Be more productive with these Microsoft Edge features

Be more productive with these Microsoft Edge features

Improving productivity is a never-ending mission for most business owners and managers.

Whether it’s speeding up tasks or improving communication, every little helps. So it’s crucial to make the most of the tools you already have.

And while you might think of your web browser as just a means to access the internet, it can be so much more than that. Especially if you use Microsoft Edge in Windows 11. It has loads of features that can help supercharge your productivity.

Here are five of our favourites.

1. Split Screen for multitasking

Multitasking is a skill every business owner needs, and Microsoft Edge’s split screen feature makes it easier than ever. Whether you’re comparing web pages, researching multiple topics, or simply keeping an eye on different sites simultaneously, split screen lets you view two pages side-by-side within the same tab. It’s like having two windows open at once, but without the clutter.

2. Vertical Tabs for streamlined navigation

Too many tabs? Yeah… we understand that. Microsoft Edge’s vertical tabs offer a fresh perspective on tab management. By stacking tabs vertically along the side of the browser window, you can easily navigate between open tabs and access essential controls like close and mute.

3. Workspaces for seamless collaboration

Collaboration is key in any business, and Microsoft Edge’s Workspaces feature makes it easier than ever to work well with colleagues or clients. Create a workspace with a collection of open tabs, then share it with others via a simple link. It means they can open multiple tabs with one click. It’s perfect for brainstorming sessions, project management, or team presentations.

4. Collections for organised research

Gathering information from the web is a common task. Microsoft Edge’s Collections feature makes this easier, allowing you to easily save and organise text, images, and videos from web pages into custom collections. Stay organised, focused, and productive.

5: Immersive Reader for distraction-free reading

When you need to focus on reading an article or document online, distractions on the page can be a pain. Microsoft Edge’s Immersive Reader feature provides a clutter-free reading experience by removing ads, links, and other interruptions. Customise the text size, spacing, and colour scheme to suit your preferences, and even have the content read aloud for hands-free reading.

If your business doesn’t already use Microsoft Edge on Windows 11, this could be the perfect time to switch. Can we help you move over? Get in touch.

Read more

Firewalls

Perimeter and device firewalls

This week, we turn our attention to the subject of firewalls, both at the perimeter and on your local computer.

Perimeter

A perimeter firewall serves as the first line of defence in network security. Acting as a gatekeeper between internal networks and external threats. It scrutinises incoming and outgoing traffic based on predetermined security rules, blocking unauthorised access while allowing legitimate communication. By monitoring for malicious activities, it prevents attacks such as intrusions, hacking, and data breaches. Implementing a robust perimeter firewall is crucial for safeguarding sensitive data and maintaining the integrity of IT infrastructure, making it an indispensable tool for businesses in the digital age. Its strategic placement on the network edge ensures a secure perimeter, fortifying an organisation’s cyber defences.

Modern perimeter firewalls will also be able to run add on software. To provide a range of additional features. Whilst for many with cloud based email, having anti-spam module enabled is probably a waste of time. Utilising the anti-virus module is always a good idea to try and prevent a virus right at the gateway.

Device firewall

It is important to have a firewall enabled on any device, even if your device is sat behind a perimeter firewall! This is to make sure that it is on if you take your device out and about

Read more

Is this the most dangerous phishing scam yet?

Is this the most dangerous phishing scam yet?

Picture this: You’re going about your day, checking your emails, when suddenly you see a message from a company you trust.

You think, “Great! That’s safe to read”. But hold on just one minute… this email is not what it seems.

It’s part of yet another scam created by cyber criminals to trick you into clicking malicious links or giving up sensitive info. It’s called “SubdoMailing,” and it’s as dangerous as it sounds.

What’s the deal?

Just like regular phishing attacks, cyber criminals pretend to be trusted brands.

But here’s how it works: These cyber criminals scour the internet for subdomains of reputable companies. You know those extra bits in a web address that come before the main domain? Such as experience.trustedbrand.com. That ‘experience’ bit is the subdomain.

They find a subdomain that the brand is no longer using and is still pointing to an external domain that’s no longer registered.

Then they buy the domain and set up the scam website.

So, you believe you’re clicking on experience.trustedbrand.com… but you have no idea it automatically redirects to scamwebsite.com.

The criminals are sending out five million emails a day targeting people in businesses just like yours.

And because these emails are coming from what seems like a legit source, they often sail right past usual security checks and land in your inbox.

Here’s our advice to keep you and your data safe and sound:

  • Be wary of any emails that seem even remotely suspicious. If something looks fishy, it probably is.
  • Before clicking on any links or downloading any attachments, take a moment to verify the sender. Look for red flags like spelling mistakes or unusual email addresses.
  • Make sure your employees understand the latest phishing tactics and know how to spot a scam. A little knowledge goes a long way in keeping your company safe.
  • Consider investing in top-notch security software to keep the cyber criminals at bay. It might seem like an extra expense, but trust us, it’s worth it.

As always, if you need help with this or any other aspect of your email security, get in touch.

Read more

Advanced End Point Security

Advanced End Point Security

Whilst all out packages include Anti-Virus. We are the first to admit Anti-Virus alone is not enough anymore, and will never ever keep you completely safe.

We supplement the Anti-Virus with some advanced end point (Computer) tools.

The first security measure is to make sure you aren’t an administrator on your computer.  Most people when creating their account will select the account to be an administrator account.  This in the main is not needed, and without the administrator permissions, then it is slightly harder for bad actors to do things with your computer.

Secondly we use a tool, that locks down the computer, and the software installed.  Most applications have a wide range of permissions and can do stuff it just doesn’t need to be able to do.  This is then used to make sure any compromise is fully utilised. Bad actors will do this, by making sure they can always access your network (persistence), as well as spread through the network searching for your data.

By locking everything down this should ensure your physical device is safe, and whilst all this means there are a few steps to go through if you want to install something new. The delay is normally less than 10 minutes, we firmly believe this is well worth waiting for. Achieving a safe cyber secure environment.

Of course the biggest issue for most businesses is a compromise of cloud accounts. And so we monitor the log in for unusual behaviour, like:

  • logging in from somewhere you aren’t
  • multiple logins from different locations. 
  • Multiple unsuccessful logins

This along with measures taken to help the computer user, should help keep you safe. But to make sure we also back it up (more to come in few weeks’ time).

For more info give us a call to arrange a complimentry Cyber Security Check

Read more

Is Wi-Fi 7 worth the investment?

Is Wi-Fi 7 worth the investment?

You know that staying ahead of the technology curve is vital for all businesses in a highly competitive marketplace. One innovation launched earlier this year is Wi-Fi 7, the next generation of wireless connection.

But what exactly does it offer, and is it worth the investment for your business?

  • Lightning-fast speeds: No more buffering and lagging. Wi-Fi 7 brings blazing-fast speeds to keep your business running smoothly.
  • Rock-solid connections: Forget all about dropped calls or lost connections. Wi-Fi 7 ensures reliable performance, even in busy environments.
  • Futureproofing: Wi-Fi 7 is built to handle the demands of tomorrow’s tech. It’s future-proofing your business’s internet.

Now, here’s the million-dollar question: Should you upgrade to Wi-Fi 7? Well, it depends. While Wi-Fi 7 offers some awesome benefits, it can be a bit pricey to upgrade.

The initial investment includes the expense of next-gen routers capable of supporting Wi-Fi 7, which can range from hundreds up to thousands. And there may also be ongoing operational costs, especially if you’re leasing routers from internet service providers.

If you’re not ready to dive into Wi-Fi 7 just yet, that’s ok. There are plenty of other ways to improve your business’s existing Wi-Fi. From optimising your current set-up to adding extenders or mesh networks, there are options to fit every budget.

We’re all about making sure you find the perfect tech solutions for your business to keep you and your team happy. If you’d like to go through your options, get in touch.

Read more

Patch management

Patch Management

A lot of the time when systems are compromised in a Cyber Security Attack, it is because something that should have been updated hadn’t been! Patch Management.

So, this week we have a look at the various updates that need to be considered. Is your IT support company doing all of this!

Firstly, we will start with the Operating System.

No matter what flavour of system you are using they all need updating, this should include everything from your server, through to your mobile phone. Although manufacturers will rave about the improvements in updates, the biggest reason we think you should install these updates as soon as you can is that they patch critical security holes.

It is also worth bearing in mind that some of these may not be selected to be installed by default. Or your IT support provider may not automatically install them. On operating system updates one of the biggest things, we see is people not restarting their computer.  These updates if they require a restart, are not fully installed until the restart has happened.

Applications

Almost all applications have updates, and a good practice is to make sure these are up to date as well. Especially your web browser, a lot of attacks happen through web browsers this includes a method that bypasses MFA (2FA) So make sure you are updating all of your applications.

If you no longer need an application, then the best thing to do is to uninstall it

Lastly, something you probably have never considered is a piece of software that you won’t normally ever see.

FIRMWARE.

Firmware is software on many devices that control how the hardware operates, these should also be updated. You will find these not only on computers, and servers but switches wifi access points, telephones, printers – The list goes on, and on. You or your IT supplier should make sure these are kept up to date. They are available from the manufacturer, and the systems to keep these up to date have improved over the years. But some are still difficult to know when updates are available.

Whilst looking at the Firmware please remember that when a manufacturer stops updating the firmware this is normally because the device has reached end of life. And even if it is working properly, you should consider changing it,

If you want to make sure you are covered, please get in touch.

Read more

Cyber attacks: Stronger, faster and more sophisticated

A new security report has revealed some alarming trends. 

First off, cyber attacks are becoming faster than ever. Breakout times (that’s the time it takes for a criminal to move within your network after first getting in) have dropped significantly. We're talking an average of just 62 minutes compared to 84 minutes last year. 

This is not good news.

Not only are these attacks faster, but they're also becoming more common. The report has identified a whopping 34 new cyber criminal groups, bringing the total to over 230 groups tracked by the company. 

And guess what? These cyber criminals aren't sitting around twiddling their thumbs. They're getting smarter and more sophisticated. The report highlights a new record breakout time of just two minutes and seven seconds. That's barely enough time to grab a coffee, let alone mount a defence.

But here's the real kicker: The human factor is increasingly becoming the main entry point for these cyber attacks. 

They will try to get your people to click a link in a phishing email, which will take them to a fake login page. Once your employee enters their real login details, they have inadvertently handed them over.

Or they pretend to be someone your team trusts. This is called social engineering.

So, what can you do to protect your business from these cyber threats? 

•	Educate your employees
Make sure your team is aware of the latest cyber threats and how to spot them. Regular training sessions can go a long way in preventing costly mistakes.

•	Implement strong password policies
Encourage the use of complex random passwords generated and remembered by password managers. Use multi-factor authentication for an added layer of security (this is where you use a second device to confirm it’s really you logging in).

•	Keep your systems updated
Make sure all software and systems are up to date with the latest security patches. Cyber criminals often exploit known vulnerabilities, so staying current is key.

•	Invest in cyber security software
Consider investing in reputable cyber security software that can help detect and mitigate threats in real-time (we can help with this).

•	Back-up your data
Regularly back-up your data and store it in a secure location. In the event of a cyber attack, having backups can help minimise downtime and data loss.

When it comes to cyber security, it's better to be safe than sorry. If we can help you to stay better prepared, get in touch.

A new security report has revealed some alarming trends.

First off, cyber attacks are becoming faster than ever. Breakout times (that’s the time it takes for a criminal to move within your network after first getting in) have dropped significantly. We’re talking an average of just 62 minutes compared to 84 minutes last year.

This is not good news.

Not only are these attacks faster, but they’re also becoming more common. The report has identified a whopping 34 new cyber criminal groups, bringing the total to over 230 groups tracked by the company.

And guess what? These cyber criminals aren’t sitting around twiddling their thumbs. They’re getting smarter and more sophisticated. The report highlights a new record breakout time of just two minutes and seven seconds. That’s barely enough time to grab a coffee, let alone mount a defence.

But here’s the real kicker: The human factor is increasingly becoming the main entry point for these cyber attacks.

They will try to get your people to click a link in a phishing email, which will take them to a fake login page. Once your employee enters their real login details, they have inadvertently handed them over.

Or they pretend to be someone your team trusts. This is called social engineering.

So, what can you do to protect your business from these cyber threats?

  • Educate your employees

Make sure your team is aware of the latest cyber threats and how to spot them. Regular training sessions can go a long way in preventing costly mistakes.

  • Implement strong password policies

Encourage the use of complex random passwords generated and remembered by password managers. Use multi-factor authentication for an added layer of security (this is where you use a second device to confirm it’s really you logging in).

  • Keep your systems updated

Make sure all software and systems are up to date with the latest security patches. Cyber criminals often exploit known vulnerabilities, so staying current is key.

  • Invest in cyber security software

Consider investing in reputable cyber security software that can help detect and mitigate threats in real-time (we can help with this).

  • Back-up your data

Regularly back-up your data and store it in a secure location. In the event of a cyber attack, having backups can help minimise downtime and data loss.

When it comes to cyber security, it’s better to be safe than sorry. If we can help you to stay better prepared, get in touch.

Read more

Why IT needs to be monitored and managed

Why IT needs to be monitored and managed

Why does IT need to be Monitored?

To put it simply what isn’t measured (monitored), can’t be improved!

So we monitor a whole range of things. Some are basic physical items, such as storage space used.  We do this so if the drive is full we can run a script and try and free up some space to keep it working at it’s best. Other items may just raise an alert so we can track the history, like high temperature alert.

Other items we measure, is looking for cyber Security issues. This is just basic items, this supplements the security measures we also recommend (coming in a future post)

We monitor the software, as well, this is partly to make sure nothing is installed that shouldn’t be, but also what is installed is fully up to date.  Similar to our process for updating Windows itself.

If it is monitored it can be managed.

As mentioned above the items we can monitor can then also  be managed. The whole idea around this isn’t to monitor what the user is doing! But to ensure that the computer is always running as well as it can, and to make sure the computer is also cyber secure.

But it doesn’t stop with computers. We can also monitor and manage Network equipment to ensure that this is also running well, and securely.

What does this mean for your Business

Aside from knowing your employees are working on devices running as they should and securely. It also means they are able to work efficiently. And it also means that you can make decisions on when to update/upgrade equipment based on facts and not on a feeling.

You might want to look at our IT Support or IT Services Pages

In summary, IT monitoring and management are not optional; they are critical for business continuity, security, and growth. Organisations that prioritise these practices can harness the full potential of their IT infrastructure, drive innovation, and stay ahead in a rapidly evolving digital landscape.

Read more

The little things that make a big difference

The little things that make a big difference

Microsoft’s latest Windows 11 update has dropped, and it’s got a small change that could make a big difference to you and your team.

Microsoft has given Copilot, its handy AI assistant, a new place on the taskbar. No more hunting around for the button. Now it sits on the far right of the taskbar, in what we tech folks call the ‘system tray area’.

If Copilot isn’t your thing, no worries. You can easily remove it from the taskbar altogether. But having an AI assistant at your fingertips can be a real boost for productivity, so we’d recommend you give it a chance before giving it the boot.

Before you rush to check if your Copilot button has relocated, let’s talk details.

First off, this update has been rolling out over the last few weeks.

It’s known as Patch KB5034765 (catchy name) and isn’t just about moving buttons around. It’s also packed with important security and bug fixes, including a crucial one for Explorer.exe. This was causing some PCs to freeze up when restarting with a game controller attached.

Probably not an issue in your business, but you never know…

There was also a problem with slow announcements from Narrator, the screen reading tool. That’s been fixed.

While this Windows 11 update may seem like small fry, it’s these little tweaks that can really streamline your workflow and stop your team from being interrupted by problems while they work.

Has your business switched over to Windows 11 yet? Our team can look at your set-up and advise whether you’d benefit from upgrading, or you should stay on Windows 10.

Get in touch and ask us for a tech audit.

Read more

Why we do Security packages and not support

Why we do Security packages and not support

For the last 2 years, we have been working on moving from providing support to providing security. We no long just sale support!

Why!

Since I started Limbtec way back in 2002, what we did and how we did it was far different to today. About 50% of our work was support including installing, and configuring, and about 50% from sales of hardware and software.

Our business model has changed over time, most recently to providing support mainly via remote means. And this being around 80% of our business model, with the remaining being cloud services.

Security

A little over 2 years ago, I sat down and looked at whats next! And the continual biggest issue facing our customer base was Cyber Security, and Cyber Hygene. There is a saying, that if you haven’t had a cyber security breech, then you either don’t know about it, or you are about to!

What needed to change.

The biggest problem is up to this point we were looking at what could be done to help businesses grow. And use technology to achieve that. What the whole of the IT industry seemed to have done is forgotten about making sure this was done in a secure manner! A security first approach.

Methodology

I am not a great fan of reinventing the wheel! And in the UK, there is a certifcation scheme called Cyber Essentials. So we used this framework to build out 3 tiers to achieve Cyber Essentials Standards. Even if Cyber Essentials Certification is not taken up! Our clients should be secure, due to massively improved Cyber Hygene.

Monitoring

So the biggest issue with Cyber Essentials is that it is done on a snap shot. At that point you have a good cyber hygene, but there is no requirement to monitor this. This is where our packages come in, we will monitor the items required, and we budle extra measures in to the mix (depending on package) to strengthen your security.

We haven’t forgotten Support

We started as a support company! And as the biggest growing support requests are around Cyber Security, we are facing these head on, but haven’t forgotten about other support issues, we bundle support into all packages at various levels.

Over the coming weeks, On a wednesday I will be blogging details of what we thing is important to consider, with your business and cyber security. If you want to have a free review please contact us

Read more