How To Guides

Step-by-step instructions for common IT tasks. From basic setup to advanced troubleshooting - find the help you need.

General Users

Network & Internet

Configure networks and troubleshoot connectivity issues.

How to Boost Wi-Fi Signal Strength at Home

Router placement, channel selection, and extender setup.

How to Set Up Guest Wi-Fi for Visitors

Isolating networks, time limits, and QR code sharing.

How to Troubleshoot No Internet Connection Issues

Modem resets, cable checks, and DNS flushing.

How to Secure Your Router Against Unauthorised Access

Firmware updates, admin password changes, and MAC filtering.

How to Monitor Data Usage on Your Home Network

Tools for tracking bandwidth hogs and setting alerts.

How to Connect to Public Wi-Fi Safely

VPN usage, avoiding sensitive activities, and checking for HTTPS.

How to Set Up a Mesh Wi-Fi System for Whole-Home Coverage

Node placement, app configuration, and performance testing.

How to Fix Dropped Connections on Wireless Devices

Interference sources, firmware updates, and band switching.

How to Use Ethernet for Faster Wired Connections

Cable types, port setup, and speed testing.

How to Set Up a Virtual Private Network (VPN) on Mobile

App installation, server selection, and auto-connect features.

General Users

Security & Privacy

Protect your devices and data from threats.

How to Enable Biometric Security on Devices

Fingerprint/face ID setup and fallback PINs.

How to Respond to a Suspected Virus Infection

Isolation steps, scans, and data backup.

How to Use Encryption for Sensitive Files

Tools like BitLocker or FileVault for full-disk protection.

How to Review and Revoke App Permissions on Mobile

Checking camera, location, and contact access.

How to Set Up Automatic Security Updates

Scheduling on OS and apps to stay protected.

How to Identify Fake Websites and Scams

URL checks, SSL certificates, and browser warnings.

How to Secure Your Online Banking Sessions

Two-factor setup, session timeouts, and secure browsers.

How to Manage Privacy Settings on Smart Devices

Camera covers, microphone mutes, and data sharing controls.

How to Create a Recovery Disk for Emergencies

USB creation and booting instructions.

How to Protect Against Ransomware Attacks

Backup strategies and avoidance tips.

General Users

Hardware Maintenance & Upgrades

Keep your hardware running smoothly and upgrade components.

How to Replace Hard Drives or SSDs in a PC

Data cloning, installation steps, and partitioning.

How to Clean Laptop Fans and Vents

Disassembly tips, compressed air usage, and reassembly.

How to Upgrade Graphics Cards for Gaming

Compatibility checks, installation, and driver setup.

How to Set Up External Storage for Backups

HDD/SSD formatting, connection types, and ejection safety.

How to Troubleshoot Battery Drain on Laptops

Power settings, background apps, and calibration.

How to Add More Storage to Your Smartphone

SD cards, cloud options, and file management apps.

How to Repair Loose USB Ports

Cleaning, cable checks, or professional fixes.

How to Configure Multiple Displays for Workstations

Extended vs. mirrored modes, resolution matching.

How to Maintain Printer Ink and Toner Levels

Monitoring, refills, and cleaning printheads.

How to Upgrade Operating Systems Safely

Backup prep, compatibility checks, and rollback options.

Business & General

Cloud & Data Management

Manage files and collaborate across cloud platforms.

How to Sync Files Across Devices with OneDrive

Folder selection, offline access, and sharing links.

How to Use iCloud for Apple Device Backups

Storage management, restore processes, and family sharing.

How to Migrate Data to a New Cloud Provider

Export/import tools, data integrity checks.

How to Collaborate on Documents in Real-Time with Google Workspace

Sharing permissions, comments, and version history.

How to Set Up Shared Calendars for Teams

Integration with email, reminders, and availability views.

How to Archive Old Emails Without Losing Them

Folder organisation, search filters, and export options.

How to Use Dropbox for Large File Transfers

Link sharing, expiration dates, and request features.

How to Integrate Cloud Storage with Desktop Apps

Sync clients, auto-upload folders.

How to Recover Deleted Files from Cloud Trash

Time limits, restore steps.

How to Encrypt Cloud Data for Extra Security

Client-side tools and provider options.

Business

Business Productivity & Collaboration

Optimise workflows and team collaboration.

How to Implement Slack for Team Communication

Channel creation, integrations, and notification settings.

How to Use Microsoft Teams for File Sharing and Calls

Channels, tabs, and meeting recordings.

How to Set Up Shared Drives for Business Collaboration

Permissions, versioning, and access audits.

How to Train Employees on Productivity Software

Basic tutorials for Excel formulas, PowerPoint designs.

How to Automate Email Responses with Templates

Rules in Outlook or Gmail for efficiency.

How to Manage Tasks with Tools Like Microsoft To Do

Lists, reminders, and sharing.

How to Conduct Virtual Team Building Activities

Tools and ideas for remote engagement.

How to Set Up Webinar Software Like GoToWebinar

Hosting, registration, and analytics.

How to Use CRM for Customer Follow-Ups

Lead tracking, automation, and reporting.

How to Integrate Calendar Apps with Project Tools

Syncing deadlines and meetings.

Business

Business Network & Infrastructure

Build and maintain reliable business IT infrastructure.

How to Design a Secure Business Network Layout

Firewalls, switches, and segmentation.

How to Implement Firewall Rules for Office Security

Inbound/outbound traffic controls.

How to Set Up NAS for Centralised Storage

RAID configurations, user access, and backups.

How to Monitor Network Traffic for Anomalies

Tools like Wireshark basics and alerts.

How to Configure Remote Access Servers

VPN gateways, port forwarding safely.

How to Upgrade Business Internet Plans

Speed assessments, provider comparisons.

How to Set Up IP Cameras for Office Surveillance

Network integration, app viewing, and privacy.

How to Manage Bandwidth for Multiple Users

QoS settings, prioritisation for VoIP/video.

How to Troubleshoot Server Downtime

Log checks, reboots, and hardware diagnostics.

How to Virtualise Servers for Cost Savings

Hypervisors like VMware, VM creation.

Business

Business Security & Compliance

Protect your business and meet compliance requirements.

How to Comply with GDPR Data Protection Rules

Consent forms, data mapping, and breaches.

How to Train Staff on Phishing Awareness

Simulations, quizzes, and reporting protocols.

How to Implement Endpoint Protection for Devices

Centralised management, threat detection.

How to Create Incident Response Plans

Team roles, escalation, and post-mortem.

How to Audit User Access Logs Regularly

Tools for reviewing logins and activities.

How to Secure Cloud-Based Business Apps

API keys, encryption, and monitoring.

How to Handle Employee Device Policies (BYOD)

Guidelines, MDM software setup.

How to Back Up Servers with Redundancy

On-site/off-site, snapshots, and testing.

How to Encrypt Business Communications

Email tools, secure messaging apps.

How to Prepare for Cybersecurity Insurance Audits

Documentation, risk assessments.

Advanced

Advanced Cybersecurity

Enterprise-grade security implementation and threat protection.

How to Implement Zero-Trust Security in Your Network

Principles of zero-trust, verification processes, and tool recommendations.

How to Conduct Penetration Testing Basics

Tools like Metasploit intro, ethical guidelines, and reporting.

How to Set Up Intrusion Detection Systems (IDS)

Open-source options, alert configurations, and response.

How to Manage Privileged Access in Businesses

Least privilege principles, auditing, and tools.

How to Secure API Endpoints for Applications

Authentication, rate limiting, and encryption.

How to Implement Data Loss Prevention (DLP) Strategies

Software setup, policy rules, and monitoring.

How to Use SIEM Tools for Log Management

Basic setup, correlation rules, and alerts.

How to Comply with PCI DSS for Payment Processing

Controls, audits, and tokenisation.

How to Set Up Secure Remote Access Policies

VPN mandates, device compliance, and logging.

How to Protect Against Advanced Persistent Threats (APTs)

Detection methods, segmentation, and hunting.

Need Professional Help?

Can't find the guide you need or prefer hands-on support? Our team is ready to help with any IT challenge.