Some employees won’t stop using apps that could be a security risk

Has the applications and software you used changed since the pandemic? Some employees may even be using applications which could be a security concern.

That’s because we’ve all had to make big adjustments to the way we communicate and collaborate.

And to begin with, it may have been hit and miss. It’s possible in the first few weeks and months that your employees had to use whatever tools they had available to them.

Now that we’ve settled into permanent new ways of working, we could pick the software tools that best suit our businesses!

Unfortunately, your employees might not like your choice of which apps should be used within the company. And some of them may continue to use the ones they prefer, despite the security risk that comes with that.

A recent survey found a massive 92% of employees want more control over the software, collaboration tools, and applications they use. And 51% continue to use apps that have been banned by IT departments.

It’s putting business owners in a difficult position.

Blocking apps and software may lead to employees feeling untrusted. This can lead to frustration and lack of motivation. It can really have a negative impact on your business.

But ignoring the issue can be just as bad. Unvetted apps can be a big security risk, leaving your data open to theft and your systems vulnerable to malware.

So what’s the answer?

We’d always suggest having open conversations with your people. It’s a good idea to invite feedback on the software you want to use. After all, your people are the ones using it day-in, day-out.

Take their suggestions on alternatives if the consensus is you’re using the wrong solutions and commit to looking into their viability.

It’s also a very good idea to make sure your people fully understand the risks that come with using unapproved apps, and the impact that can have on a business.

Even in cases where your team are all sticking to approved tools, keeping them educated on the latest cyber security initiatives is a smart move.

Can we help you find the most suitable communication and productivity tools for your business? We’ve helped lots of business owners do this. Get in touch.

Published with permission from Your Tech Updates.

Read more

Are your Apps spying on you?

Are your apps spying on you. It’s no secret that some applications are a little too interested in us and what we’re doing.

We’ve all had this experience. You might be talking to a friend about a new product that you’d like to try. Or perhaps you’ve discussed somewhere you’d like to visit.

Then the next time you go online you see adverts for the exact things you were talking about.

It’s more than a coincidence, surely???

Until recently, we haven’t had a lot of control over what information our apps are gathering about us.

Android and iOS first stepped up to give us more power over our online privacy. We were given the ability to control which apps could access our data, and sensitive things like our camera and microphone.

But while it’s easy to think of this only being an issue with phones… laptops have the same problems.

So here’s some great news, to stop your apps spying on you.

Microsoft’s testing a new feature in Windows 11 to put the power back in our hands.

It’s currently testing a new feature – called Privacy Auditing – which allows you to see which applications have been accessing sensitive hardware, like your webcam and microphone.

You’ll also be able to see if your screenshots, messages, and even your contacts and location data have been accessed. And there’s a log of which apps accessed this info, and when.

When launched, the feature will be available in your Privacy & Security menu, under App Permissions.

There you’ll be able to see a full list of what’s been accessed, by which app, and when. It should become your first port of call if you suspect any suspicious activity is taking place on your device.

When the feature is released, it will be a great tool to check periodically to help you avoid malicious activity and to make sure your sensitive data remains in the right hands.

In the meantime, if you’d like someone to look over the data permissions on your business’s devices, get in touch.

Published with permission from Your Tech Updates.

Read more

Your business is losing hours to spam!

Your Business is losing hours to spam every year, probably 100’s of hours of wasted productivity.

Having to clear the spam from your inbox is a productivity killer.

A recent report found that each one of your employees could be losing up to 80 hours each year, thanks to filtering and deleting spam emails.

That’s a LOT of lost productivity.

How Much Time!

The report stated that between 45% and 95% of emails were spam. Every day somewhere between nearly half and all email are spam. More concerning is that this also includes malicious emails.

If one of your employees gets 30 external emails a day, they’d get around 30 spam emails each week. That would work out to around 5 hours each year wasted on sorting through and deleting them.

For an employee who gets up to 60 emails a day, it would be around 11 hours a year wasted.

And for someone who gets more than 100 emails each day, you’re looking at around 80 hours of lost productivity.

Now add that up for each one of your team and you could be looking at a big number.

Not only that, but since a proportion of these emails will be phishing attempts (that’s where the sender wants you to take an action that will secretly give them access to sensitive data), it’s also a big risk to your data security too.

What can be done

Of course, there are a few things you can do to cut down the time spent on dealing with spam emails. The first is to make use of the spam and junk email filters available from your email service.

You may also consider bringing in dedicated anti-spam and anti-phishing tools.

Finally, you can make your people aware of the risks of spam, how to spot spam emails, and the best way to deal with it to save time and minimise the risk of malware or a data breach.

If that kind of training is something you’d like some help with, get in touch.

Published with permission from Your Tech Updates.

Read more

Google Chrome is going to block notifications

Google are looking to block disruptive notifications, we explore what they are, and why Google is doing this.

When you’re browsing it can feel like you’re being bombarded with things other people want you to see.

Not only do we have to click on permissions for cookies and tracking, but now a lot of websites ask for our permission to send us notifications.

And while many of these notifications are harmless – news updates, latest recipes, product releases – sometimes they can be outright spam.

It’s distracting, it’s making us less productive at work, and it’s just really annoying.

It’s called ‘notification spam’ and it’s becoming a problem. In fact, Google says it’s one of the top complaint reports from people using its Chrome browser.

So now the tech giant has decided to do more about it disruptive notifications.

Back in October 2020, Google first acted on harmful notifications by exposing websites that misled people into giving permission. It created its own prompts to warn people the website may have malicious intent.

Now, Google intends to take things a step further if it feels the website is ‘abusive’ or ‘disruptive’. It’ll revoke a website’s permission to send notifications, and even block attempts to request permission.

Even if you’ve accidentally allowed a malicious site to send notifications. Chrome will be able to step in and block the alerts.

While it’s not yet clear how Google will define websites as ‘abusive’ or ‘disruptive’, it feels like a good move towards reducing the amount of spam we’re exposed to.

Google has explained that this new feature works to strengthen its ‘Developer Terms of Service’ that pledge not to use the company’s API to send any form of spam. It shouldn’t affect the majority of websites, but instead should go some way to keeping your Chrome notifications spam-free.

Development on Chrome’s notification spam block protection has only just started, so we don’t yet have a release date for the new feature.

As always, get in touch if you would like help to protect yourself.

Published with permission from Your Tech Updates.

Read more

3 common cyber security mistakes?

As a security first IT services company we know our customers are being warned almost daily from many sources about Cyber Security.

Well that is because last year, ransomware attacks alone affected 73% of UK businesses.

And the cost of cyber-crime is estimated to hit $10.5 trillion by 2025, according to the ‘2022 Cybersecurity Almanac’.

But we’re still seeing far too many businesses that aren’t taking action, we firmly believe this is simply because this may all be far too overwhelming.

However it’s not only your data that you could lose if your company falls victim to a cyber-attack. The cost of remediation or mitigation can run into tens of thousands of £££.

And at the same time you’ll suffer an average of 21 days downtime after a cyber-attack. Imagine… 21 days without being able to use all your business technology as normal. It doesn’t bear thinking about.

That’s not to mention the loss of trust your clients have in you, which could lead to you losing their custom.

It’s really important that your business is taking appropriate steps to keep your data safe and secure.

That most likely means a layered approach to your security. This is where several solutions are used, which work together to give you a level of protection appropriate to your business.

This reduces your risk of being attacked. And makes recovery easier should you fall victim.

It’s worth pointing out that you will never be able to keep your business 100% protected from cyber-attacks. Not without totally locking down every system, to the point where it would be very difficult to do business (and your staff would constantly be looking for ways around the enhanced security).

No, the key to excellent cyber security is striking the right balance between protection and usability.

There are three mistakes that are most commonly made by businesses – and they’re also some of the most dangerous mistakes to make.

Is your business making any of these?

Mistake 1) Not restricting access

Different employees will have different needs when accessing company files and applications. If you allow everyone access to everything it opens up your entire network to criminals.

You should also make sure to change access rights when someone changes roles, and revoke them when they leave.

Mistake 2) Allowing lateral movement

If cyber criminals gain access to a computer used by a member of your admin team, that in itself might not be a disaster.

But what if they could move from your admin system to your invoicing system… and from there to your CRM… and then into someone’s email account?

This is known as lateral movement. The criminals gain access to one system and work their way into more sensitive systems.

If they can get into the email of someone who has admin rights to other systems or even the company bank account, they can start resetting passwords and locking out other people.

Scary stuff.

One strategy against this is called air gapping. It means that there’s no direct access from one part of your network to another.

Mistake 3) Not planning and protecting

Businesses that work closely with their IT partner to prepare and protect are less likely to be attacked in the first place.

And will be back on their feet faster if the worst does happen.

You should also have an up-to-date plan in place that details what to do, should an attack happen.

This will significantly shorten the amount of time it takes to respond to an attack. That means you’ll limit your data loss and the cost of putting things right again.

If you know you’re making one (two, or even three) of these mistakes in your business, you need to act quickly. We can help.

Call us, and we’ll review your current security arrangements.

Published with permission from Your Tech Updates.

Read more

Three new Teams features to look forward to

3 new features in teams coming soon

Over the last couple of years and fuelled by the pandemic the use of Teams has exploded. It is now used by 270 million people every month. Whilst the growth in usage has slowed recently it is still the go to collaboration tool for a lot of organisations. And here are three new teams features to look forward to.

As you read this, you may be thinking how did we work before Teams!

It gives us all the ability to stay connected regardless of where we are working. And gives us those collaboration tools we need to work the way we work today.

Because it is part of Microsoft 35 packages, it is the logical solution to keep the team working on projects with no fuss.

Microsoft is constantly making improvements and adding features. Over the past few months, they have added new features like the virtual whiteboard, which you can use to throw around ideas during your video meetings. Also the ability to pin chat to the top.

There are 3 new features coming soon they are

  1. Coming later this month (hopefully) when you rename a Teams channel, it will automatically change the name of the SharePoint Folder.
  2. Chat with self feature. This feature will allow you to send yourself notes and messages, putting the I into team!
  3. Teams Calls will give you the same experience when using the Teams app and the web browser version.

That is the Three new Teams features to look forward to. If you need help to get the most out of Teams, contact us, if you just want to watch this on video visit our tech update page.

Read more

Why your Windows Updates may fail!

So you do what you believe is right and install those windows updates as soon as they become available. Congratulations, but it might not be enough!

Microsoft has just released a piece of information which is crucial to ensuring your computer remains up to date, and you will need to take action to achieve this.

Windows Updates are crucial for all of our devices.

Updates are released regularly to help protect us from the security flaws and vulnerabilities that cyber criminals will exploit. Also, these updates help us by making software and applications more usable and adding new features.

It’s best practice to run updates as soon as possible on every machine across your business. If you do this already well done, if you don’t perhaps you should talk to us to help you?

There’s a but

According to Microsoft, an enormous number of Windows PCs aren’t up to date.

Why?

So what’s happening?

  1. Some of it maybe staff clicking the ‘later’ button when they get the update notifications. As updates can be time consuming and sometimes people need to get on with their work. Though we certainly don’t condone this behaviour we do understand it.
  2. Technical problems with updates may account for some of these out-of-date PCs, too.

But the majority of update issues are coming from something else entirely…

Microsoft Windows needs to be connected to the internet for a very long time for updates to work properly. Recently Microsoft stated that devices need to remain on and connected to the internet for a minimum of two consecutive hours, and six hours in total. That gives your device time to successfully download the update and install it.

Here is what to do to make sure Windows Update Succeed.

It is simple you need to make sure your devices are all left on and powered up overnight.

This may also mean that you have to check your Power Management settings, to stop your devices from going into hibernation mode or deep sleep too quickly.

To offset any environmental impact you should also ensure you’re following the recommended power settings on each device. If you’d like any help checking these settings, and that all of your devices are running the latest security updates, just get in touch.

Read more

Some of your staff REALLY want to work from home permanently.

Here’s how you can make it happen

In the last 2 years working from home has come of age.

Whilst Many have loved it, others realised they preferred an office environment.

But would you hazard a guess at how many people would like to make remote working a permanent option?

According to a new report, a whopping 96% of employees want to solely work from home, even when the pandemic is over.

They’d be willing to take a pay cut to make that happen.

But wait – it gets even more shocking.

Of these people, a third said they’d be willing to sacrifice HALF of their monthly wage to do so.

Not only that, but they’d give up their health benefits and even paid time off.

Are you as shocked at those figures as we are?

In terms of work/life balance, some people have never had it better. And now that things are slowly recovering, they’re not going to give it up without a fight.

Many of your people might not want to go back to the stress, the distraction, the commuting…

And it’s likely some of them don’t want to leave their beloved pets on their own!

As an employer, giving the option to make remote or hybrid work permanent seems like an ideal solution. You’ve already seen that your people can be trusted to do a great job wherever they work. You may even have seen an increase in motivation and productivity.

Your business could even cut down on some of its fixed costs – office space is the big saving.

Of course, there’s more to consider than how much you trust your team to continue doing a great job. Or how much you could be saving on office space.

If you haven’t already done so, you’ll need to make sure that everyone’s home working set-ups are suitable.

If you’ve only had temporary work from home measures in place for the last 2 years, it’s time to make them official.

The first priority for work from home is to look at data security.

How do your people access your network? Do they have the right security measures installed on their devices? Are their home networks protected from unauthorised access? Can you stop their children using company devices?

But it’s not just security that you need to consider.

Look at the collaboration tools you’re using. If your team is unlikely to be in the same place at the same time, should you invest in a better solution to make sure communication doesn’t suffer?

As well as reporting on salary sacrifices, the report also found that nearly 2 in 5 people feel ignored in video meetings.

Upgrading their equipment and devices might be the answer. Professional quality webcams and microphones can help by making sure video quality is high and that voices are heard.

Don’t forget that older laptops or desktops will need to be upgraded every few years to make sure they’re performing well and costing you less to maintain. If you’d like any help making sure your home working setups are right for permanent remote workers, just give us a call.

Read more

Walkie Talkie coming to Teams

Microsoft Teams has a new feature – Walkie Talkie!

It has been available on Android Devices for a little while now. It is now coming to iOS devices, so it could be a very useful feature for your teams. We think this will become a powerful communication tool, and will be using when on site.

Let’s look at what it is before we explore how you’d use it.

If you were alive back in the 1980s, you’ll remember real walkie talkies. They were the coolest way to talk to your friends on the move – long before we had mobiles.

If you’re too young to remember the 80s, then go watch a few episodes of Stranger Things and you’ll get the idea.

With a walkie talkie you press a button to talk, and everyone who has a device on the same frequency as yours can hear you speak.

They can only reply when you let go of the button. And only one person can speak at a time.

What that gives you is ordered real time voice conversation between a group of people.

This new Teams feature works in exactly the same way.

There’s no need to call anyone. Like a real walkie talkie you just push a button on your phone to speak, and everyone in your team channel can hear you.

It works on both Android and iOS devices, so long as they’re connected to the internet. It even works if your phone is locked.

Walkie talkie was originally created with front-line workers in mind.

The idea is that when you are on a client site, you can quickly and securely communicate with the office. And those on site with you, withe less hassle.

We can see this being useful for remote workers too. Doesn’t matter whether your team are in the office or working from home – they can have a voice conversation in real time, instantly.

Just like the old days when everyone worked in the same space.

Can you see how that would help your business?

Before you can use walkie talkie in Teams, you’ll need to make sure it’s enabled. Your administrator will need to do this in the Teams admin centre – it’s really easy.

If you’d like us to help you set up walkie talkie for your business, just give us a call.

Read more

Why you should use a password Manager.

As I settle down to write this, I am aware that last there were stories in the media that a password manager called LastPass, may have had some of its customers master passwords compromised.

LastPass deny this.

Do you use a password manager in your business?

We do and we highly recommend our clients use one as well.  The purpose of this blog article is to help explain the benefits of using one.

But first……

What is a password manager and how does it work?

Almost everyone has hundreds of passwords to allow access to a variety of online services. Most business owners will have even more.

For most of these services your username will be your email address, you then have a password. And then possibly the use of something called multi-factor authentication (where you enter a code, or confirm it is you by clicking allow on another app).

It is very easy to get hold of the email address, and with the use of automated software relatively easy to crack most passwords being used (check the strength of your password)

The software is equipped with a dictionary of popular passwords and words used, for example 12345678, Fluffy, Ben etc.

This is why using your name, child name, sports team etc. is not a good idea for your password.

One method used by hackers is once they have a password for one service, is to try this on multiple other services. This means as soon as one service is breeched then they could gain access to countless other services you use.

One thing to remember is that if a service provider is compromised, and a hacker has accessed the ‘back end’ and managed to pull off 100’s or 1000’s of details they will most likely post these on the Dark Web for anyone to purchase.

Best Practice for using passwords

  1. Never write them down or record them anywhere (this includes the book that says Password on it or even worse the file on your computer called password)
  2. Never use a password for more than 1 service or site at a time.
  3. Use a randomly generated password. I like using nursery rhythms for this. If you take the first line of Jack and Jill, you could have a password like J&Jwuah2fapow. (Note I don’t use this one)

So that is best practice but for most of use even remembering which rhythm we used for which site would mean we would probably end up hitting the reset password every time we logged in.

So, we all ignore the best practice advice above and

  1. Write them down
  2. Use the same password for multiple (or even all) log on.
  3. Use our pets name and a number and special case character (Probably an exclamation Mark) Fluffy2022!

Some of your team will be using weak passwords, or their passwords will be on a post it notes on their monitor!  Look around when no one is in and see who the weak link may be in your IT Security!

What is the answer you ask?

As you can guess implementing a password manager is the answer. Almost all password managers work across all the major platforms (Windows, Macs, iOS and Android).

With this clever piece of software, you will be able to produce truly random passwords. Which can be as long as you want them to be and use number, lower-case and upper-case letters, along with special characters #~$^

The software can also be set up to automatically fill in the details when it comes to the site or service you are trying to connect to.

What is the downside of using this?

You still need a master password to access this, and of course humans being humans the temptation of using a weak (relatively weak) password is still too tempting.

A good password manager will also utilise Multi Factor authentication.

Even with the downside taken into account using a password manager is much better than not using one.

They make live a lot easier for us, whilst keeping us much safer. If you want to know which password manager we use, please contact us.

Read more