All news articles

Reset
apple header
Blog
Apple 50 Years: 50 Years of Daring to Think Differently
This year, Apple celebrates its 50th anniversary. A milestone that cannot simply be overlooked. Because whether you are a fan or not: Apple has permanently changed the way we work, communicate, and create. At Analyst ICT, we are proud to be part of this ecosystem. As an Apple Technical Partner, we work daily with technology that is not only powerful but, above all, logical and pleasant to use. A different perspective on technology Apple has always distinguished itself by one simple conviction: technology should help people, not hinder them. No unnecessary complexity, but simplicity and ease of use. That aligns seamlessly...
browser password
Blog
Why saving passwords in your browser is not a good idea
The blog post below was created in response to a question during our engineering meeting. Every two weeks, we get together with all of our technical staff to discuss the latest developments in technology or with clients. Good client questions also arise during these meetings, such as this one. Time to do some research. Thank you, Wiebe! You've probably experienced this: you log in to a website, and your browser asks if it should remember your password. Convenient, fast, and you don't have to remember anything. However, there's a risk involved. In practice, we see that many security incidents start with something small. Like saving passwords…
Apple Business
Blog
Apple is taking a big step with Apple Business
Apple announced something special this week. Not a new device, but something that might be even more interesting for many organizations: Apple Business. A completely new platform with which Apple brings all its business services together in one environment. And frankly: this is a development that we at Analyst ICT are following with great interest. The problem: fragmented tools and unnecessary complexity Many organizations working with Apple will recognize the problem: Multiple portals (Apple Business Manager, Business Essentials, Connect) Different tools for management, branding, and support Additional costs for basic functionalities such as device management This leads to a lack of clarity and costs time. And…
Apple Technical Partner
Blog
Apple Technical Partner
Good news: Analyst ICT is an official Apple Technical Partner. We're proud of that. It confirms what we have believed for years: Apple has a serious place within the modern workplace for SMEs. In more and more organizations we see that employees like to work with a Mac, iPhone or iPad. At the same time, these devices must be managed securely, integrated with existing systems and fit within the organization's IT policy. This is exactly where our expertise lies. With the status of Apple Technical Partner, Apple shows that Analyst ICT has the knowledge and experience to professionally implement Apple technology in business environments...
macbook neo
Blog
What can you use the MacBook Neo for?
For many SMB employees, a heavy workstation laptop is not at all necessary. Instead, the MacBook Neo is designed for work that revolves primarily around communication, administration and cloud applications. Administration and office work For email, Microsoft 365, Google Workspace or accounting software, the MacBook Neo is more than adequate. For example: email and calendar management quoting spreadsheets and document processing working in CRM or ERP systems Modern cloud workplace Many companies today work completely in the cloud. Applications such as: Microsoft 365 Odoo HubSpot Exact web portals and dashboards run smoothly on this MacBook. Video calling and collaboration With the built-in camera and microphones, the...
odido hack
Blog
What we can learn from the hack at Odido
A wake-up call for identity security and CRM systems It was recently announced that telecom provider Odido fell victim to a major hack. In the process, customer data was captured through a customer contact system. It involved millions of records including names, addresses and contact information. Many of our customers noticed that their data was also included in the hack. This incident is not an isolated incident. Worldwide, we are seeing a marked increase in attacks on CRM systems and cloud environments such as Salesforce. Not because those platforms are “insecure,” but because attackers are getting smarter about abusing identities. What exactly happened? And more importantly, what can...
Microsoft
Blog
Microsoft 365 is getting more expensive. What does this mean for your organization?
Microsoft has announced that effective July 1, 2026, the prices of virtually all Microsoft 365 and Office 365 business licenses will increase. The increases range from a few percent to more than 25%, depending on the type of license. That's no small change. Certainly not for organizations with many users. But the good news? You don't have to worry about this yourself. What exactly is changing? Below is an overview of the most important announced price changes: License Indicative increase Microsoft 365 Business Basic +16.7% Microsoft 365 Business Standard +12% Microsoft 365 Business Premium 0% (no increase for now) Office 365 E3 +13%...
Apple IT professional
News
Frank earns Apple Certified IT Professional certification
At Analyst ICT, we continually invest in knowledge. Not for the paper, but to better help our customers. This week, Frank Houtappels earned the Apple Certified IT Professional (ACITP) certification. A great step forward. And above all: good news for organizations that work with Apple. Apple in SMEs: more than just a nice Mac More and more companies are working with MacBooks, iPhones and iPads. It works comfortably. It's stable, easy to use and popular among employees. But in a business environment, ease of use is not enough. You want: Control over devices Good security Centralized setup Grip on user rights Integration with...
apple certified support professional
News
Frank and Maikel achieve Apple Certified Support Professional certification
At Analyst ICT, we continue to invest continuously in knowledge and quality. Last week, Frank Houtappels and Maikel Michelbrink officially earned the title of Apple Certified Support Professional (ACSP). A nice milestone. But more importantly: good news for our customers. Apple in SME: powerful, but not necessarily simple More and more organizations are working with MacBooks, iMacs and other Apple devices. But in a business environment, Apple also raises questions: How do you set up macOS in a secure and manageable way? How do you integrate Macs into a Microsoft 365 environment? How do you ensure security and compliance? What do you...
ai frontier
Blog
What is OpenAI Frontier?
AI has long since ceased to be an experiment. Increasingly, it is being used to do work smarter, faster and more consistently. OpenAI recently launched Frontier: a new platform for building and managing so-called AI agents. But what, specifically, does this mean for organizations? And why is this relevant for SMEs? What are AI agents? An AI agent is not a chatbot that just answers questions. It is a digital assistant that performs tasks independently within your organization. For example, consider an agent that: retrieves information from your CRM notifications or processes tickets combines data from multiple systems automates processes that are currently...
AI trends 2026
Blog
AI trends in 2026: from hype to real value for your organization
2026 will be the year when artificial intelligence is no longer just an experiment, but truly part of how organizations work, decide and grow. At Analyst ICT, we see that these trends are not only of interest to large corporates, but actually have relevance for SMEs: from productivity improvements to smarter collaboration and better data decisions. Below we set them out practically for you. 1. From generative tools to autonomous AI agents In 2026, AI is shifting from tools that primarily provide responses - such as text or code generation - to autonomous agents that perform tasks and drive workflows independently. In practice, this means...
News
Without deviations by the ISO and NEN audit
Last period we again successfully passed the audits for ISO 9001, ISO 27001 and NEN 7510. And we are proud of that: without a single deviation. For us, this is not a check mark on a list, but a confirmation that our way of working is correct. What was audited? During the audit we looked in detail at how we work and how we set up our processes. Consider: quality and continuous improvement (ISO 9001); information security and risk management (ISO 27001); care-specific information security and privacy (NEN 7510). The auditors found that our processes are not only well established on paper,...
clawdbot ai
Blog
Clawdbot: a look at the next step in AI
AI is developing at lightning speed. Last week there was a lot of buzz about Calwdbot. Whereas in the past year we have mostly seen smart assistants like Microsoft Copilot help us with texts, emails and analytics, yet another new development is already emerging: AI agents. One of the better-known examples is Clawdbot. In this blog, we explain what Clawdbot is, what it can do and why it is especially interesting to follow right now - but not yet widely deployed within your organization. What is Clawdbot? Clawdbot is a so-called AI agent. That means it not only provides answers to questions, but...
copilot 365
Blog
Microsoft 365 Business Premium + Copilot Business: a smart combination
Microsoft has introduced an interesting new bundle: Microsoft 365 Business Premium combined with Microsoft 365 Copilot Business. For many of our customers, this is a great opportunity to start working with AI practically and securely within the organization. What makes this bundle so interesting? Microsoft 365 Business Premium is already the foundation for many SMB organizations: secure workstations, Microsoft Teams, Outlook, OneDrive and comprehensive security. Adding Copilot Business to this adds a smart AI assistant that collaborates in familiar applications such as Word, Excel, Outlook and Teams. For example, Copilot helps with: summarizing...
e-Evidence wetgeving
Blog
New European e-Evidence legislation: what does it mean for your organization?
Digital data plays an increasing role in criminal investigations. Think of emails, instant messages, cloud files or log data. In order to obtain this information faster and across borders, the European Union has introduced new legislation: the e-Evidence Regulation and Directive. But what exactly does this legislation entail? And is it relevant to your organization? We are happy to explain it clearly and practically. What is e-Evidence? The e-Evidence legislation consists of two parts: The e-Evidence Regulation (EU 2023/1543) This regulates that investigation services within the EU can request electronic data directly from service providers, even if they are located in another EU country. The e-Evidence...
toshiba mfp
Blog
Scanning and emailing with your Toshiba printer continues to work as usual
Even after the new Microsoft changes Perhaps you have already read it: Microsoft will soon discontinue an outdated way of sending e-mail (so-called SMTP basic authentication). This may affect printers and scanners that send documents by e-mail, such as many Toshiba multifunctionals and other multifunctionals. That sounds exciting,but the good news is: for customers of Analyst ICT, this is not a problem. We already have a secure, future-proof solution for this. What exactly is going on? Many printers send email using a direct link to Microsoft 365, with a username and password. Microsoft no longer considers this method secure and is switching...
RAM geheugen
Blog
Why computers and ICT equipment will soon be more expensive
Recent news (a.o. NOS) confirms what we have seen coming for some time: laptops, desktops and other ICT devices are in danger of becoming significantly more expensive. The main cause? A huge price increase of one crucial component: working memory (RAM). What's happening. The price of working memory - an essential component in virtually all modern computers and mobile devices - has increased about three times in recent months. Those rising prices have several causes, but one of the biggest is the growing demand from data centers and companies investing in artificial intelligence (AI). These systems require huge amounts of memory, leading vendors to increase their...
FD Gazelle 2025
News
Analyst ICT drags in FD Gazelle hat-trick: among fastest growing companies three years in a row
Last Tuesday it was time again: the presentation of the FD Gazelles 2025. And yes - Analyst ICT was once again on the podium. For the third year in a row we can call ourselves an FD Gazelle. And this year even higher than expected: place 41 in the category small companies within region South. A wonderful recognition of which we are extremely proud. Growing three years in a row: what does this mean for us? The FD Gazellen Award is only presented to companies that grow structurally and healthily. The fact that we can use this title in 2023, 2024 and 2025 says a lot...
CoPilot
Blog
Superlogically getting started with Microsoft 365 Copilot: 7 prompting tips for your organization
In practice, we often see that organizations enthusiastically start with a smart tool such as Microsoft 365 Copilot, but then get stuck on the question: “How do I use it smartly?‘ Because: without clear input, you sometimes get output that is just not helpful. If your digital assistant does not know what you want, it fails to give you peace of mind, overview and simplicity. We believe that ICT should be more human: clear, reliable and hassle-free. That's why we give you 7 practical prompting tips here that will help you really use Copilot productively. You'll get a grip on the tool, giving you peace of mind for...
copilot 365
Blog
Microsoft 365 Copilot app: superlogical answers
Problem Many SMEs struggle with it: employees stare at a full mailbox, large documents, endless meeting summaries or loose action items. The challenge: How do we get a handle on the daily workflow faster, without the automation project becoming bigger than the work itself? Solution With the Microsoft 365 Copilot app, Microsoft offers a smart sparring partner for your workplace: it helps with writing, summarizing, planning and analyzing - within the familiar Microsoft 365 ecosystem. For you as a director, IT manager or back office manager: it means less time spent on routine and more focus on the core of your work. What does the Microsoft 365 Copilot app do? U...
ChatGPT atlas
Blog
A new browser from ChatGPT “Atlas”
As your partner, we think it is super logical to share with you developments such as the emergence of the new browser ChatGPT Atlas. Not because we are pushing you to use it directly, but because knowledge of new tools helps you make conscious choices. Below, we explain what ChatGPT Atlas is, what its capabilities are, how it is expected to develop - and why we recommend not using this browser for business just yet. What is ChatGPT Atlas? Atlas is a browser developed by OpenAI that directly integrates the chatbot ChatGPT. The browser is built on the...
Microsoft
Blog
Microsoft outage on Oct. 30, 2025 - what happened and what does it mean for you?
On Wednesday, Oct. 30, 2025, a major outage was reported on Microsoft services, including Microsoft Azure cloud platforms and Microsoft 365 productivity services. We understand that this may raise question marks for you as a customer. That's why we at Analyst ICT explain exactly what happened, why and what Microsoft is doing to prevent a recurrence. What happened. The outage began around mid-day (European time) and affected multiple services worldwide: both Microsoft Azure infrastructure and parts of Microsoft 365 experienced outages or delays. The root cause appeared to be an unintended configuration change in the Azure environment, with...
Pius X-college
Blog
Sharing knowledge in practice: Analyst ICT at Pius X College's occupational information day
We often shout it: we want to share knowledge and help others move forward. Today we literally put that into practice again - during the career information day at Pius X College. In the morning, in small groups, we had the opportunity to explain what the profession of ICT consultant and cyber security expert actually entails. Because what does someone who works “in ICT” really do on a day? And how do you get there? The students had consciously signed up because they wanted to know more about this profession. This resulted in great conversations on topics such as: What exactly does the profession entail? What courses have...
AWS
Blog
AWS Outage - What happened?
On Monday, Oct. 20, 2025, Amazon Web Services (AWS) experienced a large-scale outage that knocked out large portions of the Internet. Below is a technically based overview of what happened and what this means for organizations. Timeline & key facts The outage reportedly began around 07:11 UTC (08:11 Dutch time) on Oct. 20. AWS indicated that the starting point was in the US-EAST-1 (Virginia) region of their data centers. The immediate cause: an error in the Domain Name System (DNS) resolution of a key API endpoint of the database service Amazon DynamoDB. In other words, the API servers could not be found because the ‘phonebook function’ of...
FD gazelle 2025
Blog
FD Gazelle 2025 - Hat-trick for Analyst ICT!
Against all odds - as sometimes happens in sports - we scored again. For the third year in a row, Analyst ICT may call itself an FD Gazelle 2025. An achievement of which we are extremely proud. Three times in a row, but this one is special Fair is fair: this one came unexpected. The past years were mainly about growth, development and a lot of hard work for our customers. Not with the aim of winning a prize, but simply to deliver good, reliable and understandable ICT. That this is now being rewarded with...
Stichting Anders
Blog
Foundation Other
We from Analyst ICT are pleased to support the ANDERS Foundation Eindhoven. Through this partnership we can use our knowledge, time and resources for people and organizations that really need it. In this way we contribute as a company to a local solution to a social problem - close to home, with impact. In this way we give concrete meaning to corporate social responsibility. Super logical right! We have a story to share with you that touched us. “A laptop, especially for me? ”Emotionally and flabbergasted, Mylene* reacted to the laptop she received. The ANDERS Foundation met Mylene during a hectic period where we helped her...
AI act
Blog
The AI Act: what has changed since August 2025?
ICT is becoming simpler and more human also when it comes to artificial intelligence (AI). With the advent of the European AI Act, organizations in Europe must be more careful with AI applications. The Act is being introduced in stages and since Aug. 2, 2025, new obligations apply. What has changed and what does this mean for your organization? What did the first phase entail? The first phase of the AI Act started in February 2025. The focus then was mainly on: Awareness and basic knowledge of AI in organizations. Avoiding prohibited AI applications (the unacceptable risk category). Underlining that not...
microsoft 365 copilot
Blog
Make your work easier with Microsoft Copilot: concrete examples
ICT is sometimes complex, but technology can also actually make things much simpler. A great example is Microsoft Copilot. This smart assistant is incorporated into the Microsoft 365 apps you probably already use daily: Outlook, Word, Excel, Teams and more. Copilot helps you work faster, save time and keep an overview. This is especially valuable for small businesses, where workloads are often high and hands are scarce. We list the most important advantages and concrete examples. What is Microsoft Copilot? Copilot is a digital assistant based on artificial intelligence. It “thinks”...
Blog
Important change starting November 1: Microsoft 365 / Office 365 licenses split into packages with and without Teams
Recently, Microsoft announced that as of Nov. 1, 2025, there will be a major change in the way you can purchase Microsoft 365 and Office 365 licenses. For organizations, this means more freedom of choice and the opportunity to save provided you know the implications. What exactly will change? Microsoft is going to divide the existing packages into variants with Teams and without Teams. For each subscription, the price difference between the version with Teams and the version without will be indicated. Teams will also remain available as a standalone service through specialized subscriptions such as Teams Essentials and Teams Enterprise. Microsoft promises new tools to export data from Teams...
Blog
Apple launches new products: what does it mean for your business?
Apple presented the latest iPhones, AirPods and Apple Watches yesterday. Nice innovations - but especially interesting to see what this could mean for you as a business owner. We list the main points briefly and logically. The new iPhones The iPhone 17, 17 Pro and the ultra-thin iPhone Air are faster, stronger and have better cameras. For you, this means: Faster work on the go, without delays. Better video and photos, useful for marketing or customer communications. e-SIM only: more secure and flexible for international use. AirPods Pro 3 The new AirPods are not only better at sound and noise cancellation, but also measure heart rate....
apple intelligence
Blog
Working smarter with Apple Intelligence: What does it mean for your organization?
Apple recently took another step into the world of artificial intelligence with the introduction of Apple Intelligence. Starting this fall, this technology will also be available in Dutch, opening the door to a range of smart features for business users. But what exactly does Apple Intelligence entail, and how can your organization benefit? What is Apple Intelligence? Apple Intelligence is an integrated AI system that runs on your own Apple device - such as an iPhone, iPad, Mac or Apple Watch. Unlike many other AI solutions, Apple's system runs locally. So your data stays on your device and is...
analyst ict ISL
News
Simply switch to Analyst ICT: here's how it works!
Over the past year, we at Analyst ICT have proudly welcomed, or as we call it, onboarded, a number of new customers. We notice that the process from first contact to actual transfer often takes some time. And we understand that all too well. Many companies still experience ICT as something “vague”. At the same time, it affects almost every primary process within an organization. Add to that the down-to-earth Dutch mentality “there is something everywhere, so why change?” and it is logical that companies take their time. Still, we see a clear trend: many ICT service providers in...
sharepoint onedrive het verschil
Blog
Critical Zero-Day Vulnerability in SharePoint Server: What you need to know
Microsoft recently warned about a serious zero-day vulnerability in SharePoint Server, registered as CVE-2025-53770. This vulnerability is currently being widely exploited and allows attackers to remotely execute malicious code on affected servers. It is important to emphasize that only on-premises SharePoint installations are vulnerable; SharePoint Online in Microsoft 365 is not susceptible to this attack. What's going on? Since July 18, Microsoft has been detecting active attacks that exploit this vulnerability. The attackers manage to bypass existing security measures introduced earlier in July. The attack method is based on an earlier...
IOS26
Blog
iOS 26: A New Name, a New Era
Apple recently unveiled iOS 26, and it's not just a regular update. With this release, Apple is forging a completely new path - literally and figuratively. The jump from iOS 18 to iOS 26 is not a typo, but a conscious decision that symbolizes a fundamental change in how we should understand Apple's mobile operating system. From annual updates to a new paradigm According to Apple, the era of annual, incremental updates is over. iOS 26 marks the beginning of a new era in which the operating system is more closely aligned with visionOS - the OS of the Apple Vision...
microsoft solutions partner modern work
News
Analyst ICT once again recognized as a Microsoft Solutions Partner for Modern Work
We are proud to announce that Analyst ICT has once again been recognized as a Microsoft Solutions Partner for Modern Work. This status reaffirms our commitment to delivering high-quality, superlogical, modern workplace solutions that help organizations collaborate smarter, more efficiently and securely. Solutions Partner recognition means we meet Microsoft's stringent requirements for customer satisfaction, technical expertise and successful implementations of Microsoft 365 solutions. These include Microsoft Teams, SharePoint, Exchange Online and Intune - all tools we deploy every day to support our customers in their digital transformation. As a Solutions Partner, we can...
NIS2 richtlijn
News
Why Analyst ICT is working toward NIS2 certification
At Analyst ICT, we are proud of our existing certifications: ISO 27001, ISO 9001 and NEN7510. These certifications demonstrate our compliance with international standards for information security, quality management and healthcare information security. But we don't stop there. We are working hard to achieve NIS2 certification as well, and the first steps have already been taken. Thus showing as evidence that we are actively working to obtain full NIS2 Quality Mark Certification. This shows that we consider complying with NIS2 guidelines and ensuring the security of our systems and data a super logical step. What is...
Analyst ICT SIEM
News
What is a SIEM and why is it an important part of our SOC?
After our blog about our SOC, it is now time to introduce a new term to you namely SIEM. In this super-logical blog, we take a moment to explain how and what. At Analyst ICT, we are committed daily to ensuring the digital security of our customers. With the introduction of our own Security Operations Center (SOC), we have taken a super logical step in strengthening our services. A crucial part of this SOC is the SIEM solution. But what exactly is a SIEM, and why is it so important? SIEM explained: the digital watchdog SIEM stands for Security Information...
Analyst ICT SOC
News
We now have a Security Operations Center (SOC)
At Analyst ICT, we are proud to announce that our Security Operations Center (SOC) is now fully operational. With this new addition, we are further expanding our services and strengthening our commitment to ensuring the security and continuity of our small and medium-sized enterprise (SMB) customers. In this blog, we explain why this is a super logical move for us and how the SOC works. The Need for a SOC One in five Dutch organizations suffered damage from a cyber-attack last year. For large companies, this was even true for three...
sharepoint onedrive het verschil
Blog
What is the difference between OneDrive and SharePoint?
We still get the question regularly. So what's the difference? OneDrive and SharePoint two prominent tools used by many businesses. Although both solutions are from Microsoft and are often used together, they have different features and applications. In this super-logical blog, we will explain the difference between OneDrive and SharePoint. OneDrive: Personal Storage OneDrive is basically meant to be a personal storage space for files. It is similar to the ‘My Documents’ folder on your computer, but in the cloud. This means you can access your files anywhere and from any device. For a user...
copilot 365
Blog
Microsoft 365 Copilot: AI-powered search functionality and more
Microsoft recently announced an exciting update to Microsoft 365 Copilot that introduces a range of new features, including AI-driven search functionality, so-called reasoning models, and a new Agent Store. These innovations promise to transform the way businesses search and work with data. Here's a summary; we think this could start to work super logically for most businesses! AI-driven enterprise search One of the most notable additions is AI-driven enterprise search. This was previously a challenge for enterprise search providers because of the complexity of policies across different data sources. The goal is to ensure that...
analyst ict
Blog
Why are more and more companies in Eindhoven choosing a Managed Service Provider (MSP)?
For SME companies in Eindhoven and Brabant, ICT is no longer a supporting function but a crucial part of business operations. From workstations and cloud solutions to cybersecurity and telephony - everything must run smoothly and securely. Yet we see more and more entrepreneurs deciding not to handle their ICT themselves, but to outsource it to a Managed Service Provider (MSP). What makes this choice so attractive? And what advantages does an MSP offer for the SME in Eindhoven? 1. One partner for all your ICT A Managed Service Provider takes full responsibility for your ICT environment. This means that you no longer have to switch...
Windows 365 link
Blog
Microsoft introduces Windows 365 Link Mini-PC and new Windows App
Microsoft has taken a major step into the world of cloud computing with the introduction of its first Cloud PC, the Windows 365 Link mini-PC. This compact and powerful mini-PC is designed to help businesses provide fully cloud-based workstations without local management. The Windows 365 Link mini-PC includes only the Windows App, which allows users to easily connect to their workplace in the cloud. All you need is the mini-PC, a monitor, keyboard, mouse and a working Internet connection. In addition to this innovative hardware, Microsoft has also replaced the Remote Desktop app on Android...
macos update
Blog
Apple sets automatic updating default for latest OS versions
Apple has made an important change to its latest operating system versions by enabling automatic updating by default. This change is intended to help users keep their devices always up-to-date with the latest security patches and features without having to take any action themselves. The new auto-update default setting applies to both iOS and macOS. This means that users of iPhones, iPads and Mac computers will now automatically receive the latest updates as soon as they become available. With this, Apple hopes to improve the security and performance of its devices, as many users often forget to manually update their software...
onenote
Blog
Also ends support for OneNote on Windows 10 end date
Microsoft has announced that OneNote for Windows 10 will lose support on Oct. 14, 2025. This is the same date that Windows 10 will lose support. This means that the app will no longer receive updates or security patches, which may affect users who still rely on this version of OneNote. What Happens to OneNote for Windows 10? Starting in June 2025, users of OneNote for Windows 10 will notice slower synchronization performance, which may affect real-time collaboration and access across multiple devices. In addition, starting in July 2025, users will see in-app banners that...
europeanalternatives
Blog
European Alternatives for your ICT solutions?
In recent years, there has been a growing trend with more and more companies seeking European alternatives to U.S. tech giants such as Microsoft and Apple. This movement is driven by several factors, including concerns about privacy, data sovereignty and the desire to support local economies. We too are increasingly getting the question now. We don't think SMEs are ready to make this move anytime soon (there's a lot involved), but reason enough for us to write a blog post about it. Why European Alternatives? The push for European alternatives comes from...
werkplek analyst ict
News
The best ICT service provider for SMEs in Eindhoven: what to look out for?
As an SME entrepreneur in the Eindhoven region, you know how important reliable ICT is. Nowadays, your business processes run entirely on digital systems: from workplace management to cloud solutions and from telephony to cybersecurity. But how do you choose the right ICT service provider that not only provides technology, but also really contributes to the peace and continuity of your organization? 1. Choose a partner in the Eindhoven region An ICT partner close by offers advantages. Problems are solved faster and you always have someone who understands the local market. Analyst ICT consciously focuses on the SME in Eindhoven and surroundings, so that we can offer you personal and quick...
Dora wetgeving
Blog
DORA for ICT suppliers: what do you need to know?
The Digital Operational Resilience Act (DORA) is a European regulation effective Jan. 17, 2025 that aims to increase the digital resilience of financial institutions This legislation sets requirements for the security of network and information systems so that they can withstand disruptions and cyber-attacks. Although DORA is primarily aimed at financial institutions, it also has significant implications for ICT suppliers that provide their services to these institutions Impact on IT suppliers DORA applies to a wide range of ICT services that ICT suppliers provide to financial institutions within the EU. This includes, among others, Software-as-a-Service (SaaS), Platform-as-a-Service...
analyst ict
Blog
Outsourcing ICT in Eindhoven: the benefits for SMEs
For many SMEs in the Eindhoven region, ICT drives their success. Your business processes, communication and customer contact run largely through digital systems. But how do you ensure that everything remains secure, reliable and up-to-date, without having to worry about this on a daily basis? More and more companies are opting for ICT outsourcing in Eindhoven. Working with a professional ICT service provider or Managed Service Provider (MSP) offers peace of mind, continuity and cost savings. In this article we explain what the advantages are for SMEs. 1. Access to specialist knowledge ICT is changing rapidly. New software, security updates and cloud solutions follow each other in rapid succession. As an SME, it is almost impossible to keep up with all...
HP
Blog
HPE VME, The New VMware?
There is a new player on the scene in the world of virtualization: HPE VME. Hewlett Packard Enterprise (HPE) recently launched their new virtualization solution, HPE VME. But what makes this solution so special and can it really compete with VMware? Is this a super logical move for HPE? What is HPE VME? HPE VME is a KVM-based virtualization solution designed to provide an alternative to VMware vSphere environments. HPE's goal was to develop an enterprise-grade solution that is not only scalable, but also easy to manage. With the acquisition of Morpheus Data, HPE has...
analyst ict legt uit
Blog
AI What? Differences between ChatGPT, Copilot, DeepSeek and Grok
More and more, we are getting questions from clients related to AI. Last week came some good questions about the differences between all AI assistants and when to use what. In this blog the most important “facts” are listed. Again, what was an AI assistant? An AI assistant, or artificial intelligence assistant, is a software application that uses advanced algorithms and machine learning to perform tasks that would normally require human intelligence. These assistants can range from simple chatbots to sophisticated systems that can perform complex tasks. Here are a few AI assistants that we frequently encounter. ChatGPT ...
advies van analystict
Blog
Having doubts about your ICT environment? We offer advice!
It is understandable that you sometimes have doubts about the set-up of your current ICT environment. Perhaps you wonder whether your ICT party has the right knowledge or you are curious about the possibilities to get more out of your ICT environment. We also see a lot of ICT parties being taken over lately and then (too) many changes that leave you feeling out of sync. At Analyst ICT we understand these concerns and like to offer a helping hand. In a free, no-obligation consultation, together we look at what areas can be improved....
outlook
Blog
The future of Outlook: What does the transition to the new version mean?
From January 2025, the classic version of Outlook will gradually disappear and give way to the new, cloud-based version of Outlook. This change brings both advantages and disadvantages, especially for SMBs. In this article, we explain what this transition entails and what impact it may have on your business. Why is Outlook Classic disappearing? Microsoft has announced that the classic version of Outlook will no longer be available on new Windows PCs starting in 2024. This means that users who are used to the classic interface will have to switch to the new version of Outlook. The new version is...
windows update
Blog
Microsoft Introduces New Policy Option for Windows 11 Updates
In mid-2025, Microsoft will allow organizations to control whether new Windows 11 installations push cumulative updates immediately. This change is in response to feedback from system administrators who objected to an earlier introduction that removed all control. The new policy option will become available later this year for Windows 11 devices with version 22H2 or newer. This will give administrators more control over the update process, especially during the Out-of-the-Box Experience (OOBE), as Microsoft calls it. Previously, Microsoft's plan was to always force the latest updates during an installation. This led to problems, however, because certain fixes after a Windows update...
BCDR
Blog
How to take advantage of Datto BCDR in the event of a disaster
Preparing your IT environment for disasters is essential. Whether it's a cyberattack, hardware failure or natural disaster, a robust backup and disaster recovery solution can make the difference between minimal disruption and complete business interruption. This is where Datto BCDR (Business Continuity and Disaster Recovery) comes in. What is Datto BCDR? Datto BCDR is an all-in-one solution that helps businesses protect their data and recover quickly from any downtime. It combines backup, disaster recovery and business continuity in one integrated system. This means businesses can not only secure their data, but...
van A naar B
Blog
Cybersecurity for SMEs in Eindhoven: how do you protect your business from modern threats?
Cyber attacks have long since ceased to target only large corporates. SMEs in Eindhoven and Brabant are also a favorite target for hackers. Phishing mails, ransomware and data leaks can have major consequences: financial damage, reputation damage and even downtime of your company. Yet we see that many SMBs do not yet have their cybersecurity in order. Often out of convenience, or because they think their company is “too small” to be interesting. Unfortunately, the opposite is true: SMEs in particular are attractive to cybercriminals because their security is often easier to breach. In this article, you will read how you, as an SME entrepreneur in Eindhoven, can make your company more...
Infratech 2025
Blog
InfraTech 2025 or construction fair!
It's been a few weeks, but the day began with... “What are you going to do?” “I'm going to the InfraTech 2025 together and on behalf of our client Groenen Groep.” No one quite understood. But once there, we were on a mission. Namely, it was decided to get started with InfraWorks from BouwInfoSys at a client of ours. And at this fair, a demo of the web version was on display. I was expecting maybe 4 or 5 booths about ICT, but it was a bit different. There was a lot of choice from all kinds of different software parties and I...
tue, atlas, hoofdgebouw, den dolech 2 5600 mb eindhoven
Blog
Hackers infiltrate TU Eindhoven network: How could this happen?
Already several customers and acquaintances of ours have asked do you know what exactly happened at the TU in Eindhoven? Reason enough to pull together some previous news items and take you through these events. On Sunday, January 12, the network of TU Eindhoven (TU/e) was hit by a hack. The university was forced to take its own network offline, resulting in a week-long recovery period. Although the perpetrators are still unknown, their modus operandi is now clear: stolen login credentials were obtained through info stealers. But how could such a thing happen? TU/e is working...
coverboy berry van bree
News
Berry as a coverboy! Super logical!
Look at him shining on the cover of Region Business our very own Berry van Bree (of Analyst ICT). This month Analyst ICT is the cover story. On pages 6 and 7 of this magazine you will find Berry's story titled “By nature I am a helper”. Read the whole article here With a strong focus on the region, Analyst ICT from Eersel is doing very well. Many of its customers live around the corner, so to speak. ‘You shake hands professionally, but also run into each other at the weekend, for example at soccer,’ smiles Berry....
analyst ict legt uit
News
Cloud solutions for SMEs in Eindhoven: these are the possibilities
The cloud is indispensable for SMBs today. It makes your organization more flexible, secure and better prepared for the future. But which cloud solutions are actually available? And how do you choose the right solution that suits your business in the Eindhoven region? In this article we provide an overview of the most important cloud options for SMEs and explain why more and more entrepreneurs are making the switch. 1. Working in the cloud: access always and everywhere With cloud solutions you have access to your files and applications always and everywhere. Your employees can work in the office, at home or on the road, without compromising...
Blog
Microsoft Exchange 2016 and 2019: End of an era
Microsoft has announced that support for Exchange Server 2016 and 2019 will end on Oct. 14, 2025. This means that these versions will no longer receive technical support, bug fixes or security updates after this date What does this mean for users? Although Exchange 2016 and 2019 will still function after October 2025, they will become more vulnerable to security threats and other technical issues. Microsoft therefore recommends users take action now to avoid future problems Migration options Users have two main options: migrate to Exchange Online or upgrade to the new Exchange Server Subscription Edition (SE), which will be available later this...
News
Superlogic! Passed our annual ISO 27001, ISO 9001 and NEN 7510 control audit
Last week, in addition to taking care of our customers' ICT environments, was marked by our annual surveillance audit of our ISO 27001, ISO 9001 and NEN 7510 certifications. We are proud to report that, to use the auditor's words, we passed with flying colors! The auditor was very appreciative of the practical implementation we have given to these standards. This is a great achievement by our team and an independent confirmation that the highest standards of information security and quality are guaranteed with us. Our commitment to the...
network utility
Blog
Handy networking tool for the Mac
Are you curious about your Mac's current network connection or want to test if a remote server is still active? Is your connection to a server slow and want to learn more about the detours your data packets take on the way to their destination? Or are you on a hotel's Wi-Fi network and want to address poor network speed with solid data? We regularly use this handy little tool. Of course, you can use Terminal for this and type commands like ping or traceroute. But there's a more Mac-like way: Meet Neo...
Microsoft Word
Blog
No more CTRL-B in Microsoft Word?
Since a November update, many Microsoft Word users have noticed that the original bold text shortcut key, Ctrl+B, no longer works as expected. Instead, this combination now leads to the creation of a new document, a feature normally activated by Ctrl+N. Although rumors are circulating that Microsoft made this change intentionally, this does not appear to be the case. According to Microsoft's support page, the bold text shortcut key has changed since version 2410. Microsoft recommends that users adjust the key combination manually. This can easily be done via...
Cyber Resilience Act
News
What is the Cyber Resilience Act and Why is it Important?
Recently, we have been hearing more and more about the Cyber Resilience Act (CRA). But what exactly does this law entail and why is it so important for businesses and consumers? In this blog, we explain what the CRA is and what the benefits are for our clients at Analyst ICT. What is the Cyber Resilience Act? The Cyber Resilience Act is new European Union legislation designed to improve the cybersecurity of products with digital components. This includes a wide range of products, from software and hardware to Internet of Things (IoT) devices. The...
FD Gazelle 2024
News
Promise is Debt: Our FD Gazelle
There is the promised photo of our FD Gazelle 2024! Still laughing a little about our oops. Unfortunately without Berry van Bree, but that has a very good reason: he has become a father of a son. So super logical and double prize! We are certainly proud that we continue to make strides every year and that everyone at Analyst ICT works every day to become and be a little better for our customers.
bluebeam
Blog
Bluebeam PDF Editor for construction and infra companies
At Analyst ICT, we see a growing trend: more and more of our customers in the construction and infrastructure sector are choosing Bluebeam PDF Editor. But what makes this PDF editor so special and why is it a game-changer for companies in these sectors? What is Bluebeam PDF Editor? Bluebeam PDF Editor is a powerful tool designed specifically to improve the workflow of construction and infrastructure projects. It offers a wide range of features beyond standard PDF editing capabilities. With Bluebeam, users can not only create and edit PDFs, but also collaborate, annotate and manage documents in a way...
FD gazelle 2024 oeps
News
Sorry FD Gazelles (oops!)
Last Friday, I opened LinkedIn with the intention of expanding my network, and something immediately caught my eye. Everywhere I saw pictures of FD Gazellen Awards passing by. But seriously! We had won one of those FD Gazellen Awards, hadn't we? And that for the second year in a row! How could we forget? I grabbed my phone and called Berry. “Hi Berry, it's Frank. Did we really forget about the FD Gazellen Award?” On the other end of the line, a hesitant “Uhh... yes, but I thought that was a deliberate action. We wanted ...
uwv eindhoven
News
Cooperation with the UWV: Superlogical!
Last month, the phone rang. “Hello, this is Ron from the UWV.” My first thought was, “What have I done now?” After my previous job, I didn't expect to need the UWV anytime soon. As it turned out, the UWV had seen our job posting and found a suitable candidate. My first reaction was skeptical: “Really, the UWV a candidate?” But as a Kempian company, we should have no preconceptions. It's a small world, so onward with the goat. This month's good deed: listening to the UWV candidate 😉 To our great surprise (because like many, we had preconceived notions about the...
Blog
The Impact of Trump's Re-election on Cybersecurity in Europe
Last weekend there was a lot going on about this topic. A reason for us to investigate. This blog summarizes our findings. Donald Trump's re-election as president of the United States has provoked a lot of reactions worldwide, and Europe is no exception. One of the main areas his re-election may affect is cybersecurity. In this blog, we examine the potential implications for Europe. Changing Priorities in the U.S. Under Trump, the U.S. has adopted a more isolationist approach, which could mean less cooperation on cybersecurity. This could...
Maikel Michelbrink
News
Who is Maikel Michelbrink? 
38 years old. Father of 2 boys. Born in Eersel, living in Hapert. Always been fascinated with computers. Old school gamer. World of Warcraft for those in the know. Huge fan of movies, cartoons / animation and comic books. By default have too many tunes, songs, titles and actors in my head. And a lot more of that kind of stuff. If it has to be done, it has to be done right! Analyst ICT Before Analyst , I held different positions in different industries. But was always drawn to ICT. Through all my work experience I think I can relate well to other people and companies.
inbound smtp dane with dnssec for exchange
Blog
Microsoft rolls out inbound SMTP DANE and DNSSEC in Exchange Online
What do they do I hear many people thinking? In the ever-changing world of digital communications, email security has become a top priority for businesses of all sizes. Microsoft recently took an important step by making inbound SMTP DANE (DNS-based Authentication of Named Entities) with DNSSEC (Domain Name System Security Extensions) generally available to customers of Exchange Online, part of Microsoft 365. But what exactly does this mean and why is it so important for our customers and SMBs? We put this briefly #superlogically. What is SMTP DANE and DNSSEC? SMTP DANE is a protocol that helps with the...
apple intelligence
Blog
Apple Intelligence is coming to the EU: What does it mean?
In a recent press release, Apple announced that Apple Intelligence is now available on the Mac in the EU. From April 2025, the iPhone and iPad will also support these innovative features. This is an exciting development for Apple users in Europe, as they will now have access to many of Apple Intelligence's core features. What is Apple Intelligence? Apple Intelligence is an advanced technology that uses artificial intelligence (AI) and machine learning (ML) to improve user experiences. It offers a range of features designed to simplify everyday tasks, increase productivity and provide personalized assistance to...
certificering
News
Analyst ICT ISO 9001 certified
At Analyst ICT, we are proud to be ISO 9001 certified. This certification was an important milestone for our company and offers significant benefits to our customers. In this first blog, we explain what ISO 9001 means and how it benefits our customers. Later we will also focus on ISO 27001 and NEN 7510. Indeed, Analyst ICT has achieved certification for all three. What is ISO 9001? ISO 9001 is an international standard for quality management systems (QMS). It provides a framework for companies to improve their processes and comply with...
FD Gazelle 2024
News
Analyst ICT wins the FD Gazelle Award for the second year in a row!
We are excited to announce that Analyst ICT has been recognized as one of the fastest growing companies in the Netherlands for the second year in a row! We have once again won the prestigious FD Gazelle Award, a reward that recognizes our hard work and dedication to innovation and customer satisfaction. Super logical right? FD Gazelle Awards? The FD Gazelle Awards are presented annually by the Financieele Dagblad to companies that have shown exceptional growth. The criteria for this award include not only revenue growth, but also profitability and continuity. Winning this award is proof of our strong market position and our...
rijksoverheid
Blog
Why the “My Cyber Resilient Business” Grant is Interesting
In today's digital world, cybersecurity is a critical aspect for any business, large or small. However, for SME entrepreneurs, having sufficient resources and knowledge to protect their business from cyber threats can be a challenge. Fortunately, the “My Cyber Resilient Business” (MCZ) grant provides a valuable solution. And can be a super logical step for both Analyst ICT and you. What is the MCZ grant? The MCZ grant is a government initiative designed to help small and medium-sized businesses increase their cyber resilience. This grant provides financial support for various measures and initiatives that improve the digital security of...
windows 10
Blog
Microsoft Advises Windows 10 Users: Time for a New PC
In a recent announcement, Microsoft advised Windows 10 users to buy a new PC if they want to switch to Windows 11. But is this super logical advice? We wondered and have the answer for you in this blog. This advice is not entirely unexpected given Windows 11's stringent hardware requirements, including mandatory support for TPM 2.01. Why a New PC? Microsoft has long tried to smoothly transition users from Windows 10 to Windows 11. However, with the approaching end date for Windows 10 support on Oct. 14, 2025, the transition is becoming less straightforward....
Office 2024
Blog
Office 2024 for consumers Available from Oct. 1
Microsoft announces the release of Office 2024, available Oct. 1, 2024, for consumers and small businesses. This is an ideal solution for users who prefer a one-time purchase rather than a subscription to Microsoft 365. Office 2024 offers new versions of the familiar productivity apps, including Word, Excel, PowerPoint, OneNote, and Outlook, available for both PC and Mac. Microsoft Office 2024 Improved Performance and Speed One of the key improvements in Office 2024 is the focus on better performance and speed. The search function in Outlook has been further refined to provide faster and more relevant results for emails,...
copilot
Blog
Introducing Microsoft Copilot Studio and new features in Copilot for Microsoft 365
At Microsoft Ignite 2023, we are announcing new innovations for Microsoft Copilot-one copilot experience that works across all our platforms, understanding your context on the Web, on your PC and at work to bring the right skills to you when you need them, both at work and in your personal life. Microsoft is the Copilot company. And soon there will be a Copilot for everyone and everything you do. On Nov. 1, 2023, Copilot for Microsoft 365 became generally available to enterprises, and already customers such as Visa, BP, Honda, Pfizer and Chevron, as well as...
windows app
Blog
Microsoft introduces new Windows App for iOS, macOS and PCs
Microsoft recently launched the Windows App, which serves as a replacement for the Remote Desktop app. This new application allows users to stream Windows 11 to various devices, including iOS, macOS and PCs. The app supports various features such as multi-monitor configurations, USB redirection, and account management. There is also improved performance thanks to the use of the Relayed Remote Desktop Protocol (RDP) Shortpath. With the Windows App, users can now connect to Windows 365, Azure Virtual Desktop and Microsoft Dev Box through a single platform. For IT administrators, this platform offers easier administration and better security, while end users benefit from a customizable...
apple macos sequoia
Blog
Discover the new Mac OS Sequoia and iOS 18
In the rapidly evolving digital world, it is essential that small and medium-sized enterprises (SMEs) stay up-to-date with the latest technological developments. Analyst ICT can also help you manage your Apple network and Apple devices. Apple recently released two major updates that can significantly improve productivity and efficiency for businesses: Mac OS Sequoia and iOS 18. In this blog, we discuss what these updates entail and how they can benefit SMBs. Mac OS Sequoia: A new step in productivity and security 1. Improved performance and efficiency Mac OS Sequoia is...
veeam
Blog
Veeam: Critical Vulnerabilities Fixed in Backup and Management Solutions
Veeam recently released a series of critical security updates for several of its solutions, including Veeam Backup & Replication, Veeam Service Provider Console and Veeam ONE. A total of 18 vulnerabilities have been fixed, aiming to strengthen the security of enterprise backup infrastructures. Critical Vulnerability in Veeam Backup & Replication The most prominent patch relates to a very critical vulnerability in Veeam Backup & Replication (VBR), a widely used tool for managing and securing backups within organizations. This vulnerability, CVE-2024-40711, can lead to “remote code execution” (RCE), allowing remote attackers to execute malicious code without...
Whatsapp Business
Blog
Handy! Whatsapp business on multiple devices
The vacation season is approaching, and we've heard the same support question come up several times at our service desk: “Can I use WhatsApp Business on multiple devices at the same time?” Yes you can! In this short blog post, we'll explain how #superlogical! Step 1: Install WhatsApp Business on your primary phone 1. Download and install the WhatsApp Business app from the Google Play Store or Apple App Store. 2. Open the app and register with the phone number you want to use for your business. 3. Complete the installation and configure your business profile. Step 2: Enable the multi-device feature 1. Open WhatsApp...
cyber hygiene
Blog
Cyber Hygiene?
Cyber Hygiene? Never heard of it? But Cyber Hygiene is an essential part of secure business operations. Just as personal hygiene helps prevent health problems, cyber hygiene helps ensure the security and integrity of your digital systems and data. For SMBs, it is critical to implement good cyber hygiene to protect against cyber threats. In this blog, we explain what cyber hygiene entails, why it is so important for SMBs, and how Analyst ICT can support you in its implementation. What is Cyber Hygiene? Cyber hygiene refers to the best practices...
myworkdrive
Blog
My Work Drive: The Ideal Files to the Cloud Solution for SMBs.
Accessibility to company data is critical to a company's success, especially for small and medium-sized businesses (SMBs). My Work Drive offers a perfect solution for this. This service allows businesses to access their documents anywhere, anytime, resulting in increased productivity and flexibility. Still ready to put company data in the Cloud but happy to have it available anywhere. Myworkdrive can help with this. What is My Work Drive? My Work Drive is a file access system specifically designed to enable users to store and edit files in...
analyst ict XLA Xperience Level Agreement
News
What is an Xperience Level Agreement (XLA)?
At Analyst ICT, we understand that successful ICT service delivery goes beyond technical support. To us, super logical! It's about the full experience we offer our customers. This is why we have introduced the Xperience Level Agreement (XLA). This is an approach that focuses not only on the technical measurability of services, but also on end-user satisfaction and experience. In this blog, we explain what exactly an XLA is and why it is so important to us and our customers. What is an Xperience Level Agreement? An Xperience Level Agreement (XLA) goes one step further....
Microsoft
News
We are Microsoft AI Cloud Partner
We are pleased to announce that Analyst ICT has been recognized as a Solutions Partner within the Microsoft AI Cloud Partner Program. This partner status highlights our ongoing commitment and expertise in delivering solutions that are deeply integrated with Microsoft's advanced cloud technologies. A Milestone for Analyst ICT The recognition from Microsoft is an endorsement of our hard work and dedication to technology excellence. We are proud to announce that we are one of the first Microsoft partners to receive this specific recognition. This is not only a testament to our technical skills and deep experience, but it...
microsoft solutions partner modern work
News
Analyst ICT is a Microsoft Solutions Partner Modern Work
At Analyst ICT, we are proud to announce that we have officially achieved Microsoft Solutions Partner Modern Work status. This is an important milestone for our company and a testament to our ongoing commitment to providing the best solutions and services to our customers. In this blog, we want to not only explain what this achievement means, but also thank our team for their dedication and hard work. What does it mean to be a Microsoft Solutions Partner Modern Work? As a Microsoft Solutions Partner Modern Work, we have demonstrated that we have the expertise and skills...
apple opleiding
News
Expert in Apple Technologies
Analyst ICT is officially part of the Apple Consultant Network. This milestone which we reached 2 years ago strengthened our position as a leading ICT solutions provider and highlights our commitment to providing high quality services to our valued customers. One of the many reasons we are proud to join the Apple Consultant Network is our continued investment in the professional development of our team. Our colleague Frank has already proven to be a valuable asset as an Apple Certified Support Professional. But at Analyst ICT, we always strive for more. That's why this week Frank is...
myworkdrive
Blog
MyWorkDrive versus Sync & Share
MyWorkDrive versus Sync & Share: A Safer Alternative for Law Firms. In today's digital world, where collaboration and data security are paramount, MyWorkDrive offers a powerful alternative to traditional Sync & Share services. Designed specifically to meet stringent security, compliance and user experience requirements, this platform is ideally suited for the legal industry. What Makes MyWorkDrive Different? Unlike typical public cloud platforms, MyWorkDrive can be deployed either on-premises or in a private cloud, leveraging existing Active Directory infrastructure to easily provide users with access and permissions. As a certified Microsoft Cloud Storage...
Dutch Cybersecurity Assembly
News
Analyst ICT and the Dutch Cybersecurity Assembly
At Analyst ICT, we understand that the world of cybersecurity is constantly changing and becoming more complex. To provide our customers with the most advanced protection, we recently joined the Dutch Cybersecurity Assembly (DCA). This partnership reinforces our commitment to be at the forefront of cyber threat protection and to provide our customers with the latest security strategies and technologies. What is the Dutch Cybersecurity Assembly? The Dutch Cybersecurity Assembly is a leading organization focused on improving cybersecurity infrastructure and awareness in the Netherlands. The DCA brings together experts from industry, academia, and government...
im 362526
Blog
What is SentinelOne?
In today's digital world, taking the security of your corporate data and systems seriously is critical. At Analyst ICT, we understand the importance of advanced cybersecurity solutions, which is why we are proud to recommend and implement SentinelOne for our clients. While some may recognize the SentinelOne name from Formula One sponsorships, this technology offers much more than name recognition. What is SentinelOne? SentinelOne is a leading endpoint security solution designed to protect organizations from a broad spectrum of cyber threats. Unlike traditional antivirus programs, which often only detect known viruses and malware, SentinelOne makes...
certificering
News
Analyst ICT achieves ISO 9001, ISO 27001 and NEN 7510 Certifications
March was a milestone month for Analyst ICT. We are very proud to announce that we are officially certified for ISO 9001, ISO 27001 and NEN 7510. These recognitions are not only a testament to our ongoing commitment to quality, security and reliability, but also highlight our dedication to providing exceptional services to our clients. A super logical step for us. ISO 9001 is the internationally recognized standard for quality management systems (QMS). The certification confirms that Analyst ICT adheres to best practices for delivering consistently high quality service, with a strong focus on customer satisfaction and a...
decentraal internet
Blog
Decentralized Internet: The Future of Online?
In the rapidly evolving world of technology, the Internet is taking center stage for businesses of all sizes. Traditionally, the Internet has been managed through central servers, but the emergence of decentralized Internet offers a new approach that can be especially beneficial for SME entrepreneurs. One particularly innovative platform in this space is ThreeFold, which is playing a crucial role in the development of this technology. What is Decentralized Internet? Decentralized Internet breaks with the traditional model of centralized servers. Instead, information is stored and processed on a network of distributed nodes. These nodes are managed by different entities,...
Dora wetgeving
Blog, News
Impact of the New DORA Legislation.
The recently introduced Digital Operational Resilience Act (DORA) legislation is an important piece of European legislation aimed at increasing digital resilience within the financial sector. This legislation aims to make financial institutions and their service providers, including ICT service providers, more robust against digital disruptions. Here's what Analyst ICT clients need to know about the impact of DORA and the steps to consider. Increased Requirements for ICT Resilience Under DORA, financial entities and their critical service providers, such as Analyst ICT, will have to meet more stringent requirements for the security of their information systems and communications technologies. This means...
Analyst website
News
Analyst ICT unveils its new website!
It is with great excitement that we announce the launch of our all-new super-logical website, a milestone that beautifully reflects Analyst ICT's evolution over the past two years. This new digital home is designed to more closely reflect our comprehensive services and the values that drive us. The development of our website was a close collaboration with our valued online partner, Yooker, whose expertise and creativity helped us create a platform that is not only visually appealing, but also extremely user-friendly and informative for our visitors. Our new website showcases our passion and ongoing...
wil vierkant
News
Who is Wil van Oorschot?
I am Wil van Oorschot, 39 years old. I was born and raised in Eersel. Together with Lieke we have a daughter Sophie and son Dex. Sophie is 6 years old and Dex will be 3 in July, how time flies.Since 1998 I have been infected with the Carnival virus. I started as ‘brother of’ building the carnival floats and participating in the carnival parade in Eersel. Since 2009 I have been a member of the board of eleven of the carnival association the Buurlanders.Because carnival is more than just the 4 days of festivities at the beginning of the year, I can put my free time in...
Blog
The benefits of working locally but in the cloud?
Analyst ICT has taken another super logical step by integrating Windows 365 Cloud PC with an innovative startup solution (Windows 365 BOOT) that allows users to access their cloud-based desktop directly from a thin client PC, current workstation or laptop. Taking the efficiency and security of cloud workstations to new heights, this integration provides a seamless transition between local and cloud environments, enhanced by the robustness of single sign-on (SSO) and multi-factor authentication (MFA). The essence of this technological advance lies in the ability of users to access their entire Windows environment instantly, without any loss of time, via...
Blog
Fortinet vulnerability CVE-2023-42789
In the ongoing battle to ensure digital security, it is super logical to stay abreast of the latest vulnerabilities and threats. Recently, CVE-2023-42789, also known as FG-IR-23-328, was identified as a significant threat. This vulnerability affects certain versions of Fortinet's FortiOS and FortiProxy due to an ‘out-of-bounds write’ issue, allowing attackers to execute potentially malicious code. Or in plain human terms the customers who have a router/firewall from Fortinet were at potential risk. We understand the risk this could pose to our customers and therefore took immediate action. Our team proactively secured all systems that...
News
Our first GRANTED intern! Meet Jasper!
Last year we welcomed Jasper as an intern at Analyst ICT. Time to get to know him better! Meanwhile, Jasper has passed but we are glad that we can still come to him with our development questions. My name is Jasper and I have the honor to be the very first intern at Analyst ICT. From my study ICT & Media Design at the Fontys in Tilburg I will be doing an internship at Analyst ICT until the summer. In this blog I would like to introduce myself to you and tell a little bit more about my...
Blog
Microsoft Exchange servers vulnerable
28,500 Microsoft Exchange servers have now been confirmed to be vulnerable to elevation of privilege. This puts affected organizations worldwide at significant risk, as many users are connected to Exchange for work. The attack surface may be even larger. In fact, the threat monitoring service Shadowserver has identified 97,000 servers as ‘potentially vulnerable. This depends on the measures administrators have taken. Shadowserver has no insight into whether these 68,500 potentially vulnerable servers have been patched, but again refers to the Microsoft documentation. The Netherlands is among the hardest-hit countries with just over 3,000 cases. Belgium is less affected, with about 1,000 servers....
Blog
Protect your business: Urgent action required FortiOS SSL-VPN vulnerability!
Last Friday, a vulnerability was discovered in FortiOS SSL-VPN. This vulnerability strikes at the heart of what many small and medium-sized businesses use for their daily security needs: Fortinet's FortiGate with VPN. The importance of immediate action cannot be overstated. FortiOS, the operating system behind FortiGate VPN devices, has been discovered to have a critical vulnerability in its SSL-VPN functionality. This vulnerability could allow remote attackers to gain unauthorized access to an organization's network without requiring advanced authentication. The risk? Unauthorized access to sensitive corporate data, customer information, and potentially the deployment of malware or...
Apple logo
Blog
We are proud members of the Apple Consultant Network with ACSP Certification
At Analyst ICT, we are pleased to announce that we are still proud members of the Apple Consultant Network, a prestigious group of independent professional service providers specializing in Apple solutions for small and medium-sized businesses. Plus, we have even more good news: Frank, one of our dedicated team members, recently earned his Apple Certified Support Professional (ACSP) certification. What is the Apple Consultant Network? The Apple Consultant Network consists of independent, local companies that specialize in providing services and solutions based on Apple products. They are trained in the implementation and use...
2FA
Blog
Conditional Access and forced MFA is a reality!
Microsoft is strongly committed to increasing security for its customers, particularly in small and medium-sized enterprises (SMEs), by implementing Conditional Access policies and rolling out mandatory Multi-Factor Authentication (MFA). In this blog post, we explain what Microsoft intends to do with this and how it will benefit SMEs. To us, it's super logical 😉 What is Conditional Access and Forced MFA? Conditional Access is a security measure that makes access to corporate resources subject to certain conditions. These include user location, device status, or a user's risk assessment. **Multi-Factor Authentication (MFA)**, on the other hand, requires users to provide their identity...
News
Analyst ICT is a Cisco partner
It is with great pride that Analyst ICT announces that as of today we are officially a Cisco Partner. This partnership is an important step forward in our commitment to providing our customers with the most advanced and reliable ICT solutions. As a Cisco Partner, we have direct access to a wide range of high-performance networking, security and communications technologies. Cisco, as a global leader in IT and networking, is known for their robust and secure solutions. Their technologies are essential for companies that want to stay ahead in the digital age. Through this partnership, Analyst ICT can now offer its customers...
Blog
Okta hack shows how vulnerable digital authentication is
In recent days, it has become clear how a hack on Okta has major implications for the company's customers. This is because the data captured allows cybercriminals to log into customers' systems. In addition, it shows once again how vulnerable our digital identities are. Earlier this week, Okta reported that data was stolen from its customer service ticket system. However, the data that was captured contains highly sensitive data, which cybercriminals can now also easily access systems of Okta's customers. Okta is a so-called identity and access management (IAM) solution, a competitor of, for example, Microsoft's (Azure) Active...
News
Analyst ICT is an FD Gazelle 2023
Analyst ICT has reached a remarkable milestone by being recognized for the first time as an FD Gazelle, which means that we are now officially among the fastest growing companies in the Netherlands. This prestigious award, presented by Het Financieele Dagblad, is a confirmation of our constant commitment, innovative services and the sustainable growth we have experienced in recent years. The FD Gazelle Awards are an annual indicator of business success, reserved for companies that show continuous growth of at least 20% in revenue over a three-year period, are financially healthy and have a clear vision for the...
Blog
May an employer ask for access to an employee's mailbox?
It happens with some frequency that we receive a request to give someone access to an employee's or colleague's mailbox. As Analyst ICT, we always seek written permission from the organization's management before granting these permissions. But why do we do that now? That's not super logical or is it? Below is a blog article which elaborates on this. What are the rights of an employee? And how is this regulated in the Netherlands and at the European level? Business mail Do you have the right as an employer to give you access to the...
Blog
Microsoft pulls Teams from Office
Microsoft will stop bundling video conferencing app Teams to office software suite Office 365 and cloud software offering Microsoft 365. The company hopes to avoid a possible EU fine for unfair competition. This news release can be read on microsoft's news blog starting this week. The European Commission launched an investigation in late July this year after complaints from messaging app Slack (now part of Salesforce) about market manipulation. According to that company, this is because Microsoft links its meeting software to its office software offerings by default. The question now is whether Microsoft's offering of Teams in its business software suite puts that software ahead of video conferencing software....
Blog
Quality improvement at Analyst ICT therefore three simple questions
At Analyst ICT, we believe that quality is a continuous process, never an end goal. We strive to continuously improve our services and products to meet our customers' needs and expectations. In line with our upcoming ISO 9001 certification, we are introducing a new step in our journey to service excellence: a weekly survey focused on feedback from our customers. Why a weekly survey? 1. Instant Feedback: A weekly frequency allows us to get quick feedback on recently delivered services. This means we can address any issues immediately and improve quality immediately....
Blog
We are a Managed Service Provider (MSP), but what is an MSP?
Let's explain that because, of course, it all has to remain super logical. So what is an MSP? In today's digital world, where technology is evolving faster and more complex, it is crucial for companies to have a solid IT infrastructure. However, setting up and managing these systems can be challenging, especially for companies without specific technical expertise. This is where Analyst ICT comes in as Managed Service Partners (MSPs). But what exactly does this mean and what value can they add to your business? A Managed Service Partner is a third party responsible for...
Blog
Mac OS Sonoma what will it bring to business users?
The landscape of operating systems continues to evolve, and Apple's recent introduction of Mac OS Sonoma proves this once again. Following the successful implementation of Ventura, Sonoma brings a number of improvements and features that are particularly beneficial to business users. Let's take a closer look at these changes. First, performance efficiency has been improved. Sonoma builds on Ventura's already efficient foundation, but with a focus on improved multitasking and optimized system resources. As a result, business users can now perform more tasks more efficiently without sacrificing the performance of your hardware. Second, Sonoma's security has been significantly improved....
Blog
The Impact of the New NIS 2 Legislation on Your Organizations.
The world of ICT and cybersecurity is constantly evolving, driven by both technological innovations and new laws and regulations. Entrepreneurs in the EU must now consider an important new piece of legislation: the Network and Information Systems Directive (NIS 2). The original NIS Directive, introduced in 2016, was the first piece of EU legislation specifically focused on cybersecurity. It was intended to raise the overall level of cybersecurity in the EU. The new NIS 2 directive, intended to update and extend the previous version, has important implications for companies of all sizes. NIS 2 expands the scope of...
Blog
Anyone can become a victim of a data breach
More and more often we hear that data is leaked, even during new customer conversations the example is sometimes brought up. Last week the personal data authority published the following message including the annual report. We thought this was important to share with you. Assume that your personal data has already been leaked, or will be leaked in the future. Therefore, make work of protecting your personal data. That's the central message in the annual data breach report from the Personal Data Authority (AP). Each year, the AP provides an overview of the most important facts, figures and trends regarding data breaches....
dsc0222
Blog
SSH does not work in macOS Ventura for Unifi / Ubiquiti, among others
Some Mac users have found that SSH no longer works on their Mac since they have been updated to macOS Ventura 13 or newer. They usually see an error message when they try to ssh to another server along the lines of “no matching host key type found. Their offer: ssh-rsa“. The obvious reason for this problem is that the version of OpenSSH that comes with macOS Ventura disables RSA signatures by default, so you can solve the problem by either using a more secure hash, or by simply allowing RSA signatures. We'll show you how to do the latter. We'll go...
Blog
What exactly is Exchange Online?
It's been around a long time but just to clarify for many people. Exchange Online is a cloud-based email service from Microsoft that enables businesses and organizations to communicate and collaborate more efficiently. In this blog, we will explore the super logical operation of Exchange Online and its benefits. Exchange Online uses Microsoft's Exchange Server technology, but instead of installing and managing it on local servers, it is hosted in the cloud. This means users can access their emails, calendars, contacts and other information from any location and any device with...
Blog
Why do half pay ransom in incidents!?
Ransomware attacks remain a major problem for organizations worldwide. Despite companies' increasing preparation for such attacks, recent reports from Fortinet and ChannelConnect show that about half of all organizations will be victims of a ransomware attack by 2023. In addition, it is troubling that many companies, even if they are confident in their preparation, still pay ransoms to cybercriminals. This article examines the findings of these reports and explores why organizations often pay ransoms despite their confidence in their security measures. Alarming figures around ransomware attacks From a recent study by Fortinet, a leading company in the field of...
Blog
What is Microsoft Windows 365?
Over the past few weeks, we've been asked a number of times what Windows 365 or Microsoft Windows 365 actually is. In this blog, we answer. Windows 365 is a new and innovative way for businesses to offer their employees access to the powerful functionality of Windows through the cloud. Here are some reasons why businesses should consider Windows 365: First, Windows 365 offers flexibility and mobility. Employees can work anywhere they have Internet access without having to worry about device and software compatibility. This means businesses can give employees the freedom...
Blog
So what are the main requirements of the NIS2 guideline for SMEs?
The NIS2 Directive is a key European legislation aimed at increasing the capacity of EU member states to prevent and respond to cybersecurity incidents. The directive applies to all businesses in the EU, including SMEs. Below are the main requirements of the NIS2 Directive for SMEs: Scope: The NIS2 directive expands the scope of the original 2016 directive. In addition to critical sectors such as energy, transport and finance, other sectors are now covered, such as healthcare, food supply and digital infrastructure. SMEs operating in these sectors must therefore comply with...
Blog
The NIS2 cybersecurity directive
The NIS2 Directive is a European legislation aimed at strengthening cybersecurity in the European Union. It is a revision of the original 2016 NIS Directive and aims to increase the capacity of EU member states to prevent and respond to cybersecurity incidents. The NIS2 directive has implications for all businesses in the EU, including SMEs. For SMEs, the NIS2 directive means that they must comply with new cybersecurity rules. One of the most significant changes is the expansion of the sectors covered by the legislation. In addition to the already existing critical sectors...
Blog
Why is Cybersecurity also important for SMEs!
In today's digital world, cybersecurity is essential for all businesses, regardless of size. However, it is even more important for SMBs because they often have fewer resources to protect themselves from cyberattacks and thus a cyberattack can be even more devastating. One of the main reasons why cybersecurity is important for SMBs is that they are often seen as easy targets by hackers and cybercriminals. Large companies often have extensive security measures and budgets to protect themselves, making small and medium-sized businesses a more attractive target. Cybercriminals can attack SMBs to gain access to valuable information,...
News
Analyst ICT is an SBB learning company
Learning your whole life? That's part and parcel of ICT and we think that's just super logical! To make sure that we start this as early as possible, Analyst ICT likes to train young talent. At the beginning of the year Analyst therefore applied to become a recognized learning company. The Samenwerkingsorganisatie Beroepsonderwijs Bedrijfsleven (SBB) recently visited us to see if we meet all the conditions for this. The result of this visit is that we may call ourselves a recognized learning company as of April 19, 2023. As of the above date, secondary vocational students from the ICT sector will therefore be able to do the practical part of...
web
Blog
Superlogical explanation hosting terms
Because it's super logical to provide people with a good explanation below explaining what some hosting terms mean and do anyway: What is DNS? DNS stands for Domain Name System and converts domain names to IP addresses. Within the DNS of your domain name you can set where the domain, subdomains and mail records may point to. The management of the DNS can be found within the hosting panel (go to the menu, support and hosting panel) When you click your domain name under tab ‘Domain and Hosting’ you will see at the bottom the button ‘DNS management’ What is TTL? TTL is a...
Blog
Microsoft is going to block outdated exchange (email) servers!
Is your company still mailing from an Exchange Server 2007, 2010 or 2013? Microsoft is starting to slow down and eventually block emails sent from vulnerable mail servers. If so, it's time to upgrade to a newer and more secure version of Exchange. Why is Microsoft going to block emails from vulnerable mail servers? Microsoft has decided to block emails from vulnerable mail servers to improve email security and reduce phishing attacks. This decision is based on the fact that vulnerable mail servers are often an easy entry point for hackers into the rest of the network. By blocking emails from vulnerable mail servers,...
Blog
Research: 87% of Benelux organizations affected by ransomware in 2022
Ransomware - an ongoing and evolving threat Ransomware is malicious software designed to infect a target's network and lock down data and systems until a ransom is paid. It is an evolving and diversifying threat that can include stealing sensitive or confidential information and a threat to make the data public unless a ransom is paid. The criminal business model is lucrative - often available as a service and accessible to adversaries regardless of their resources or skill level. Every organization is a potential target. Ransomware attacks can disrupt daily operations and customer supply chains....
Blog
3CX telephony Desktop Client Security Incident
On Wednesday evening, March 29, 2023, we were notified of a serious leak in the Desktop application of one of our VOIP solutions, 3CX. In versions 18.12.407 and 18.12.416 for Windows and 18.11.1213 for MacOS, malicious parties have placed malware to gain further access to systems. In the meantime, we recommend using fixed devices, the mobile app and/or the web application. How the malware could be added has not been disclosed. 3CX says it is conducting an investigation and will provide more information later. From Analyst ICT, we immediately checked all telephone exchanges and in the process...
News
Who is Michel Kok?
I am Michel Kok, 44 years old now. Born and raised in Papendrecht and since 2017 living in Nederweert Eind, a small us is our place under the smoke of Nederweert. There I live together with Nicole and daughter Lianne, 14 years old now. In my spare time I can be found on Sunday mornings in the Eindse Boys uniform and have been playing my games there for quite some time now with the Sunday veterans. On Saturdays along the field hockey field to watch the achievements of Lianne, previously I was trainer/coach for 5 years until the moment she no longer liked it....
Blog
The truth about VPNs: facts and fables debunked
We found another #superlogical blog post that we would like to share with you. After all, we do get these questions from our customers more often than not. Why should you use a VPN in the Netherlands? Internet users in the Netherlands today face a number of risks when going online. Cyber criminals can steal your sensitive information, Internet service providers can track your surfing habits and the government can monitor your Internet activity. A VPN can help you reduce these risks and protect your online privacy and security. A VPN, or Virtual Private Network, is a technology that encrypts your connection to the Internet and anonymizes your online activity. With...
News
Analyst ICT expands but ...
Last period Analyst ICT has been busy looking for new colleagues and we have good news. May 1, 2023 Michel Kok will start in the team of Analyst ICT. Michel previously worked at Axians and lives in Nederweert-Eind. Michel has a lot of knowledge in the field of networks, firewalls, cloud migrations, Microsoft Azure (migrations) and workstations. His knowledge is mainly on the Azure side with expertise on Intune. With this knowledge he wants to help Analyst ICT and its customers grow further. Analyst ICT is very proud to welcome Michel as a new colleague. Did you know that we still have...
Blog
What does google know about you? and how can you remove it?
We came across an interesting blog article on the apple tech website iculture it just didn't seem #superlogical to us that you guys knew this too, which is why we like to share this article with you. Your activities with Google For example, if you use Google Maps and share your location, then Google knows exactly where you are now, where you have been and what you have searched for. This also applies to Google Search, Google Photos and all other services so the company can place targeted ads. You can find out what is being tracked on Google's website and have the...
News
We have moved!
We have been very busy last month! We moved to a great new location in Eersel. Previously we were in Eindhoven at the Boschdijk in the building of We Provide but we are very proud that we now have our own location in the middle of Eersel. As of last month we are located at Nieuwstraat 21a in Eersel. With this step we hope to serve our customers even better. Berry van Bree about this step; “I am very proud that Analyst ICT has already made this step,...
Blog
Microsoft will automatically install Defender with Microsoft 365 subscribers
Microsoft will automatically install Defender antivirus software on Windows 10 and 11 devices with 365 Family and Personal subscriptions via an update in late February. The application will also be added to the Microsoft 365 installer. Until now, the installation of Microsoft Defender was optional, but it, like other 365 apps such as Word and Excel, will now be automatically installed on non-business users with subscriptions. Microsoft writes that on its support site, as Neowin discovered. When non-subscribers decide to bring in 365 apps through the installer, Defender is also installed along with the other apps. Microsoft reports that that should all be done ‘by the end of February. Some users report on Twitter that the...
News
Network the Kempen
Last January a new networking club was founded in the Kempen for entrepreneurs namely “Netwerk De Kempen“. We are super proud that our Berry van Bree is the secretary of this club and co-responsible for its foundation. Netwerk De Kempen promotes cooperation between its members. That requires effort. We make an effort for each other. We want to get to know each other. You want to, because only in this way can you add value for each other. It is therefore necessary that you participate in activities. Of course we do that in a friendly atmosphere. On his Kempen style and with...
News
We are looking for you! Three vacancies at Analyst ICT
Have you noticed that we have 3 interesting vacancies online? We are urgently looking for new colleagues to join our team. From next month we will be working from our office in Eersel with the aim to relieve SMEs in the Kempen region of all their ICT worries. Housing ourselves closer to our customers contributes to this. We are a small team where helping each other and learning from each other is central. We try to understand and answer the customer question in a human and super logical way. What is the question behind the question....
Blog
Windows 11 users will automatically be offered version 22H2 from now on
Microsoft has begun automatically updating Windows 11 version 21H2 to 22H2. Previously, users had to manually download the latest version, but now it will be downloaded and installed automatically. Should you experience any problems because of this, you can of course contact us. Microsoft is going to offer the update first to users who have been using version 21H2 the longest, the tech company writes in an update on its website. It is not clear how long it will take for everyone to be offered the update. If a user's device is found to be incompatible or otherwise problematic, the update will not be installed automatically until...
Blog
Setting up Office 365 mail on an iPhone or iPad
This blog describes how to add your Office 365 email account to an iPhone or iPad. NOTE! Before starting this instruction, please test if it is possible to log in at https://portal.office.com Also if you want to log in from abroad or if you do not have access to your mobile you can use the link above. Supplies An iPhone or iPad Office 365 account Your email address Your password 1. Go to settings Select “Settings” on your iPhone from the main menu 2. Go to email settings Select “Accounts and Passwords” 3. Choose “Add account...” Choose...
Blog
Carefree switching of ICT service provider
Last week we visited a number of companies to discuss a possible switch. These companies indicated that their current ICT partner had an opaque cost structure, no proactive thinking, and poor communication. No response/feedback for weeks on your created ticket. This was the last straw, the bucket is now really full. Then a search for a new ICT partner begins for those companies, many companies look up to this tremendously and it is unnecessary. A switch is always accompanied by change, and a change can involve “hassle.” But it is a conscious choice....
Marion van der Aalst
Blog
Marion van der Aalst
An ode to our indispensable force! At Analyst ICT we are fortunate to work with a team of dedicated professionals, and one of the most indispensable forces within our team is without a doubt Marion van der Aalst. Marion is our jack-of-all-trades, who with her versatility and dedication keeps our two locations at Nieuwstraat in Eersel and Boschdijk in Eindhoven running. If she is not there for a few days we notice it immediately 😉 Marion has been involved with Analyst ICT from the beginning and over the years has developed a deep understanding of our company and...
Blog
Hacks can affect any business, make sure you have a plan!
Cyber attacks and hacks are a risk for every business. In recent times, we have already met at a cybercafe meeting, where we also heard the stories of local business owners. Just people like you and me. That you don't have to be a corporate to be hacked was also proven there. So recognize the danger, embrace the risk and be prepared. European legislation and other parties, such as financiers, increasingly demand that you have your affairs in order. A lot can be gained with a few relatively simple steps. Time to share these with you...
Blog
Choosing between Mac and Windows? Super logical!
There are those contradictions in life where opinions are invariably tightly defined. This is also often the case when it comes to the computer you work with: you are either for the PC, or you swear by the Mac. If you belong to the latter group, then you can stop reading now. For all businesses hesitating between Apple or Windows: five reasons to switch to the Mac. In doing so, we do make the note that not every organization is suited for Mac, and that can be for several reasons. We wouldn't be an Analyst...
Blog
Mac keyboard shortcuts overview
Many of our customers use a Mac, what we noticed is that not everyone knows all the keyboard shortcuts like most Windows users. Therefore in this blog a complete overview of all keyboard shortcuts. Useful and #superlogical What do we call the symbols in the menu and on your keyboard? Command or Cmd “used to apple” Option “used to alt” Control Shift Tab Return Enter Eject Escape Delete Forward delete (fn+Delete on small keyboards) Page up Page down Home (fn-Left arrow key on small keyboards) End (fn-Right arrow key on small keyboards) Arrow keys fn key Overview of Common Mac Shortcuts and Shortcuts on Your Keyboard Shortcuts...
Blog
May personal data go back to the US?
The blog article below (original from ICT Law) seemed super logical for us to share. As Analyst ICT, we think it's important to think carefully about where, and what happens to your data. As you have been able to follow in the news before, there is quite a bit going on about storing data in the US. Here's an overview of the latest developments. On Oct. 7, 2022, U.S. President Biden signed an Executive Order as the next step toward establishing a successor to the EU-U.S. Privacy Shield declared invalid in 2020. This blog explains why the need...
Blog
Microsoft turns on security defaults in all Office and Microsoft 365 environments
Have you noticed it too? Your smartphone or tablet keeps asking for your email password? Your scanner no longer does what it's supposed to do? What's going on anyway? Microsoft has started turning on Security Defaults in phases in Microsoft 365 environments where this security is not yet active. Security Defaults are default security settings, such as activating Multifactor Authentication (MFA). Do you have a Microsoft 365 environment and no MFA set up yet? If so, you will soon receive a request from Microsoft to turn on MFA. Read more in this article about what else...
Blog
Crazy about Apple! What are the best tools and apps?
That we at Analyst ICT are apple minded is obvious. After all, we are one of the few Apple Consultants. As Apple Consultant we know exactly what is possible with the “standard” apple applications and hardware. But what are the best tools and software packages. Below is a list of the programs and tools that we definitely install on our own Apple computers and enjoy every day. Magnet - A perfect window management program for Mac that lets you move windows and resize them with configurable keyboard shortcuts. You can also move windows...
News
Food Bank Bergeijk
A good time to bring attention to the Voedselbank Bergeijk. Analyst's contribution is limited but every little bit helps. The Voedselbank Bergeijk helps the poorest by temporarily providing them with food packages. They do this exclusively with volunteers. In order to provide the clients of the food bank with sufficient food, they work together with companies, institutions, governments and individuals. Together they ensure that poverty is fought, food surpluses disappear and the environment is less burdened. In principle, Stichting Voedselbank Bergeijk never buys food. Financial support is therefore not intended for this. But.
Blog
Cybercriminals abuse employment agency vacancies
Since a number of our clients and associates work in the “staffing industry,” we would like to bring the following article to your attention. Cybercriminals have found a new way to deceive gullible people. They post job openings online, ask applicants for their personal information and whether they want to pay a small deposit to supposedly confirm their identity. In reality, they give all their personal information to unscrupulous criminals. We receive several reports from victims at Cybercrimeinfo recently. We also warn the Fraud Helpdesk, which has recently received an unknown number of reports from victims. Vacancy via “employment agency” It's about...
Blog
Fortinet warns customers of serious rce leak in FortiGate firewalls
Fortinet is warning customers about a serious vulnerability in a number of FortiGate firewalls and FortiProxy Web proxies. The company has released a patch for the bug, which allows attackers to log into an admin account from a remote location. The bug is tracked as CVE-2022-40684, although no public information has yet been registered on it. Fortinet is aware of the bug and writes on its site that it has released a patch for it, but the company itself does not provide public details about it. The patch was implemented in FortiOS 7.2.2. The official release notes also mention the bug with no information. The hacker known as Gitworm says Fortinet has released its...
Blog
What is a TPM chip?
Analyst ICT, together with DKM Solutions, supplies and installs multifunctionals (printer and scanner solutions) from Toshiba. Special attention was given by Toshiba to the TPM 2.0 chip, now many customers also have questions about TPM. This is because Microsoft has made it mandatory for Windows 11. High time to find out in the following blog. #superlogical anyway But what exactly is such a TPM Chip and why does Microsoft require it? Besides Microsoft going down this path, we also see manufacturers of Multifunction printers like Toshiba responding to this. For example, Toshiba is even a...
Blog
Zero-day vulnerabilities in Microsoft Exchange
This article is only applicable if you still have a Microsoft Exchange server on-premises (a physical server). Microsoft has discovered two zero-day vulnerabilities in Exchange Server 2013, 2016 and 2019. In addition, Microsoft has found that these are being actively exploited by cybercriminals. The NCSC (National Cyber Security Center) has designated this vulnerability with the risk factor high/high partly for this reason. This means that there is a high probability that cybercriminals will abuse it and the potential damage resulting from this could be significant. The risk The combination of the two vulnerabilities provide attackers with the ability to run arbitrary code,...
Blog
The end of basic authentication, what's the impact for your organization?
Microsoft is ending support for basic authentication in Office 365 as of Oct. 1, 2022. Uhm, that's a week from the time of writing. That sounds scary, but Microsoft has been discontinuing basic authentication for new customers for quite some time, so chances are it's already disabled for your organization. In many organizations where there has been a printer/scanner/MFP for a long time, we encounter this or with very old software packages that need to be able to send emails. The consequence after Oct. 1 is that this will no longer work. Why is Microsoft turning off basic authentication? To improve the security of Office 365. Basic ...
News
Switching to another IT partner?
Are you looking for a new ICT partner to maintain and manage your computers or computer network? Do you foresee problems with your ICT due to growth? Do you have outdated hardware or do you think your network could be more efficient and cheaper? Would you like a partner with knowledge of both Apple and Microsoft systems? Then you might consider switching to another ICT partner. Analyst ICT has experience in taking care of the complete office automation but also the ICT of your production or factory. With this, we can totally relieve you whether it is one or a few hundred workstations. A transition...
News
Superlogical! Analyst ICT undertakes socially and responsibly!
People Planet Profit Corporate social responsibility is very important to us. We do business on the basis of the People Planet Profit principle. It stands for the three elements that should be combined in a harmonious way: people, environment and profit. The idea behind this principle is that when these elements are not in harmony, other elements suffer. People We at Analyst ICT select our talents at the gate. Because of our integral way of working, we value our team and the mutual cooperation. We supervise our trainees from each team and discipline. We allow these students, adapted...
Blog
Last six months, number of ransomware variants doubled
Cyber security company Fortinet, last week published its semi-annual FortiGuard Labs Global Threat Landscape Report. Research findings covered in the report for the first half of 2022 include: More and more ransomware variants are popping up as a result of the popularity of Ransomware-as-a-Service (RaaS) on the dark web. Cybercriminals continue to target the endpoints of mobile and home workers to gain access to corporate networks. Operational technology (OT) and information technology (IT) environments are attractive targets for cybercriminals looking to take advantage of the growing attack surface and convergence between IT and OT. The arsenal of cybercriminals is being supplemented by increasingly...
Blog
Single sign-on and passwordless authentication for Azure Virtual Desktop
Today Microsoft announced the Insider preview for enabling an Azure AD-based single sign-on experience and support for passwordless authentication, using Windows Hello and security devices (such as FIDO2 keys). This preview includes the following: Enable a single sign-on experience to Azure AD-joined and Hybrid Azure AD-joined session hosts Use passwordless authentication to sign in to the host using Azure AD Use passwordless authentication inside the session Use third-party Identity Providers (IdP) that integrate with Azure AD to sign in to the host Getting started This new functionality is currently available in Insider builds of Windows 11 22H2, available...
d6a3d96 azure ad 613x381
Blog
What is Azure AD Connect cloud synchronization?
For the nerds among us 😉 This article is interresant, read more about Microsoft AD Connect cloud synchronization Azure AD Connect cloud synchronization is a new offering from Microsoft designed to meet your hybrid identity goals for synchronization of users, groups and contacts with Azure AD. This is achieved by using the Azure AD setup agent instead of the Azure AD Connect application. However, the agent can be used alongside Azure AD Connect synchronization and offers the following benefits: Support for synchronizing with an Azure AD tenant from an unconnected Active Directory forest multi-forest environment: common scenarios include acquisition of...
Blog
Using Microsoft Teams instead of WhatsApp?
Covid-19 has given online communication and conferencing a huge boost, and everyone knows it by now “Microsoft Teams.” Many companies use Microsoft Teams as a means of video conferencing. But Teams can do much more than that. Very powerful within Teams is the chat functionality and file sharing that can significantly improve collaboration within your company while doing so in a secure way. Many companies use WhatsApp to maintain communication with employees and customers through chats. Not only in 1 on 1 chats but also in different groups. WhatsApp has almost everyone on...
analyst ict cybersecurity awareness training
Blog
40% rise in weekly cyber attacks
In the second quarter of 2022, the average number of weekly cyber attacks* worldwide increased by 32 percent, compared to the same quarter last year. This reached a peak of an average of 1,200 weekly attacks per organization. In the Netherlands, an increase of 40 percent was measured. This is according to research by security provider Check Point. The Education/Research sector was the most attacked worldwide, averaging more than 2,300 attacks per organization per week. This is a 53 percent increase from the second quarter of 2021. Healthcare saw a 60 percent increase in cyberattacks over the same period to 1,342...
hero azurebackup 1
Blog
Multiple backups per day for Azure Virtual Machines
A nice bit of news from Microsoft. Now under public review is the following; “Azure Virtual Machine Backup allows you to create enhanced policies to take multiple snapshots per day. Azure Backup understands your need to protect mission-critical workloads in Azure Virtual Machines and now offers a preview of a low recovery point objective (RPO) to just four hours. With this capability, you can define the duration in which your backup tasks are triggered and align your backup schedule with working hours when there are frequent updates. Understanding your need for higher retention...
News
Analyst ICT a Microsoft Silver Partner what does that mean to you?
You or your organization probably use Microsoft solutions. With these solutions, you can log in anywhere, anytime, and collaborate with anyone. Provided you set up the environment properly, of course. It is of course super logical that we help you with this. Many advantages We always think from a Microsoft first thought, this means that we first try to solve your customer question with a Microsoft solution. Thanks to the Microsoft Silver partnership, we know all about the latest features, important updates and the latest innovations. In addition, we can contact Microsoft product specialists directly. With those capabilities, we are in...
Blog
Go passwordless with the Azure AD temporary access pass
The new Azure AD Temporary Access Pass (TAP) is available as of today. The new preview feature makes it possible to configure a temporary access password. The main goal to go to completely passwordless without a configured password. What is the new Temporary Access Pass feature? Temporary Access Pass is a new way for creating and onboarding new users with some sort of temporary password for the user. With temporary access pass, it is possible to implement passwordless authentication and MFA, SSPR, Windows Hello methods. With the Temporary Access Pass (TAP) feature, a temporary password will be set for the...
Blog
Microsoft launches Defender for Microsoft 365 Personal and Family
Microsoft adds Microsoft Defender for Individuals to Microsoft 365 Personal and Family subscriptions. Microsoft is making a new member of its growing family of “Defender” branded products generally available today, June 16. The newest member, called “Microsoft Defender for Individuals,” is designed to help secure families of devices, not just Windows PCs. Microsoft has been testing Defender for Individuals for several months under the Microsoft Defender brand name. Defender for Individuals, codenamed “Gibraltar,” is intended to provide consumers with a centralized dashboard for managing and monitoring their online security status on PCs, Macs and iOS and Android mobile devices. As...
Blog
Compliments of logistics competitor
It would just happen to you that a client posts the following from himself on Linkedin! In any case, we are very proud of it! Remaining the very best total supplier for logistics, in the middle of the technological hub of the south #SiliconVenhorst, also means continuously improving your own (digital) infrastructure. After almost six months of preparation, over the past few weeks we have been busy with the transition of our local servers to the cloud in collaboration with Berry van Bree of Analyst ICT. With on May 21 the successful migration to these new servers. This way we make an important step in our strategic goal to move towards...
News
Analyst ICT has been named a Fortinet SMB Hero
We start 2022 off right! Fortinet expressed its appreciation for our partnership. Each quarter, Fortinet rewards partners who have achieved exceptional performance during that period. Analyst ICT belongs this time to this group of valued Fortinet partners. We have already applied the Fortinet many times with our customers. You can read more about this at some of our customer stories. Fortinet is a provider of network security appliances and one of the market leaders in cyber security with specialized solutions that protect businesses from today's sophisticated threats. Its consolidated products and services provide broad and integrated protection against the dynamic...
News
Analyst ICT follow on Linkedin? Superlogical!
Did you know that Analyst ICT can also be followed on linkedin, you will automatically get an update in your newsfeed when we have something new to report. You can find our company page on the following link: https://www.linkedin.com/company/analystict  
Blog
Game changer? Multimedia redirection (MMR) for Azure Virtual Desktop
Multimedia redirection (MMR) provides you with smooth video playback while viewing videos in your Azure Virtual Desktop browser. About for our customers better known as Remote Desktop or Windows 365. Multimedia redirection removes media content from the browser to the local computer for faster processing and rendering. Both Microsoft Edge and Google Chrome support the multimedia redirection feature. However, the public preview version of multimedia redirection for Azure Virtual Desktop has limited playback on sites in the Known Sites list. If you want to test sites in the list in your organization's implementation, you need to enable an extension....
News
Our partner We Provide
In recent years, Analyst ICT has worked closely with We Provide for arranging hosting, domain names but also building “simple” websites. Last year, We Provide became part of iO (www.iodigital.com) which changed quite a few things. Analyst ICT itself already had hosting solutions for websites and domain names and many of the joint customers have now been transferred from We Provide to Analyst ICT. For you as a customer you have a hosting panel at your disposal where you can manage domain names, change DNS but also view invoices. Do you need a...
Blog
Microsoft Active Directory integration on macOS
For companies using Microsoft Active Directory on-premise or via Azure (Microsoft Cloud), Apple has had an excellent integration for years to link the Mac to the Active Directory domain. Benefits are that network users can log in to the Mac without creating a local account for this and all Macs are viewable in Active Directory. In short, you log in to your Mac with the same name and password as you do to the server or your Microsoft Office365 environment. There are also some drawbacks for companies that are increasingly moving toward a hybrid setup with Azure Active Directory....
News
Analyst ICT, Meet Wiebe Burgmans
Who is Wiebe Burgmans? A technician in heart and soul. Ever since I was young I have been busy with computers and everything to do with them. I was born and raised in Bergeijk and still live there with my girlfriend Anoek. In my spare time I like to ride my bike and play tennis now and then! Why did you choose for Analyst ICT? After several years in the role of sales representative, I realized that I was losing my connection with technology. By nature, I build and...
Blog
Covering your tracks at 5 tech giants
The content of this below blog is taken from X4all, at Analyst ICT have had the question so much that we thought it would be useful to share it with you. In this Blog below you will read how to quickly and easily remove your traces from 5 of the biggest tech giants; Google, Facebook, Instagram, Microsoft and Apple. “We know where you are. We know where you've been. We know more or less what you're thinking about.” So said Google chief executive Eric Schmidt in 2010. Guarding your own privacy is constantly balancing between the pros and cons of openness. That Google ...
News
Analyst ICT is 1Password Partner
A survey by SpyCloud shows that about 65 percent of all Internet users still use the same password for multiple accounts. This remains a major risk, as it allows hackers to penetrate multiple accounts with one password. SpyCloud collected 1.7 billion passwords and usernames from more than 750 data breaches. After analyzing this data, they concluded in a report that the majority of Internet users use the same passwords for different accounts. A large amount of these people do not realize the risks this poses. If one of your passwords shows up in a data breach, multiple accounts of yours are in...
News
Make a Memory
Sometimes initiatives come your way from which you think “wow” what a great idea what a great action, so we help from this year Foundation Make a Memory which is committed free of charge and interest in the most difficult situation you can experience as a parent. At the request of parents and through the mediation of healthcare professionals, the Make a Memory Foundation photographs seriously ill, terminally ill and deceased children between the ages of 23 weeks (pregnancy) and seventeen years. The photographs provide parents with comfort and a lasting memory and can substantially assist in processing the loss. The photographers ...
Blog
Unlocking your iPhone when wearing a mouthpiece
A major annoyance with the mandatory wearing of face ID is not being able to unlock your iPhone or iPad with Face ID. You're in the grocery store and you want to grab the app or list and then also pay with Apple Pay and then not be recognized by your iPhone. Fortunately, Apple has developed some features to solve this problem. Below I share how to unlock your iPhone while wearing a mouthpiece. Unlock with your Apple Watch Do you have an Apple Watch Series 3 or newer? If so, you can unlock your iPhone with Face...
Blog
Price increase Microsoft 365 New Commerce Experience
Microsoft recently announced a price increase for its most popular Microsoft 365 solutions. Microsoft launched the New Commerce Experience (NCE) for all so-called user-based subscriptions (‘seats’), including Microsoft 365, Dynamics 365 and Power Platform. We at Analyst ICT are keeping a close eye on Microsoft's developments for you, which is why we have looked ahead to the options available to you to properly renew your Microsoft licenses at the most favorable options. Below you will find more information and our advice. What will change? There are two significant changes coming: A significant price change effective March 1, 2022 After 1...
Blog
Log4j security vulnerability
You've probably seen some of this passing in the media in recent weeks. A critical vulnerability has been found in globally used software that you have probably never heard of Log4j. Therefore, first some explanation; Log4j is embedded in a huge amount of platforms, apps and services. Software from Cisco, IBM, VMware, Fortinet and Red Hat are some examples. The exact application of the library varies, but logging events in applications always plays a role. Consider noting login attempts or the identity of the user of an application. The application processes an event;...
News
Analyst ICT, Meet Bart van Elewout
Who is Bart van Elewout? In a nutshell. I am 47, live in Eersel, am married to Marieke and have 2 daughters (Fleur 15 and Sascha aged 13). My wife is a math teacher at Pius X College, my daughters are at Rythovius College and I am an ICT-er. In my free time I like to be active; field hockey, running, skiing, cycling...! Why did you choose Analyst ICT? I have already done a lot in ICT: from large to smaller organizations I have guided and helped them with their ICT issues. When I got a bit older, I wanted a better balance between work...
owl cropped
Blog
ICT Bergeijk
Born and raised in Westerhoven and Knegsel, Analyst ICT is also active in Bergeijk with the implementation and management of ICT solutions. Analyst ICT offers different ICT solutions aimed at the business customer. We implement and manage ICT solutions in Bergeijk and surroundings that do what they are supposed to do. For hardware, software and the necessary maintenance you have come to the right place. For every company in Bergeijk, Analyst ICT can mean something with managing and implementing ICT solutions. We help and advise starters with laying a good ICT foundation. Think of a stable Internet connection, a...
owl cropped
Blog
ICT Bladel
Born and raised in Westerhoven and Knegsel, Analyst ICT is also active in Bladel with the implementation and management of ICT solutions. Analyst ICT offers different solutions in the field of ICT, aimed at the business customer. We implement and manage ICT solutions in Bladel and surroundings that do what they are supposed to do. For hardware, software and the necessary maintenance you have come to the right place. For every company in Bladel, Analyst ICT can mean something with managing and implementing ICT solutions. We help and advise starters with laying a good ICT foundation. Think of a stable internet connection,...
owl cropped
Blog
ICT Eersel
Born and raised in Westerhoven and Knegsel, Analyst ICT is also active in Eersel with the implementation and management of ICT solutions. Analyst ICT offers different ICT solutions aimed at the business customer. We implement and manage ICT solutions in Eersel and surroundings that do what they need to do. For hardware, software and the necessary maintenance you have come to the right place. For every company in Eersel, Analyst ICT can mean something with the management and implementation of ICT solutions. We help and advise starters with laying a good ICT foundation. Think of a stable Internet connection, a...
owl cropped
Blog
ICT Veldhoven
Born and raised in Westerhoven and Knegsel, Analyst ICT is also active in Veldhoven with the implementation and management of ICT solutions. Analyst ICT offers different ICT solutions, aimed at the business customer. We implement and manage ICT solutions in Veldhoven and surroundings that do what they need to do. For hardware, software and the necessary maintenance you have come to the right place. For every company in Veldhoven, Analyst ICT can mean something with the management and implementation of ICT solutions. We help and advise starters with laying a good ICT foundation. Think of a stable internet connection,...
Blog
How to install TeamViewer QuickSupport for macOS
Below are the instructions to open TeamViewer via Mac. This allows us at Analyst ICT to also help you remotely with your Apple computer. To do this, follow the following steps: Step 1: Download teamviewer https://get.teamviewer.com/analystictof via our support page Step 2: Open the fileIn your download folder you will find the file. Step 3: Confirm the integrityControl that the file is named “Teamviewer QuickSupport”. Confirm the opening of this file Step 4: Confirm the License AgreementConfirm it if you agree Step 5: Set the settingsTake the settings as indicated....
News
Manual Exchange Online
In this article you can read how to set up email address from Exchange Online and Office 365: Outlook app for Windows Outook for Mac 2011 Outlook app for iOS Mail app for Windows 10 Apple mail app Outlook app for iOS Android Mail app Outlook app for Android Set up your Microsoft 365 mailbox in the Outlook app for Windows Follow these instructions to set up your Microsoft 365 mailbox for your Outlook app on your Windows laptop or desktop Open your Outlook app Go to “File” >” Info” > “Account Information” Click “Add +account” Enter your information: Your name:...
News
Customer portal manual
This page is designed to help Analyst ICT customers get started with the Autotask ticket creation and management system. 1. Introduction This is the manual for Autotask's client portal. Autotask is the system that allows you to generate all notifications and tickets from now on. The purpose of this system is to have one overview for you as a client and your regular contact person from Analyst ICT. 2. Welcome e-mail You have just received an e-mail from ‘Autotask’. In this email you are asked to press a link and set a password. Are...
Blog
Making network cable
Want to make / crimp a network cable yourself or extend a network cable? On this page we explain how to do this. For your business environment, we recommend having an e-installer do this. They can also certify and test the network points. Network cable color code In this blog you will find information about the different standards for network cables, CAT6a and CAT5e being the most common types. CAT5e network cables support speeds of up to 1,000 Mbps (1 Gigabit), while CAT6a cables can reach speeds of up to 10,000 Mbps (10 Gigabit). Both types of cables consist of 8 cores and follow the same color scheme....
Blog
Passwordless authentication
We also notice it while working and supporting our clients, passwords are often insecure! Why? People reuse the same password everywhere or make up a password that is easy to guess. Fortunately, passwordless authentication exists: secure login without entering a password anywhere. This new way of logging in is easier and at the same time removes the dangers of phishing, keyloggers and peepers. So a huge gain within your cybersecurity. Passwords remain tricky for any business. Indeed, there is no easy answer to the question, ‘What is a good password policy? Too few requirements? Then passwords become too easy. Too...
Blog
Microsoft launches 365 Cloud PC
Microsoft announced Windows 365 at Microsoft Inspire 2021: a ‘Cloud PC’ that makes hybrid working easy. With Windows 365, you work anywhere and from any device on your Windows workplace in the cloud. This service / Cloud PC is available for use as early as Aug. 2. It may sound a bit confusing, because Microsoft previously bundled Office 365 into Microsoft 365 and now you have Windows 365. Windows 365 is just a completely different service, which is a VDI (Virtual Desktop Infrastructure) solution. VDI allows your employees to work from their devices on a virtual desktop. Both the operating system and all the applications...
Blog
Vacancy: ICT Consultant
For our company we are looking for an ICT Consultant (full-time) to join our team. A digital jack-of-all-trades who likes to visit customers and who can handle Microsoft networks, enjoys a Cloud challenge and gets excited about virtualization, servers, cloud and networks and everything that goes with it! Analyst ICT: a personal and understandable explanation and customized ICT automation. Analyst ICT provides daily solutions for SMEs. Hereby we believe that ICT automation through insight, improvement and support can do the maximum for an organization. What started innocently last year as a start-up is...
Blog
Setting up Office 365 mail on IOS
It's been vacations, mail off the phone for many and now time to put it back. This tutorial describes how to add your Office 365 email account to your iPhone or Ipad. NOTE: Before starting this tutorial, please test if it is possible to log in at https://portal.office.com Also if you want to log in from abroad or if you do not have access to your mobile you can use the link above. Requirements An iPhone Office 365 account Your email address Your password Step 1: Go to settings Choose on your iPhone from the main menu....
Blog
Apple update “Spring loaded”
Last Tuesday marked the first virtual Apple presentation of 2021. In exactly 60 minutes, the presentation lived up to its name, Spring Loaded. Indeed, it was packed with announcements of new products! Wondering what Apple had in store? We sum it up for you below. New color for iPhone 12 In addition to the already existing colors of the iPhone 12, this model is also available in purple from April 30. This brings the total number of colors to 6. The purple iPhone 12 can be ordered starting Friday, April 23, 2 p.m. and will be available starting Friday, April 30. Read...
Blog
Analyst ICT now provides mobile telephony as well
We have great news! We may call ourselves mobile telecom provider on the network of KPN The management of your ICT gets a logical addition from Analyst ICT. In addition to our ICT and cloud services, fixed telephony / voip services, from now on we also offer mobile telephony solutions. This makes your cell phones, smartphones and tablets an integral part of your ICT management. As we know, KPN provides the best network in our region, which is why we provide services over KPN's trusted network. This enables us to provide optimal quality and...
Blog
Analyst ICT receives Apple Consultants status
Last week, Analyst ICT was added by Apple as an Apple Consultant (ACN) to the Apple Consultants Network. Apple products are loved and widely used not only in private, but also in business. With an iPhone, iPad or Mac in their hands, your employees are able to get the most out of their work. Analyst ICT is the Apple expert in the Kempen and surroundings to make this possible within your company. To ensure maximum performance, Apple works with the best experts who are housed in the Apple Consultants Network. Analyst ICT is such an expert. We have everything in house to make your...
Blog
How Frank Houtappels provides
This article was written without the knowledge of Frank Houtappels. He is director/owner of We Provide and Analyst ICT and I am sure he is going to sit and change everything I write. Not to come off better, no, rather to tone it down (nuance he calls it). After all, Frank is one of the most humble people I know. And that trait doesn't really help promote your company. And as an IT company, that's needed more than ever; employer branding. After all, Web Developers and other techs have reached Hollywood star status. Senior Developers...
Blog
Apple update “Hi, speed!”
After last month's presentation in which Apple announced new iPads, last night it was time for new iPhones. But before these were presented, it was time for something else first.... HomePod mini Apple started by introducing the new HomePod mini. The device is shaped like a small ball and features volume buttons on the top. The top also features lights that can change color. Backlit touch control, Apple calls it. HomePod mini offers support for several services. These include TuneIn, Amazon Music and Apple Music. Spotify is not supported (yet). Apple introduced...
Blog
Apple update “time flies”
Time Flies Last night it was time again for the traditional Apple Keynote, and while September is normally dominated by the new iPhone, this time it was only the Apple Watch and iPad that received attention. In a presentation with the slogan “Time flies,” Apple announced two new models of both the Apple Watch and iPad. Read all the announcements in a row below. Apple Watch Series 6 The biggest new feature of the Series 6 is a new sensor that measures the oxygen level in your blood. In 15 seconds, an algorithm measures the...
Blog
COVID-19 DDoS attacks
Some of our customers and suppliers have also suffered DDoS attacks. But what was a DDos attack again? Denial-of-service attacks (DoS attacks) and distributed-denial-of-service attacks (DDoS attacks) are attempts to make a computer, computer network or service unavailable or more difficult to access for its intended customers.[1] The difference between a ‘regular’ DoS attack and a distributed-DoS attack is that in the latter case, multiple computers simultaneously carry out the attack on their target. The report from antivirus software producer Kaspersky say the following; The Q2 2020 DDoS attacks report has revealed that the number of DDoS attacks tripled in the second quarter of 2020 compared to Q2 2019....
News
Analyst ICT, Meet Berry van Bree
Who is Berry van Bree? A social and passionate ICT-er. Since childhood interested in everything to do with computers. I was born and raised in Knegsel and around the age of 14 moved to the neighboring village of Steensel. In my spare time I like to play a game of soccer and go on winter sports, at the risk of my own body! Why was starting Analyst ICT a Superlogical idea? After completing my education, I started at Ictivity as a Junior Engineer. In 4 years, I had the opportunity to look around at several great companies and found out...
News
Analyst ICT, Meet Frank Houtappels
Who is Frank Houtappels? An inquisitive entrepreneurial nerd. After I obtained my Microsoft Certified System Engineer in 1999, it is impossible to imagine my life without computers. I grew up on a market garden in Westerhoven and have been living in Steensel since 2011. In recent years a lot has happened, I started with Tacticus ICT in 2000 where I worked with great pleasure until 2014. In 2003, We Provide was created which is proudly part of iO since 2021. For both companies I am currently active in different “entrepreneurial roles”. Why was Starting Analyst ICT a Superlogical....

A newsletter

Superlogic right?