IT Network Installations

TwentyFour IT

Our team of trusted network engineers have over 10 years’ experience installing and configuring an IT setup which delivers results for your business.

Whether it’s hardware or a network installation solution you are looking for, we can help you decide on the best, most cost-effective option. There are many factors our engineers will take into consideration, especially if you are building or upgrading a new physical location for your network.

Benefit from

  • Experienced, trusted onsite engineers to carry out your IT installation
  • Receive honest, useful advice from industry professionals
  • Trust in the knowledge that you are covered under our guarantee should you have any concerns
  • A professional installation from start to finish, with as little disruption to your business as possible
  • A complete report of work undertaken

Services We Offer

Our designers and installers create and build networks, physically and virtually to not only fit in with your business and meet your relevant requirements, but to ensure what we put in place for you is scalable and can be removed or upgraded with minimal disturbance to your setup and existing network.

Cabling can be a nightmare for many businesses, particularly, where a server is located and the addition of new equipment, leading to increasingly more cables and connections scattered around your offices. Our installation team are highly experienced in

  • Organising and re-routing cable whilst making sure that visually, your network is correctly configured from each point to point.
  • Install and relocate wireless access points for improved signal reach,
  • Run ethernet and fibre optic cabling, reconfigure a wireless network or upgrade existing network solutions to increase the speed and transfer of data.

No matter what the size or requirement of your IT network installation, we have the resources, knowledge and experience, to vastly improve your current network setup, or to plan and execute an entirely new installation.

From securing the hardware to setting up applications, to installing the cabling and laying out the network, we can help you achieve what you’re looking to get out of your IT projects.

Our onsite engineers have had a wealth of experience installing and upgrading networks for multiple clients across a wide variety of locations and industry.

You will benefit from a network that is built to last and all work comes with our guarantee. Should you experience any ‘teething’ issues, or you have any concerns, a member of our team will be more than happy to resolve these.

A messy data cabinet can become a serious issue within your business. Not only is it a health and safety issue but you also run the risk of having a unreliable, crowded data cabinet. This can also lead to unforeseen downtime which no business wants. Having a well-kept tidy cabinet will ensure it is easy to run and in the case of a problem arising one of our engineers will be able to quickly trace the cables to easily ensure the problem is fixed as quickly and efficiently as possible.

Our highly skilled engineers can reorganise, tidy and repatch your system to ensure you are getting the maximum performance out of your network.

  • Untangle and unravel years of cabling abuse
  • Removing all patch cables
  • They will ensure cables are the correct length and input a colour coded system to help management of your systems in help manage the system in the future.
  • Our team is fully flexible and can perform this out of business hours to ensure we don’t interrupt your working environment.

Does your IT support fry your Brain?

We understand that it can be daunting, but we are here to help.

Latest News

TwentyFour IT

How to Check If Your Email Account Has Been Breached

It’s hard to find someone who hasn’t had their email account hacked at some point. Many people believe they aren’t a target for being hacked as they don’t hold valuable information. This is incorrect and everyone can hold information which can expose threats to an organisation.“Cybercrime is the greatest threat to every company in the world.” (Ginni Rometty, Chairman, President and CEO, IBM)

One of the most common ways cyber crimes happens is through your email account. In this article we will give you a breakdown of how an email account is breached. We will also discuss what measures you can take to ensure you are following the best practices to protect your accounts.


Let’s start with how an attacker could have gained access to your account. We are seeing more frequent incidents where users are been targeted by email phishing. This is essentially someone sending you an email to try gain information out of you. This can be as simple as them using your email layout/signature to target your clients or even members of your staff.

Another way is with emails containing links. This can be in the form of a PDF attachment on the email or there could be a link directly within the content. When you click on this link you will be prompted with a login page that is a replicate of the website/business they are impersonating. If you enter any information on this page e.g. email address /password, the attacker will now have gained access to your information. They will now be able to login into your email account.


There are constantly new techniques being developed against stopping these attacks from happening. However as fast as these are being developed and implemented attackers are quickly coming up with new ways to target people or companies. Unfortunately for the team fighting back against them, this method is very difficult. This is because people often receive many emails containing several links in them. It would require training our software to examine each link on an individual basis to decide whether it’s an authentic or corrupt link.

In the past attacker’s have gained access to mailboxes by sending out a mass spam email to all your contacts. As more people have becoming aware of generic spam email, the attackers are developing new tactics which are more inventive and methodical.  One method they are undertaking is, that once they have gained access to your account they will then spy on your account in order find out as much information as possible this will include…

  • Gathering intelligence about you
  • What you do
  • Who you talk to
  • Your position in the company
  • How you word your emails.

They may also put a forward on your account. This will then forward any emails you receive to an email account they control.  By doing this the attacker doesn’t have to stay logged into your account and the forward will remain even if you change your password.

Once they have gathered the information they require from you, they may decide that you’re not a target worthwhile. Nevertheless, they may use the information they have gathered to target someone higher up in your organisation like an accountant. Just think about what an attacker could do with access to your accountant’s mailbox. Your invoices, your customers invoices or possibly your bank details.

By using this information, an invoice can be created that looks identical to your organisations. The only change will be that somewhere in it will have or include something about “we have updated our bank details”. This can then be sent to one of your clients from the email addresses they have gained access to.

As most businesses have a good relationship with there clients and have gained a shared trust from them. Clients will pay this to the details they have received as they recognise and do business with you.

Okay, How Do I Check?

If you are using Outlook, under the Home tab you should have an option to manage your inbox rules.

Where to find Manage Rules in Outlook

This will then open a box that displays all the rules you currently have on your mailbox. Most people will have rules set in place to move emails from X folder over to Y folder.

Once here you will need to look for is any rules that forward or redirect emails. The only way to check this is to check each rule individually as they could have named the rule to something which you would suspect as not being legit.

When checking the rules in place, look for anything that contains the words “forward” or “redirect”. Pay very close attention these.

If you do have a rule that is forwarding/redirecting emails to an unknown email address this is a very strong indicator that someone has had access to your account at some point in time and they may still be monitoring your emails.

There is also a seconded type of forwarding. However, this is something which would need to be performed by your IT department. This is a quick test which usually takes couple of minutes to perform. This check is very advisable and highly recommend.

It may not be realistic to perform the above task if your have a lot of users within your organisation. You may also not feel confident with users checking this themselves. If so, you can ask your IT to check. This will involve taking all the rules people have set up and checking for works such as ‘forward’ and ‘redirect’.

My Account Is Clean, How Do I Secure Myself?

If you are using an Office365 licence which is Business Premium or above (this does not include Exchange Online Plan 1) then you can ask IT to setup multi factor authentication on your account.

With this method installed on your account if anyone manages to figure out the password, they would also need the code that is texted to your mobile phone to login to your account and access your data. So, unless the attacker also has your phone. Your safe.

What Else Can be Done?

IT can also put something in place to detect auto forwarding of emails and notify and/or block if one has been detected. This would be an early warning of a potential breach.


Putting these practises into place can help protect your email account from becoming compromised. There are still ways in which cybercriminals can access your information but by following these practises you are reducing the risk of expose your business to these types of threats.

TwentyFour IT

If you would like more information on the different security services we offer to keep your business secure click here.

Or if you would like to speak with our team, please get in touch with us here.

Sign up to our Newsletter

TwentyFour IT

(We do not share your data with anybody, and only use it for its intended purpose)