How to cancel your subscription on GMCirrus
Support|by James Roberts|15 May 2023
GMCirrus support videos
- How to add a brand new license to a tenant via GMCirrus
- How to increase an exisiting license on GMCirrus
- How to increase an existing subscription quantity on GMCirrus
- How to manage a renewal on GMCirrus
- How to upgrade a license on GMCirrus
- How to turn off auto-renew on GMCirrus
- How to cancel a license on GMCirrus
- How to cancel your subscription on GMCirrus
Contact Grey Matter
If you have any questions or want some extra information, complete the form below and one of the team will be in touch ASAP. If you have a specific use case, please let us know and we'll help you find the right solution faster.
By submitting this form you are agreeing to our Privacy Policy and Website Terms of Use.
James Roberts
Related News
Control access with the perimeter security layer
In part two of our seven layers of security miniseries, our Cyber Security Specialist Scott Harrison shares tips and insights on how to make your organisation’s digital perimeter safe from threats. It’s all about ensuring only the right people get...
The human layer in cyber security: Create a human firewall
Cyber threats are everywhere. They’re more sophisticated. Hacking is even run as a business. So any organisation, no matter the size is vulnerable. And regulations are getting stricter. Grey Matter Talks Tech season three is here As it’s such a...
Last mile delivery: How HERE WeGo Pro transforms fleet navigation.
The last mile is where delivery gets complicated. HERE WeGo Pro gives fleets truck-specific routing, real-time traffic alerts, and offline maps, helping teams optimise routes and stay compliant. It’s more than navigation—it’s operational intelligence for successful deliveries.
How to build a resilient data security strategy
Data is the lifeblood of business. So, it’s constantly at high-risk of being lost or stolen. From ransomware attacks to insider threats, you face mounting pressure to protect sensitive information. This blog explores four pillars of data security – encryption,...