announce that this year's Golf Day will be held on Wednesday 13th July 2016. 

    Jointly chaired by Blue Logic Managing Director Mark Ambler, and Sales and Marketing Director Dave Helm, this year's event is due to be held at the prestigious Scarcroft Golf Club in Leeds. If you'd like to find out more about the fantastic facilities at Scarcroft, click here

    Read More
  • Pure Fibre has finally reached Leeds!

    With over 200km of pure fibre digital infrastructure now available for both businesses and the public sector to utilise, Leeds is one of the most digitally-connected cities in the world. A pure fibre connection all the way to your business premises will provide you with the most advanced connectivity available in the UK - without the price tag you might expect! 

    Read More
  • Key Trends for the Construction Industry

    A technical revolution is taking place within the construction sector, with businesses realising the limitless possibilities that investing in the right IT networks and systems can bring. 

    Our experience providing IT and infrastructure solutions within the construction industry; to customers including J. Rotherham, Speedclad and Abstract Securities Limited; has allowed us to identify some key technical considerations that could be of interest to you.

    Read More
  • Social Engineering Part Two

    Are you getting ahead of the hackers?

    With Social Engineering on the rise in the UK, we’ve put together a two part series discussing the problem at large. Building from part one, in this article we’ll discuss further types of attack to be aware of, why they are on the rise, and the steps you can take to protect both yourself and your business:

    What types of attack are most common?

    Quid Pro Quo

    Read More
  • Social Engineering Part One

    Are you placing your cyber trust in the wrong hands?

    With cyber security threats at an all-time high, there’s never been a better time to arm yourself and your business against potential hackers. Threats can come in many forms, but one over-arching term to become familiar with is ‘Social Engineering.’

    In part one of our two part series, we’ll explain what social engineering is, and three common types of attack to be aware of:

    Read More
  • Blue Logic Appoints John Woodhead

    Blue Logic, Yorkshire's leading IT solutions provider, are pleased to announce the appointment of John Woodhead as Head of Finance. Following their achievement of surpassing a £6 million turnover, and with commercial success continually building year on year, the rapidly growing IT Company will use John’s invaluable business insight to progress even further in the market, whilst simultaneously streamlining and refining financial processes.

    Read More
  • Gigabit Fibre Is Coming!

    Watch this space for more details on Leeds joining the Gigabit City revolution...

    Blue Logic has formed a partnership with Diva Telecom to provide the new generation of affordable, gigabit speed internet services. With pure fibre you will be able to unlock huge business benefits including increased productivity, efficiency and agility.

    Read More
  • Warning! Jigsaw Ransomware Threat

    Don’t get tricked into playing the game…

    Jigsaw, a new strain of cryto-ransomware, is increasingly on the rise within the UK. Named after the killer in the Saw horror films, this malware represents one of the latest entries into the ransomware family, and has only been detected by researchers as of March 2016.

    Jigsaw essentially works by encrypting user's system files, and threatening to delete them if users do not follow specific instructions and pay the 'ransom' requested.

    Read More
  • Bring Your Own Device - Part Two

    Plan for the future...

    In an increasingly mobile world, security and privacy risks are often at the forefront of many business’s concerns when considering implementing a 'Bring Your Own Device' (BYOD) policy. Taking the time to plan for and manage the entire process around implementing a mobile device policy will ensure that your company is prepared for and protected against most major security risks.   

    Read More
  • Bring Your Own Device - Part One

    Prepare for success...

    With 12.1 billion mobile devices estimated to be in use worldwide by the end of 2018, implementing a ‘Bring Your Own Device’ (BYOD) policy is a hot topic. However, many organisations remain cautious of fully rolling out BYOD and remote working policies, with 72% reporting that their main security concerns centre on data leakage and loss.  

    Read More
  • Join our Cyber Security Event on 25th May

    Sign up for our FREE event on Wednesday 25th May 2016

    Are you...

    Read More
  • Avoid Cyber Security Weak Spots

    Cyber crime - don't get caught out!

    With cyber-crime increasingly on the rise, there has been a significant increase in the number of companies investing in core safeguards against cyber-attacks. However, there still remains a substantial failure to address the classic mistakes and weak spots that leave businesses vulnerable to exploitation by cyber criminals. 

    Read More