The PSTN Switch-Off: Future proof your telephony with Microsoft Teams

In the rapidly evolving landscape of telecommunications, there is a crucial date that charities should be aware of: the switch-off of the Public Switched Telephone Network (PSTN) in December 2025. This transition will mark a significant milestone in the journey towards fully digital communication infrastructures. After this date, all traditional copper phone lines will cease…

How to get Cyber Essentials certified

In 2023, the UK government published two reports that were important for the nonprofit sector – the NCSC’s Cyber Threat Report: UK Charity Sector, and the Cyber Security Breaches Survey. These reports share common themes around the importance of authentication, security updates, updating firewalls, and crucially, Cyber Essentials as a useful framework to help protect your…

Smartdesc are Carbon Balanced!

As part of our commitment to the local and global environment, Smartdesc have been working in partnership with World Land Trust (WLT) to offset our unavoidable carbon emissions. We are proud to announce that we have been awarded their Carbon Balanced Certificate. So, what does this mean? Using the Carbon Calculator created by WLT, we…

Reduce helpdesk workload & elevate your IT team with good ITSM

The charity sector has undergone significant transformation in recent years, with digital acceleration, shifts in working models, and increasing pressure on internal IT resource acquisition and retention. This has necessitated a rethinking of IT Service Management (ITSM) within the sector. In this article, charity IT specialists, Smartdesc, and ServiceNow’s nonprofit team ServiceNow.org share their advice…

Data breaches – the consequences of misusing personal data

Data breaches are a serious threat in today’s digital age, especially for nonprofit organisations. While much attention is given to high-profile cyber attacks, internal staff members sometimes mishandle personal data in their care, creating a digital nightmare. One of the more common data breaches involves unauthorised access to databases containing sensitive service user information. These…