Working with your IT Teams to deliver business solutions
  • There are no suggestions because the search field is empty.

Welcome to our blog, we welcome your comments and feedback plus you can also follow us on social media using the links below:

  • Twitter logo
  • LinkedIn logo

ICEbreaker December 2015

by Owen Redmond | December 20, 2015 | | 0 Comments
Hello and welcome to your second edition of our monthly newsletter, ICEbreaker from ICE, the travel technology IT consultants. We’re sending you this ...
Read More

Cyber Attacks

by Owen Redmond | December 10, 2015 | General News & Events | 0 Comments
Cyber Attacks: £600k- £1,15m is the average cost of a security breach. Who’s Attacking you?
Read More

Windows 2003 end of life

by Owen Redmond | April 8, 2015 | General News & Events | 0 Comments
Microsoft Windows 2003 server is nearing its end of life. Microsoft have announced that they will be terminating all support for the Windows 2003 ...
Read More

Success at TTE 2015

by Owen Redmond | March 3, 2015 | General News & Events | 0 Comments
ICE are pleased to announce another successful year at the Travel Technology Europe (TTE) at the London Olympia. The event provided an excellent ...
Read More

The benefits of outsourcing your IT services.

by Owen Redmond | January 18, 2015 | Products & Services | 0 Comments
Outsourcing support can often be seen as a daunting prospect, leaving support in the hands of another company can be daunting, but it doesn’t have to ...
Read More

Microsoft 365, the solution to your online business needs.

by Owen Redmond | January 11, 2015 | General News & Events | 0 Comments
In today’s technological world business doesn’t stop when you leave the office. The demands of business means they now need to be ready and available ...
Read More

Is there such thing as being too careful with internet security?

by Owen Redmond | November 25, 2014 | General News & Events | 0 Comments
If a company isn’t careful, IT systems can be often left completely exposed to malware and viruses. One security breach is all it takes for a ...
Read More

    Leave a Comment