IT Hotdesk

https://www.ithotdesk.com/

Colour Palette

Primary

#3282CA

Secondary

#FFBF2D

Neutral

#64748B

Typography

Headings: Rubrik New

Heading 1

Heading 2

Heading 3

Heading 4

Heading 5
Body: IBM Plex Sans

Normal. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Italic. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Bold. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Landing Header Block

Hero

Unlock success through technology

A passionate, proactive and reliable team of IT experts located in Aberdeen, Glasgow, Edinburgh and Inverness

Unlock success through technology

A passionate, proactive and reliable team of IT experts located in Aberdeen, Glasgow, Edinburgh and Inverness

Hero Two

Unlock Success through Technology

A passionate, proactive and reliable team of IT Experts located in Aberdeen, Edinburgh, Glasgow and Inverness

Card

Optional Headline

Optional summary: With extensive experience across the full IT landscape, from cyber security and disaster recovery, to communications and cloud.

blog

IT Strategy & IT Support

Service short description that may extend onto a second line

Read more »
blog

IT Strategy & IT Support

Service short description that may extend onto a second line

Read more »
blog

IT Strategy & IT Support

Service short description that may extend onto a second line

Read more »

Card Icon

Optional Headline

Optional summary: With extensive experience across the full IT landscape, from cyber security and disaster recovery, to communications and cloud.

IT Strategy & IT Support

Service short description that may extend onto a second line

Read more »

IT Strategy & IT Support

Service short description that may extend onto a second line

Read more »

IT Strategy & IT Support

Service short description that may extend onto a second line

Read more »

Card Tile

Card Slider

Optional Headline

Optional summary: With extensive experience across the full IT landscape, from cyber security and disaster recovery, to communications and cloud.

Cyber Security

Card title

Date / month / year

Cyber Security

Card title

Date / month / year

Cyber Security

Card title

Date / month / year

Cyber Security

Card title

Date / month / year

Cyber Security

Card title

Date / month / year

Cyber Security

Card title

Date / month / year

Cyber Security

Card title

Date / month / year

Cyber Security

Card title

Date / month / year

Cyber Security

Card title

Date / month / year

Feature

Cyber Security

14 Ways to Protect your Business

In our latest webinar, managing director Gordon Chrisite and cyber architect AJ Johnston discuss how you can protect your business by following these 14 simple steps.

View Webinar
Cyber Security

14 Ways to Protect your Business

In our latest webinar, managing director Gordon Chrisite and cyber architect AJ Johnston discuss how you can protect your business by following these 14 simple steps.

View Webinar

Feature - Style Two

Cyber Security

14 Ways to Protect your Business

In our latest webinar, managing director Gordon Chrisite and cyber architect AJ Johnston discuss how you can protect your business by following these 14 simple steps.

View Webinar
Cyber Security

14 Ways to Protect your Business

In our latest webinar, managing director Gordon Chrisite and cyber architect AJ Johnston discuss how you can protect your business by following these 14 simple steps.

View Webinar

Logo

Optional Headline

Optional summary: With extensive experience across the full IT landscape, from cyber security and disaster recovery, to communications and cloud.

Icon

Optional Headline

Optional summary: With extensive experience across the full IT landscape, from cyber security and disaster recovery, to communications and cloud.

Unrivalled Response rates

Certified and Experienced Team

Industry-Leading Systems and Tools

Experts in Strategy and Implementation

Quote

"Whether you’d like a fully managed IT service, or you’d like to complement and enhance your in-house IT team, we are here to help.


"We will work hard to understand your challenges and needs, and propose the best solutions to help you achieve your business goals."

Benefits

Optional Headline

Optional Positioning statement about IT Hotdesk's place in the market, value proposition and who they help.

Key benefit.

Key benefit.

Key benefit.

Key benefit.

Key benefit.

Key benefit.

Key benefit.

Key benefit.

Key benefit.

Key benefit.

Key benefit.

Key benefit.

Key benefit.

Key benefit.

Key benefit.

Key benefit.

Key benefit.

Key benefit.

Call to action

Headline

Subheadline

Headline

Start your free trial today.

Call to action two

Need reliable IT support in Aberdeen?

Book a call with our technician.

  • No salespeople, no obligation

  • No salespeople, no obligation

  • No salespeople, no obligation

CTA Embed

image
image
image

Media

Optional Headline

Optional summary: With extensive experience across the full IT landscape, from cyber security and disaster recovery, to communications and cloud.

Optional Headline

Optional summary: With extensive experience across the full IT landscape, from cyber security and disaster recovery, to communications and cloud.

Optional Headline

Optional summary: With extensive experience across the full IT landscape, from cyber security and disaster recovery, to communications and cloud.

image

FAQ

Frequently asked questions

Two Column

Headline containing exactly what IT Hotdesk offer.

Positioning statement about IT Hotdesk's place in the market, value proposition and who they help. Positioning statement about IT Hotdesk's place in the market, value proposition and who they help.

Intro

Headline

Copy

Tab

"This is Tab 1 and the IT hotdesk team is great"

"This is Tab 2 and the IT hotdesk team is great"

"This is Tab 3 and the IT hotdesk team is great"

Person name

Position
at Company

Person name

Position
at Company

Person name

Position
at Company

Link

Optional Headline

Optional summary: With extensive experience across the full IT landscape, from cyber security and disaster recovery, to communications and cloud.

Form

Get in touch

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

  • Lorem Ipsum
  • Dolor sit amet
  • Consectetur adipiscing elit

Form will be hubspot embed

Get in touch

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

  • Lorem Ipsum
  • Dolor sit amet
  • Consectetur adipiscing elit

Form will be hubspot embed

Form Two

Contact sales

Nullam risus blandit ac aliquam justo ipsum. Quam mauris volutpat massa dictumst amet. Sapien tortor lacus arcu.

Listing

Optional Headline

Optional summary: With extensive experience across the full IT landscape, from cyber security and disaster recovery, to communications and cloud.

sofa
Cyber Security

Lorem ipsum Dolor

Date / month / year

Learn More
sofa
Cyber Security

Lorem ipsum Dolor

Date / month / year

Learn More
sofa
Cyber Security

Lorem ipsum Dolor

Date / month / year

Learn More
  • 1
  • 2
  • ...
  • 6
  • 7

Headline

Optional subheadline

Stats

Optional Headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Byline

50k+

Intro into stats.

Byline

50k+

Intro into stats.

Byline

50k+

Intro into stats.

Byline

50k+

Intro into stats.

Byline

50k+

Intro into stats.

Byline

50k+

Intro into stats.

Description list

Project Information

Positioning statement about IT Hotdesk's place in the market, value proposition and who they help

Client
IT Hotdesk
Service
Cyber Security
Location
Aberdeen
Project
Project name
About
Fugiat ipsum ipsum deserunt culpa aute sint do nostrud anim incididunt cillum culpa consequat. Excepteur qui ipsum aliquip consequat sint. Sit id mollit nulla mollit nostrud in ea officia proident. Irure nostrud pariatur mollit ad adipisicing reprehenderit deserunt qui eu.

Article header

Article headline...

Day / Month / 2021

Article

Business insights: understanding the cyber security landscape

As technology advances, it would seem that life becomes easier. Tasks that once required a member of staff, can now be completed with a computer, and introducing new technology allows for staff to focus on delivering projects or helping customers – the possibilities are endless.

But one thing that is often overlooked is how these new technologies impact a business’s cyber security. Cyber attacks are becoming more frequent, cyber criminals are evolving and the types of attacks are becoming more sophisticated. It has been reported that over the last 12 months the UK has experienced a 630% increase in cloud-based cyber attacks.

As part of our ‘business insights’ series, we caught up with managing director Gordon Christie on the most common cyber attacks. Lifting the lid on the more sinister side of the internet, Gordon discusses everything from vulnerabilities and cyber attacks to the dark web, focusing on how businesses can protect themselves from unwanted attention online.

What is a cyber attack?

“A cyber attack is an assault used on single or multiple computers or networks by cybercriminals. Cybercriminals can disable computers, steal data or use a breached computer as the launch point for other attacks.

Now I'm going to show you an example of an unordered list to make sure that looks good, too:

  • So here is the first item in this list.
  • In this example we're keeping the items short.
  • Later, we'll use longer, more complex list items.

And that's the end of this section.

What if we stack headings?

We should make sure that looks good, too.

Sometimes you have headings directly underneath each other. In those cases you often have to undo the top margin on the second heading because it usually looks better for the headings to be closer together than a paragraph followed by a heading should be.

When a heading comes after a paragraph …

When a heading comes after a paragraph, we need a bit more space, like I already mentioned above. Now let's see what a more complex list would look like.

  • I often do this thing where list items have headings.

    For some reason I think this looks cool which is unfortunate because it's pretty annoying to get the styles right.

    I often have two or three paragraphs in these list items, too, so the hard part is getting the spacing between the paragraphs, list item heading, and separate list items to all make sense. Pretty tough honestly, you could make a strong argument that you just shouldn't write this way.

  • Since this is a list, I need at least two items.

    I explained what I'm doing already in the previous list item, but a list wouldn't be a list if it only had one item, and we really want this to look realistic. That's why I've added this second list item so I actually have something to look at when writing the styles.

  • It's not a bad idea to add a third item either.

    I think it probably would've been fine to just use two items but three is definitely not worse, and since I seem to be having no trouble making up arbitrary things to type, I might as well include it.

After this sort of list I usually have a closing statement or paragraph, because it kinda looks weird jumping right to a heading.

Hopefully that looks good enough to you.

What about nested lists?

Nested lists basically always look bad which is why editors like Medium don't even let you do it, but I guess since some of you goofballs are going to do it we have to carry the burden of at least making it work.

  1. Nested lists are rarely a good idea.
    • You might feel like you are being really "organized" or something but you are just creating a gross shape on the screen that is hard to read.
    • Nested navigation in UIs is a bad idea too, keep things as flat as possible.
    • Nesting tons of folders in your source code is also not helpful.
  2. Since we need to have more items, here's another one.
    • I'm not sure if we'll bother styling more than two levels deep.
    • Two is already too much, three is guaranteed to be a bad idea.
    • If you nest four levels deep you belong in prison.
  3. Two items isn't really a list, three is good though.
    • Again please don't nest lists if you want people to actually read your content.
    • Nobody wants to look at this.
    • I'm upset that we even have to bother styling this.
  • For example, here's another nested list.

    But this time with a second paragraph.

    • These list items won't have <p> tags
    • Because they are only one line each
  • But in this second top-level list item, they will.

    This is especially annoying because of the spacing on this paragraph.

    • As you can see here, because I've added a second line, this list item now has a <p> tag.

      This is the second line I'm talking about by the way.

    • Finally here's another list item so it's more like a list.

  • A closing list item, but with no nested list, because why not?

And finally a sentence to close off this section.

There are other elements we need to style

I almost forgot to mention links, like this link to the website. We almost made them primary but that's so yesterday, so we went with dark gray, feels edgier.

We even included table styles, check it out:

Name Location Service
IT hotdesk Aberdeen Cyber Security
Mission10 Aberdeen Marketing

Author name

Position

Headline

Positioning statement about IT Hotdesk's place in the market, value proposition and who they help.

Article footer

Display Picture of Person name

Person name

Position

email@ithotdesk.com

Text

Optional headline

copy

Step

Optional Headline

Optional Positioning statement about IT Hotdesk's place in the market, value proposition and who they help.

Step name

Positioning statement about IT Hotdesk's place in the market, value proposition and who they help.

Step name

Positioning statement about IT Hotdesk's place in the market, value proposition and who they help.

Before and After

Headline

Optional summary: With extensive experience across the full IT landscape, from cyber security and disaster recovery, to communications and cloud.

Before Headline

Quis semper vulputate aliquam venenatis egestas sagittis quisque orci. Donec commodo sit viverra aliquam porttitor ultrices gravida eu, tincidunt leo.

  • Item 1
  • Item 2
  • Item 3

After Headline

Quis semper vulputate aliquam venenatis egestas sagittis quisque orci. Donec commodo sit viverra aliquam porttitor ultrices gravida eu. Tincidunt leo, elementum mattis elementum ut nisl, justo, amet, mattis. Nunc purus, diam commodo tincidunt turpis. Amet, duis sed elit interdum dignissim.

  • Item 1
  • Item 2
  • Item 3

Team

Headline

Optional summary: With extensive experience across the full IT landscape, from cyber security and disaster recovery, to communications and cloud.

Person Name

Position or Short Description

Person Name

Position or Short Description

Person Name

Position or Short Description

Landing Footer Block

Footer

Top