Smart IT and Cybersecurity services keeping your business connected and secure

Book a call to discover tailored IT and cyber security solutions that reduce costs and strengthen your infrastructure.

The letter q is in a circle with a square in the middle.

About Quicksmart IT

Quicksmart IT, based in Cardiff, specialises in providing tailored IT support and cyber security services for your business. We’re not just another nameless, faceless online business, we’re your local IT partner, committed to understanding your unique needs and delivering solutions with a personal touch. With a focus on exceptional customer service, we take the stress out of managing your technology, ensuring your business runs smoothly, securely, and efficiently. Whether it’s safeguarding your systems against cyber threats or providing reliable, responsive IT support, Quicksmart IT is here to help your business thrive.

Take the first step towards smarter, more secure IT today!

At Quicksmart, we’re committed to delivering simple, effective, and affordable IT solutions, so you can focus on your business without worrying about technology letting you down. That’s why we’ve streamlined our offerings to be transparent, efficient, and budget-friendly. No confusing packages or technical jargon, just straightforward monthly support plans with optional add-ons you can choose from as needed.

A box that says it support packages tailored to your business
A white background with a few lines on it

Our QS Complete plan is named for a reason. It truly delivers end-to-end online and on-site IT support, fully tailored to your business needs.


£55 per user p/m


A white background with a few lines on it

Reliable, efficient, and hassle-free IT support to keep your business running smoothly. QS One ensures you get expert assistance whenever you need it


£35 per user p/m


A white background with a few lines on it

For smaller businesses that don’t need extensive IT infrastructure but still want peace of mind, QS Essentials delivers.


£20 per user p/m


A white background with a few lines on it
Your Free IT Health Check

Talk to one of our experts today for a free IT health check. We’ll evaluate your systems, data backup, and security. If we can't improve your setup or save you money, you'll know your IT is protected and optimised.


The health check can be done in person or online. Click the link below, answer a few questions, and a team member will contact you to discuss options.

A box of office 365 offer on a white background.

Microsoft 365 Offer

Microsoft 365 Business Basic from £6.48 per user per month – includes setup, password resets, mailbox permissions, security, compliance and management of Microsoft Entra ID.

Learn more

Superfast Broadband Offer

Leased lines from ÂŁ199 per month. Speeds range from 100mpbs to 10gbps dependent on your requirements.

Learn more

Bespoke 3CX Phone Systems

From ÂŁ89.99 per month with unlimited minutes.*

*(subject to fair use policy) 

Learn more
A laptop with a padlock and a password on the screen.
A magnifying glass with a globe inside of it.

Cyber Security and Free Domain Checker

Find out how secure your domain is with our simple check.

We look at important things which make your domain secure, then give you a score out of 100. This helps you see how well-protected your site is against online threats.

Latest News & Reviews

By Richard Watts June 10, 2025
Important Update: Improvements Coming to 365 Permission Manager If you're on one of our Hornet Security packages, you’ll soon benefit from a powerful update to 365 Permission Manager , going live on 14th June . This update brings smarter automation to help manage compliance settings more easily, saving time and reducing admin work. 🔍 So, what’s changing? Here’s what the update means for you: 1. Smarter Compliance – Done Automatically All compliance policies can now auto-correct themselves if something’s out of line. Less manual work for admins. 2. Improved OneDrive & SharePoint Settings Sites will now automatically match the security rules you've set – no more checking or adjusting them manually. 3. Better Control of Teams Sharing You can now set different time limits for sharing files inside or outside your organisation – and choose whether files shared via Teams should be deleted from OneDrive afterwards. 4. More Customisation Options New sharing settings give you greater flexibility in how permissions are monitored and managed.
By Quicksmart IT April 11, 2025
We’re thrilled to announce that Quicksmart IT has a brand-new website — and we’re excited to finally share it with you! Following our recent rebrand, launching a new website that truly reflects who we are and what we offer has been a top priority. And now, it’s here! Clean, modern, and built with our customers in mind, the new site is a true reflection of the Quicksmart IT approach: smart, reliable, and straightforward tech solutions designed to keep your business running smoothly. Whether you're looking to explore our services, get support, or just learn a little more about what we do — everything is now in one place and easy to navigate. We’re proud of how far we’ve come, and this website marks an exciting new chapter for us. Go take a look around — and let us know what you think! 👉 Our New Website #QuicksmartIT #NewWebsite #Rebrand #ITSupport #BusinessTech
A woman is sitting on the ground using a cell phone.
By Quicksmart IT March 15, 2025
In this article, we look at the key actions to take if your mobile phone is stolen, how to protect your data, and ways to reduce the risk of theft in the first place. Phone Theft on the Rise Mobile phone theft is an increasing concern in the UK, with incidents on the rise, particularly in urban areas. For example, in the 12 months leading up to March 2024, approximately 78,000 individuals reported having their phones or bags stolen, marking a dramatic increase compared to previous years. London alone accounts for a significant portion of these incidents, with hotspot areas including train stations, busy high streets, and public transport hubs. A Guide Given the personal and financial information stored on modern smartphones, losing one to theft can be more than just an inconvenience because it can also lead to significant security risks. This guide outlines the essential steps to take if your phone is stolen, how to prevent such incidents, and the importance of mobile phone insurance. Immediate Steps to Take If Your Phone Is Stolen Perhaps the most important steps you can take if your phone is stolen are: 1. Attempt to Locate and Secure Your Device Remotely Most smartphones come equipped with tracking features that allow users to locate, lock, or erase their device remotely: iPhone users : Use ‘Find My iPhone’ ( https://www.icloud.com/find ) via iCloud or the Find My app on another Apple device. Android users : Visit Find My Device to track, lock, or erase your phone remotely. You can use the Find My Device app or go to android.com/find on a browser. You can also use the app on a friend’s phone or tablet. Samsung users : Use ‘Find My Mobile’ ( https://smartthingsfind.samsung.com/login ) to locate or secure your device. If tracking is enabled, you can share your phone’s location with the police, which may help in recovery efforts. 2. Report the Theft to the Police Call 101 or visit your nearest police station to report the theft. Provide them with your phone’s IMEI number, which can help track the device. You’ll also receive a crime reference number, which is necessary for insurance claims. Obviously, it helps to keep a note of your IMEI number somewhere separately in case of this eventuality. You can find your IMEI number by dialing *#06# on your phone’s keypad (see below) or checking your device’s settings. You can also find it on the original packaging or in your purchase documents. Even if you believe the chances of recovering your phone are low, reporting the theft helps authorities identify crime patterns and hotspot areas. 3. Notify Your Network Provider Contact your mobile network provider immediately to block your SIM card and, if possible, blacklist the phone’s IMEI number to prevent it from being used on UK networks. This step also prevents thieves from making costly calls or accessing data services on your plan. Some providers cap unauthorised charges at £100, but only if you report the theft within 24 hours. 4. Inform Your Bank and Other Financial Institutions If you use mobile banking or payment apps like Apple Pay or Google Wallet, contact your bank to suspend these services. This prevents unauthorised transactions and potential financial loss. Some victims of phone theft have lost thousands of pounds when thieves accessed banking apps before security measures were implemented. 5. Change Passwords for Important Accounts Using another device, update passwords for: Email accounts (Gmail, Outlook, etc.) Social media (Facebook, Instagram, Twitter) Banking apps Subscription services (Netflix, Spotify, Amazon) This ensures that even if a thief attempts to access your data, they won’t be able to log in. Understanding Mobile Phone Theft in the UK The rise in mobile phone thefts is a growing concern, with government figures showing a massive 150 per cent increase in snatch thefts over the past year! Organised gangs often target high-value smartphones due to their resale value, both in the UK and overseas. Common Methods of Mobile Phone Theft Snatch thefts. Thieves on bikes or mopeds grab phones from unsuspecting victims using them in public. Distraction techniques . Criminals use diversions, such as asking for directions, while an accomplice steals the phone. Pickpocketing . Crowded areas like public transport hubs are hotspots where thieves discreetly remove phones from pockets or bags. Proactive Measures to Prevent Mobile Phone Theft To reduce the risk of mobile phone theft, some proactive measures you can take include: 1. Staying Vigilant in Public Spaces Avoid using your phone while walking on busy streets or near roadsides. Be aware of your surroundings and hold your phone securely. Stand against a wall or in a safer location if you need to use your phone in public. 2. Securing Your Device with Strong Passwords Use a strong PIN, password, or biometric authentication (fingerprint or facial recognition). Enable two-factor authentication (2FA) on important accounts for added security. 3. Registering Your Phone’s IMEI Number Dial ** *#06# ** on your phone to display its IMEI number. Keep a record of this number in case of theft, as it will help your network provider block the device. 4. Installing a Tracking App Ensure tracking features like “Find My iPhone” or “Find My Device” are enabled before an incident occurs. These tools provide the best chance of recovering your phone. 5. Disabling Message Previews on Lock Screen To prevent thieves from accessing authentication codes or personal messages, disable message previews on the lock screen. This setting can be found in your phone’s privacy settings. The Importance of Mobile Phone Insurance Investing in mobile phone insurance can help mitigate the financial impact of theft. For example, many policies cover things like: The cost of a replacement device. Unauthorised usage charges. Loss or accidental damage. If you don’t have standalone phone insurance, check whether your home insurance policy includes mobile phone cover. What More Could Be Done to Help Tackle the Problem of Mobile Phone Theft? To further combat mobile phone theft, additional measures that key stakeholders could take may include: Mobile phone companies strengthening anti-theft features, such as theft detection locks and offline device locking, to make stolen phones unusable. Police enhancing tracking and retrieval efforts, conducting targeted operations in theft hotspots, and improving cooperation with tech firms. Insurers offering incentives for users who enable security features and register IMEI numbers. Regulatory bodies mandating IMEI registration and enforcing stricter penalties for handling stolen phones. The launching of public awareness campaigns, educating users on security best practices and theft prevention. By working together, these measures may also help deter theft and protect users from financial and personal data loss. Checklist – Steps to Take If Your Mobile Phone Is Stolen Here’s a handy checklist of essential steps to take if your mobile phone is stolen, ensuring you act quickly to protect your device and personal data. Attempt to Locate and Secure Your Device Remotely : Use Find My iPhone/Find My Device to track, lock, or erase your phone. Report the Theft to the Police : Call 101 and obtain a crime reference number for insurance purposes. Notify Your Network Provider : Request to block your SIM and blacklist the IMEI number. Inform Your Bank : Suspend Apple Pay, Google Wallet, and mobile banking apps. Change Passwords for Important Accounts : Secure email, banking, and social media accounts. Register Your IMEI Number : If you haven’t already, find your IMEI by dialling ** *#06# ** and store it safely. Consider Getting Mobile Phone Insurance : Check if your phone is covered under an insurance policy to reduce financial loss. Print this checklist and keep it in a safe place in case your phone is stolen. Taking proactive steps to secure your phone and knowing what to do in case of theft can protect your personal data and finances. Stay alert, stay informed, and stay safe. What Does This Mean for Your Business? Losing a mobile phone to theft is more than just a frustration, as it can lead to serious security risks, financial loss, and personal inconvenience. With phone theft becoming more common, particularly in busy urban areas, knowing how to respond effectively is essential. Acting quickly by locking the device remotely, reporting the theft to the police and network provider, and securing financial accounts can significantly reduce the potential damage. However, the best way to stay protected is through prevention. Taking simple precautions, such as keeping your phone out of sight in high-risk areas, using biometric security features, and ensuring remote tracking is enabled, can make all the difference. While no measure can guarantee complete safety, being proactive about security can lower the risk of falling victim to opportunistic thieves. Mobile phones have become central to daily life, storing vast amounts of personal, financial, and business data and information. By taking steps to secure your device before it is stolen and knowing exactly what to do if the worst happens, you can stay in control even when faced with a crime that is becoming increasingly common.