Communications: 1 simple and easy way to streamline your communications.


Meeting the Needs of a Growing Business!

In a world of evolving business communications strategies, Spiff and Spruce Commercial Cleaning found itself at a crucial crossroads. During a pivotal meeting between Rachel Kanek, the brains behind Spiff and Spruce, and our team, the path forward became clearer than ever.

Rachel, a master in her industry, was eager to explore new avenues that could set her company apart. One of the immediate challenges we identified was the reliance on her personal mobile number as the primary point of contact in advertisements, on company vans, and for customer communications. This was not uncommon in small businesses but it presented certain limitations.

The Dilemma: Landline Numbers and Perceptions in Modern Business:

Customers often perceive a company’s professionalism and reliability through the communication information provided. While mobile numbers are practical, some clients prefer working with companies that display a more established presence, typically associated with landline numbers.

The Solution a dedicated landline number for all communications :

During our meeting, we introduced Rachel to an innovative service designed to address this precise challenge. Spiff and Spruce Commercial Cleaning could now have a dedicated local landline number that seamlessly filtered and forwarded calls to Rachel’s mobile phone. This small yet impactful change could make a substantial difference for a growing enterprise like Spiff and Spruce.

Key Benefits of Business Communications :

Enhancing Credibility: By having a landline number featured prominently in their advertisements and communications, Spiff and Spruce was able to instantly enhance their professional image. This subtle alteration allowed them to resonate with a broader client base who associated landline numbers with trustworthiness.

Call Differentiation: The implementation of a landline number also allowed Spiff and Spruce to differentiate customer calls. Calls could be seamlessly routed to the right team member’s mobile phone, creating the crucial first impression the company desired.

Efficient Voicemail Management: In addition to the landline number, we incorporated a voicemail-to-email feature. This proved to be a game-changer, as it enabled Spiff and Spruce’s team to access voicemails at any time and from any location through their computers. No more missed messages or delays in addressing client inquiries.

No Need for a Complicated System for your Communications:

One of the most remarkable aspects of this service is that it doesn’t require an elaborate telephone system. What it demands is the willingness of an MSP (Managed Service Provider) to support small businesses during their growth phase. With our assistance, Spiff and Spruce Commercial Cleaning was able to make this transition smoothly and effectively.

In conclusion, this case study showcases how Spiff and Spruce Commercial Cleaning, under the visionary leadership of Rachel Kanek, made a strategic move that not only improved their professional image but also enhanced communication efficiency. This small but impactful change played a significant role in the company’s ongoing growth and success. It’s a testament to the power of innovation and adaptability.

Spiff and Spruce are a master in their industry check our their blog and hear about the importance of builder’s cleans and the importance of preparing your holiday lets

How JLex Networks Can Transform Private Schools and Nurseries through Advanced Technology

Visionary Educators of Private Schools and Nurseries, are you prepared to embark on a transformative journey into the world of advanced technology? Your quest for cutting-edge solutions concludes here. Introducing JLex Networks – a trailblazing partner dedicated to revolutionizing your institution’s technological landscape. Our three-pronged approach, encompassing Managed Antivirus, Hosted Telephony, and Expert IT Support, is meticulously curated to elevate your establishment while providing unwavering guidance.

Embark on this blog journey with an enticing glimpse into a technologically empowered classroom, where engaged students and inspired educators come together, encapsulating the potential of JLex Networks’ offerings. This visual ignites a sense of aspiration and resonates deeply with private school and nursery professionals.

1. Managed Antivirus Technology : Defending Digital Frontiers

In a digital realm fraught with cyber threats, JLex Networks’ Managed Antivirus service stands as a guardian of your institution’s virtual boundaries. Immerse your establishment in cutting-edge security that shields against evolving risks. This service ensures a seamless educational environment, reinforcing your commitment to safety and the integrity of confidential data.

2. Hosted Telephony: Bridging Communication Gaps

Wave farewell to antiquated communication methods and embrace a connected future with JLex Networks’ Hosted Telephony service. Elevate parent-teacher engagement, amplify internal collaboration, and streamline operations with sophisticated telephony solutions. Experience the power of smooth interactions, advanced functionalities, and customized configurations tailored to your institution’s identity.

3. Expert IT Support: Navigating Technological Horizons

Embark on a voyage into the digital age with JLex Networks’ specialized IT support, meticulously designed for private schools and nurseries. Our adept team comprehends the intricacies of your operational landscape, offering proactive monitoring, rapid issue resolution, and personalized consultations. Entrust your technology realm to us, allowing you to nurture educational excellence with confidence.

4. Crafting Tailored Solutions: Your Institutional Identity, Amplified

JLex Networks’ ethos revolves around customized solutions, acknowledging the unique DNA of each educational institution. Collaborate closely with us to decipher your aspirations, challenges, and budgetary considerations. The outcome? Bespoke IT solutions that seamlessly align with your institution’s ethos, fostering efficiency, productivity, and student success.

5. Embracing the Digital Technology Era: Leading with Innovation

In an era marked by rapid technological evolution, partnering with JLex Networks ensures your private school or nursery’s pole position. Our commitment to staying abreast of the latest trends positions your institution as an innovation torchbearer. Equip your students with the digital prowess needed to excel in an ever-changing world.


Unleash the potential of technology within your private school or nursery through JLex Networks’ comprehensive suite of services – Managed Antivirus, Hosted Telephony, and Expert IT Support. Commence your institution’s technological evolution today by scheduling a consultation. Allow us to architect your technological success, as you inspire and shape the leaders of tomorrow in a digitally empowered world.

Take a look at this article on 14 school documents leaked by hackers

Take a look at our services – and discover the technology and support we can bring to private schools and nurseries across London and the South East

5 Facts on Cyber Protection: The Importance of Antivirus Protection in an Age of Cyber Attacks. Lets get Secure

In the ever-evolving world of cyber threats, the amount of cyber attacks looms larger than ever. Hackers have honed their techniques to a razor’s edge, breaching business networks with unprecedented sophistication and exploiting vulnerabilities for their gain. Recent headline-grabbing attacks on enterprises underscore the catastrophic fallout that successful breaches can bring – from data plundering and financial hemorrhage to brand tarnishing and operational chaos. In this perilous landscape, antivirus protection emerges as not just a tool, but a crucial fortress, actively thwarting and identifying malicious software.

1. The Unfolding Threatscape: A Glimpse into the Evolution of a world before Antivirus

Intricacy defines the modern cyber threat. With hackers unleashing their wealth of advanced tactics, safeguarding business networks has become a perpetual chess match. Instances of high-profile breaches stand as cautionary tales, revealing the far-reaching implications of a breach – from exfiltration of data riches to financial desolation, and from brand erosion to the disarray of operations. Amid this digital battlefield, the sentinel of antivirus protection takes centre stage, ready to ward off and uncover any malevolent encroachments.

2. The Guardians at the Gate: A Proactive Stance on managed Antivirus

Antivirus software takes on the mantle of the sentinel, adopting a proactive stance against the barrage of cyber incursions. Its vigilance extends across files, programs, and email attachments, scrutinizing them for the telltale signatures of known malware and malicious code. This software assumes the role of the vigilant gatekeeper, identifying and intercepting potential threats before they can penetrate the sanctum of your system. Through real-time vigilance, the antivirus software remains a steadfast sentinel, a reliable guardian against emerging threats, adding another layer of resolute defence.

3. Unveiling and Eliminating Malicious Entities: The Essential Role of Antivirus Protection

No stronghold is impenetrable. If a malevolent entity slips through the gaps in your defences, the antivirus software springs into action. It unfailingly discerns and eradicates these threats, orchestrating meticulous sweeps of your system. Armed with the knowledge of known malware, spyware, and even ransomware, it undertakes a steadfast pursuit of these digital marauders. The swift identification and neutralization of threats become its hallmarks, truncating the potential harm to your enterprise.

4. Antivirus Guardians of Data Integrity: Safeguarding the Invaluable

The treasure troves of modern enterprises consist of invaluable data – customer insights, financial records, intellectual treasures, and exclusive intelligence. The fallout of a successful cyber attack can render this treasure trove into a wasteland of catastrophic data breaches, setting in motion financial ruin and legal quagmires. Here, antivirus software emerges as the defence, staunchly preventing unauthorized incursions into your data vaults. Robust antivirus protection stands as the gatekeeper, warding off threats and preserving the sanctity of your data havens, thus ensuring the trust of your clientele and stakeholders.

5. Managed Antivirus – Upholding Momentum and Credibility: A Bulwark Against Disruption

The fallout of a cyber attack reverberates far beyond the digital world, echoing through the very fabric of business operations. Stalled operations and crippled productivity stand as testaments to its might. Equally, the taint it leaves on a brand’s reputation becomes a wound that’s slow to heal, gnawing at customer trust. Counteracting this menace are the robust solutions of antivirus protection. Its prowess in minimizing the odds of cyber attacks becomes a guarantor of unhindered operations, safeguarding not only business momentum but also the hard-earned reputation.

In a world where cyber threats mutate and proliferate, businesses are charged with a solemn duty – to prioritize the fortification of their digital ramparts. In this high-stakes game, antivirus protection stands as an unequivocal linchpin. It’s both a proactive shield and a reactive fortress against the relentless tide of cyber threats. The choice to adopt potent antivirus software signifies more than just a technological investment; it’s a strategic move to mitigate the risks that cyber attacks bring. It’s an assertion of data privacy, uninterrupted operations, and the faith of your patrons and stakeholders.

Investing in comprehensive antivirus solutions is your business’s proactive stride in fortifying its security posture amidst a hostile digital milieu. As you stand sentinel, remember that cybersecurity is not a destination but a journey – one where antivirus protection stands resolute as your shield against the ceaseless storm of cyber attacks.

An article here talks about the new variant of Xloader targeting macOS users:

Contact the Cyber team to discuss your managed Antivirus requirement-

Top 3 reasons to have JLex as your Outsourced IT company

Top 3 Reasons to have JLex as your Outsourced IT Company

Outsourcing your IT to JLex has many benefits to your business, not least because we make it so easy for you. Here are at least three more reasons…

1. Award-winning customer service

We were thrilled to win the Silver category for Best Customer Service of the Year award in the 2023 SME London Business Awards. The criteria for this was the need to give outstanding assistance and advice to those who use our services. We had to back this up with customer testimonials.

Winning was such an honour because the JLex Networks ethos is to offer affordable, effective IT solutions, delivered in a simple, jargon-free way. This award proves that we put our customers first, keeping IT easy to understand – who doesn’t want an IT system like that?

2. First-rate family business

JLex operates like one big, happy family – partly because it is family-run, but also because we treat our customers like family and maintain family values through all we do. So it was a delight to win the Silver category for Family Business of the Year award in the 2023 SME London Business Awards. It is awarded to a company who combines their passion in business with their shared family values and the judges looked at how we grow the business, keeping our core family values at the heart.

We’re always happy to have new family members join our happy gang – the more the merrier!

3. Rapid response time

There’s nothing more frustrating in business than IT systems that aren’t working properly but are stopping you working properly. Not a problem with JLex though – our current response time is just 19 minutes. So in less than 20 minutes we’ll be sorting your issue and working on getting you back up and running – you’ll barely notice any downtime.

Those are our top three reasons, and all pretty convincing ones, we think. Apart from these, you’ll also find our services are cost-effective and give you specialist, up-to-date knowledge for the fraction of the cost of an in-house IT team.

We also save you time by having a dedicated out of house team to take carry of any IT issues or questions. Plus we can advise on the best systems for your business, transition you to Office 365 or VoIP, and make sure your business and data is safe, secure and free from cyber-attacks.

If you’d like to talk to us more about our award-winning service, drop us a line or give us a call.

Contact us

IT Audit – Can your business survive without it?

Picture of Auditor Pointing
IT Audit

The Importance of an IT Audit

If your business is going to stay ahead of the competition, you need a reliable IT department. They provide key support for businesses in every sector. However, the growing sophistication of both internal and external threats means that you must perform a good IT audit, even if you outsource your IT to another company.

94% of companies suffering from a catastrophic data loss do not survive – 43% never reopen and 51% close within two years. (UoT). An IT Audit makes a significant dent in these statistics dropping them. Don’t become one of the statistics.


Understanding IT Audits

So, what exactly is an IT audit?

An IT audit is a specific process for looking at your organisation’s technical configuration from top to bottom. Audits look at infrastructure, Disaster Recovery plans, Data security and policies.  

The purpose of an IT audit is to objectively examine the operating profile, software and security and configuration that the IT system of an organisation has. It helps to identify areas where you might be weak to attacks, disaster recovery issues, or possible areas for data loss.

By examining the security and configuration of the infrastructure used by the organisation, businesses can ensure that their IT system is not only protected from data loss but is also safe and secure. Think of an IT audit like a check-up at the doctor’s office – issues are found and identified during the process.

An Audit provided by JLex Networks is presented in non-technical English, split into organisational sections, and gives high level impacts on business operations and recommendations moving forward.


What does the IT Audit Cover?

Amongst many items, these high level categories are covered:


On premise Network hardware

This covers all switching and core network equipment on site, including connectivity. Often the lifeblood of the organisation. Potential issues identified here can cause a higher likely hood off major connection outages, that will often stop an organisation in its tracks.  


On premise Servers and highly available hardware.

This is an in depth coverage of physical and virtual servers on premise and covers a large number of items to ensure a major outage or irrecoverable data loss isn’t just around the corner. This section also covers all items linked to this including UPS systems, DR policies and plans, onsite and remote backup and more.


Cloud services

This sections covers all cloud services that the organisation is using, public or private. This covers in depth analysis of the configuration, license usage for cost saving and whether you are using the correct service for the workload. Cost savings are often significant and items that could cause major business outages are frequently identified.


Security and AV

This category includes in an in depth look at the currently patching policy, remove monitoring of virus threats on end user computers and infrastructure. This is often the highest cost impact when things go wrong. The Sony Wannacry hack caused Sony Pictures to cease all USA business operations for a period of over 14 days whilst their infrastructure ground to a halt. This was caused by a combination of poor AV management, poor and outdated patch management, and social engineering. All items that are highlighted on our audit, and items that are often neglected.



The IT Audit Process – Step-by-Step


1. The Planning Stage

A preliminary assessment is done to identify the operating environment, the structure of the company and what software or hardware is being used. This is often done onsite with the on site IT Staff or operational staff.

The IT auditor uses this information to identify auditable categories, plan for the data collection and work out timescales and objectives.


2. Process data collection

A successful IT audit process should cover all parts of your IT process. It should also outline the objectives for the audit and talk about the extent of the audit regarding duration, location, and what areas you’ll cover. Its at this stage that data on internal processes and procedures is obtained.


3. Collecting and Evaluating

Site visits will be carried out to obtain pictures, infrastructure information and identify hardware that is not managed. A remote software scan will also identify all equipment on each logical network and provide a landscape that we can map the data against.


4. Reporting Findings

The Audit findings are written into a comprehensive bound document. This document is split into organisational sections, similar to above, and gives a high level non-technical overview, and low level technical information on each section. Each section gives a grading from A to F, and an overview of what needs to be updated and its impact on the business.

The findings will often then be filtered back into a change management or consultation process to enact these changes. We often carry out these IT Audits for other businesses that have onsite IT resources or a managed support service with a third party. These Audits are used in the latter to ensure that the company is meeting their requirements and to ensure no large holes exist in the configuration.  


Final Thoughts

Any IT infrastructure you rely on needs to be audited, whether it’s the in-house team, outsourced IT, cloud service or a mixture. You need to perform regular audits to identify potential major weak points that are unidentified and prevent major outages before they affect your bottom line.  7 out of 10 small businesses that experience a major data loss go out of business within a year! (Source)


For more information on IT audits or to see how JLex can help with yours, contact us today.


Contact us

The Dental Box

Man brushing teeth

JLex helped us design, a tailored, secure, organised and compliant Dental telephone and Ethernet network.

We wanted a smooth and seamless set up which covered our communication and dental IT Support needs. Jlex organised everything, from the telephone line install with open reach to the professionally recorded greetings on our VoIP system.

Continue reading

Destiny Devon

Retail IT support

Destiny Devon are a spiritual shop and lifestyle centre, operating from the famous Coffin house in the heart of beautiful Brixham. Destiny Devon have over 20 years’ experience sourcing exquisite and bespoke crystals from all over the world. Hosting fantastic workshops and Yoga classes. It is hard not to be drawn in by the shear passion from the owners.
JLex have been working with Destiny Devon since 2011 working closely together to ensure they receive they have the best IT support as well as IT consultancy to aid their Growth.

Continue reading

Capable Travel

JLex undertook an infrastructure refresh for Capable Travel Ltd with a particular focus on updating the infrastructure for future growth and requirements. Particular effort was spent to track down the root cause of the many service interruptions they were experiencing and upgrading the infrastructure to prevent these from recurring.

Continue reading

Membership to Sussex Chamber of Commerce

Sussex chamber of commerce logo

We have joined the Sussex Chamber of Commerce

We have proudly joined the Sussex chamber of commerce.

With an ever increasing business presence in the South of the UK, we have decided to expand our networking group to include the Sussex chamber of commerce. 

Take a look at their post regarding our membership below:


JLex have one mission for 2023 and that is to expand our clientele with 5 star service and integrity. 

By joining The Sussex chamber of commerce, we hope to increase our visibility throughout Sussex as well as allow us to meet other businesses through networking events throughout the county.

We are completely location independent and can meet our fast response time and customer services goals, anywhere across the UK. Touch base to see how we can help you!

Contact us

What is Cyber Security and Why Do You Need it?

What is Cyber Security and Why Do You Need it?

Cyber-attacks can disable your business, costing money and customer trust. They can be avoided by having a solid Cyber Security plan in place, allowing business continuity and data security.

Cyber Security is critical for businesses. Digital engagement with customers is second nature now and those customers expect you to look after their data. If you want to capture data, you need to show you’re serious about looking after it. Yet only 13% of small businesses have cyber insurance and many do not have a Cyber Security plan, policy or protection in place.

Why the surge in cyber-attacks?

Cyber-attacks have been on the rise for some years. There are more and more ways for breaches to occur. Many of them are human – it just takes one click on a rogue email attachment to disable a whole system and render the data unusable.

Many businesses have a large network of remote connected devices, all of which are susceptible to cyber security breaches, data and privacy risks. The more your organisation becomes connected internally and with others – supply chains for example – the more exposure you have to cyber-attacks. Are you aware of what’s going on with every device? Do you have policies and procedures in place to deal with breaches and security? That includes monitoring all devices on a network.

Change is happening more quickly than ever and technology is developing at a rapid pace. That means businesses look to their cyber tools to deliver more value and efficiency to clients. At the same time, you need to say ahead of the curve with potential cyber risks and threats.

How can you maximise your cyber security?

There are steps every business should implement to help minimise their risk of a cyber-attack.

1.  Education. Not everyone understands the risks, where they come from, or the damage they can have. If you can train your teams and help them appreciate how damaging a cyber breach can be, you can change the culture of your workforce. The more understanding they have, the more equipped they will be to safeguard your business.

2. Improve Security. This one sounds obvious, but many businesses assume that their current processes are enough. Your data is the biggest asset you have. Is your security up to the job of protecting this vital part of your business?

3.  Find your weaknesses. Have a security audit to find out where your weaknesses are. Could it be your hardware, your software or your staff?

4.  Remove the risk. Look at your network and all those potential points of entry for a cyber-attack. Make your network watertight and remove the risk.

Cyber Security is an essential part of any organisation’s set up. It takes time and resources to get it just right and keep on top of the ever-evolving technologies but it’s too important to ignore. JLex has the expertise and time to set you up with a fit-for-purpose Cyber Security process, highlighting where any likely breaches might occur and implementing the tools to prevent breaches and substantial cost to your business.


Contact us to find out how we can work with you on your Cyber Security. We won’t blind you with technology, just explain it all so you can understand and see how it will benefit your business. 

Contact us