Going to the Dentist

Your IT Team - like your Dentist only without the pain

What on earth is he on about in this blog? What has dentistry got to do with IT or computers? He’s obviously still in the ‘Christmas Spirit’…

 

Well maybe (although in my defence I first thought about writing this in early December, just didn’t get the chance. That’s my story and I’m sticking to it…)

 

OK bear with me here. Try to remember the last time you had to go to the dentist – not for a check-up and clean – but because you were in pain. If you’re anything like me you would have put up with it for a while, in the delusional belief that it will somehow go away all on its own. But it doesn’t, it gets worse and at some point, the pain reaches a tipping point and you finally make an appointment to see the dentist.

 

You get there, explain the problem and they take a look. They identify the offending tooth/teeth and take appropriate action to resolve it.

 

The relief! Suddenly this constant pain that you have been living with has instantly gone!You leave the dentist walking on air, feeling like you’re ten years younger.

 

Drive home, an hour later you’ve pretty much forgotten all about it and are back to dealing with whatever matters you have to deal with in your everyday life or job. Certainly, within a couple of days, the whole thing is a distant memory.

 

Now remember the last time you’re email didn’t work. Or your printer. Sod’s law guarantees that they stopped working at the worst possible time. You need to get an email to your client within the next hour. You’re trying to print a document that you need before heading out of the door to a meeting. Arrgh!

 

Believe me, even though I work in IT I still experience these same frustrations. The simple fact is that computers and their systems sometimes go wrong. And just like your toothache, it’s painful and incredibly inconvenient.

 

So you ring one of the Tech guys at Fresh Mango. They fix your email or printer, and you’re back in business (literally). The only difference with the dentist is that you have almost certainly forgotten the issue within a matter of minutes. After all, we’re all incredibly busy.

 

What’s the point of this blog? Well, there isn’t one really, other than to spare a thought for the IT Technician who just fixed your email or printer.

 

Remember he or she is doing this all day long for people just like you. And just like your dentist, they’re helping you get on with your life as efficiently as possible. Yes, it’s their job, but believe me a simple ‘thank you’ goes a long way to making their day that little bit better as well.

 

Wishing you a Happy New Year and a prosperous 2024!

The importance of cyber awareness aka cyber hygiene

From the outset I want to be very clear. ‘Cyber awareness’ doesn’t mean being aware that there are cyber risks, or that there are hackers ‘out there’.

 

It means being aware of what those actual risks entail. It means being aware of the methods (or vectors) that attackers use to gain access to IT systems. It means knowing how to avoid successful hacks. It means knowing what to do in the event of a breach.

 

But most of all, the absolute number one thing to understand, is that there is no technical solution that can guarantee 100% IT/cyber security. That’s because hackers don’t always look for technical weaknesses. They look for – in fact rely upon – human fallibility.

 

The cyber media conducts annual surveys of cyber threats and attacks and consistently finds that 4 out of 5 successful cyber attacks can be traced back to poor cyber hygiene from internal staff.

 

Believe it or not, your staff can inadvertently allow or help hackers to gain access to your systems.

 

 

That’s why Cyber Awareness (or Cyber Hygiene) for all computer users in an organisation is of paramount importance. It needs to be deployed alongside technical measures. This combination represents the most powerful cyber security defence.

 

Fresh Mango Technologies provides cyber-awareness training to staff in companies across the UK, USA and Caribbean.

 

What to expect from Cyber Awareness Training

Fresh Mango’s Cyber Awareness Training covers all of the areas described above. These include:

 

  • Phishing
  • Passwords and Authentication
  • Responding to a Cyber Attack
  • Staying safe online
  • Reporting cybercrime
  • Malware Attack
  • Protecting your business from cyber attacks
  • Safe Device use
  • Whaling Attack
  • Handling data

 

Cyber hygiene training opens eyes to the threats that are out there; not just in emails, but on Facebook, websites, LinkedIn, pretty much anywhere online! Cyber hygiene refers to how you and your staff conduct yourselves from an online perspective.

 

So, it’s not just about IT usage within your business, but also an individual’s overall approach to internet usage and your internal policies and processes.

 

 

 

The Training event

 

The training can be conducted over Teams video or in person. It typically lasts 2 hours.

 

Provided by qualified and experienced instructors, our cyber awareness training is designed to provide more depth and detail than standard e-learning packages.

 

Our instructors share real-life experiences and examples of the latest cyber-attacks and threats. Current best practices and the best techniques for avoidance of cyber issues are discussed in detail. We’ll advise how to stay cyber-safe within the workplace and at home.

 

There is a test at the end and participants will be issued with certificates on completion of the training.

 

In Conclusion

 

Every organisation should take appropriate technical and procedural measures to ensure that you are as robust as possible against the cyber threat. Achieving Cyber Essentials accreditation is an excellent means of achieving this.

 

In tandem with these measures, regular (at least annual) cyber hygiene training will ensure everyone in your organisation understands what to look for and how to deal with it.

 

Top Three Cyber Security Tips

Cyber Security Tips

 

Cybersecurity is never out of the news these days. A day doesn’t go by without news of a company having a data breach or a threat from a new cyber Actor. With so much in the news, it can be quite overwhelming and difficult to know what to do.

 

So, herewith are our main Cyber Security Tips for maintaining the security of your IT systems:

 

  1. Ensure your server, network equipment and computers are updated with the latest versions of their operating software regularly. The best way of ensuring this is to engage professional IT support.
  2. Implement Two-factor authentication (TFA). Fresh Mango uses Duo TFA on all of our systems, and many of our customers have implemented TFA. The increases in security and peace of mind far outweigh any minor annoyances of having to go through an extra security step when accessing systems.
  3. Don’t fall for scams. It’s so easy to do so, especially when busy. The key issue to look out for is urgency. If you receive a phone call and it relates to anything financial or IT, and the caller is saying it’s an urgent issue, hang up. Call the actual business they claimed to be from (e.g. your bank) to verify. The same applies to emails. If in any doubt call your supplier on the number you have on your records to verify an invoice.

Please contact us to find out more about our cyber security services and to get more cyber security tips!

Cyber Security Tips

Did you forget your Microsoft 365 password?

Did you forget your Microsoft 365 password?

 

In these days of multiple logins, it’s all too easy to forget your password!

 

Here’s how to reset your Microsoft 365 password if you forget it.

Reset your password


If the password you typed is incorrect, you’ll see a message that says:

Your account or password is incorrect. If you don’t remember your password, reset it now.

 

Tip: We recommend following the steps below to resolve your password issues. If you already tried this but it didn’t work, use the Microsoft Sign In Helper tool.

 

1. Select Forgot password


If the Enter password window is still open select Forgot password?

(Or go directly to Reset password and enter the username name again for the account you’re trying to reset and select Next).

 

2. Verify your identity


For your protection, Microsoft must verify your identity before you can proceed with resetting your password.

 

How to verify your identity depends if you previously added security info to your account and if you can still access them. Select from the two options below.

 

Option 1: You received and can select a verification option

Select which option to send the verification code to.

Select Next.

 

Option 2: No verification options are given or you can no longer access any of the options

If you don’t see an option for where to send a code or you no longer have access to any of the verification options shown, you won’t be able to reset your password this way.

Tip: If these steps didn’t work, or you have other account sign-in issues, use the Microsoft Sign In Helper tool.

 

3. Get a verification code

Depending on the contact method you chose, retype the first part of the email address or the last four digits of the phone number hinted at in the previous window.

 

Select Get code.

 

Microsoft will send a verification code to the email or phone number you selected.

Go to the recovery phone or email where you expect to receive the code.

 

Tip: If you didn’t receive a message, check your junk folder or if you selected the phone option, make sure your phone has service and can receive texts, and verify your phone isn’t set up to block texts from unknown numbers.



4. Enter code and reset password


Paste or type the code you received and select Next.

 

Type your new password and select Next.

How Professional IT Support saves money

We’re often asked how professional IT Support saves money for businesses. Clearly, we believe it does (we would, wouldn’t we?!) and in this blog, we set out the reasons why.

 

If you’re reading this then it’s likely that you fall into one of two kinds of business. It could be that you don’t have any professional IT Support in your company, or it could be that you do and for whatever reason, you’re dissatisfied with it. Either way, the savings rationale that follows will apply to you.

 

Firstly, let’s think about your car (Stick with us!). Most modern-day cars have sophisticated engine management systems that pretty much make maintaining the car yourself impractical. So you take it to a garage to do the maintenance work, whenever the next service interval comes along.

 

Even if you have (say) a classic car that allows you to do the servicing yourself, you accept the need for servicing the car, right? Of course, you do. If you don’t maintain the car, its performance will degrade and eventually, it will let you down. You depend on your car. It cant let you down. It’s a no-brainer.

 

So, back to the point. Your business depends on your computer systems, however simple or sophisticated they may be. So why wouldn’t you maintain them? Why would you allow them to gradually degrade in performance, and inevitably let you down? Surely that’s a no-brainer too?

 

If you agree, you’ve understood the first reason why professional IT Support saves money for businesses. 

 

Efficiency

 

So now you’re getting your IT systems maintained professionally, how is it saving you money? Well, one word – efficiency. 

 

Professionally-maintained systems don’t go wrong very often. So that means all your employees can get on with their jobs. We have gotten IT out of the way, as it should be. It should be there to facilitate, not frustrate your business.

 

The other efficiency gains come from having IT Technicians readily available for any issues that may come up. Instead of potentially wasting hours trying to fix them yourself. A huge efficiency gain.

 

We put it like this: there are two aspects to how professional IT Support saves money for businesses.

 

  • The proactive maintenance that we conduct (patching, health checks and so on) to ensure everything is running smoothly

 

  • The reactive support that we provide, when you do need help with something.

 

So there you have it! Professional IT Support, thanks to efficiency savings in your business, more than pays for itself. 

 

If you would like to get in contact for a no-obligation consultancy on how Fresh Mango will help your business save money, please do so here.

 

I’m CEO, I should have Admin credentials!

“I’m in charge of the company, surely I should have Admin credentials for our IT systems?”

 

It’s fair to say we hear this comment/complaint a lot.  We take time to explain why it’s a really bad idea for the most senior person in the company to have ‘access to all areas’ of their IT systems, but often times we can tell they are unconvinced.

 

We will set out the reasons for this policy below, but firstly here are a couple of things that happened to two clients in the last fortnight.

 

Client 1 – Hit by Ransomware.

Client 1 came back to work on Monday to find their entire system locked out by ransomware. We were tasked with trying to recover their systems without resorting to them paying the Bitcoin demands in the ransomware.

 

Long story short, after a week and a half we were able to get them up and running again, although they had lost a lot of data.

 

Moreover, they had not been able to operate during the interim period.

 

Despite this they were delighted that we had been able to recover anything at all.

 

The frustration for us was that it was entirely avoidable and we had been warning them for years – no exaggeration – that this may happen. Why were we warning them? Simple – they disregarded all of our upgrade proposals including:

 

  • Server upgrade – current OS out of support from Microsoft making it a cyber risk
  • Anti-virus software (!)
  • Cyber hygiene training for staff
  • Implementing non-Admin privileges for all staff

 

These last two points were the kickers – one of their staff, with full Admin privileges on their PC – clicked a phishing email that led to the Ransomware locking out the entire company.

Client 2 – Ransomware near miss

 

Client 2 contacted us last week advising one of their major customers had been hit by ransomware. We ran some checks on our client’s systems and confirmed all was OK. 

 

The reasons they went unscathed were simple:

  • Good cyber awareness amongst their staff
  • Commercial anti-virus and anti-spam in place
  • No Admin credentials for any of their staff.

 

Simply put, Client 1 had repeatedly ignored our advice, and Client 2 had embraced it.

 

Admin Credentials – principle of least privilege

 

These stories lead us to the opening topic of this blog piece – Admin credentials. There is simply no need for anyone in a company to log into the system on a regular basis with Administrative credentials. The only time it’s needed is for maintenance and software upgrades.

 

If a user has Admin credentials, the software can be installed on their computer. This is how ransomware and other malware gets in. If a user is a ‘Standard user’ it’s much harder for malware to be installed on their system.

 

This is why the “principle of least privilege” is an essential element of any professional IT setup. And it’s why the CEO or head of the company, or anyone else in the company, should have standard access privileges only.

 

Indeed, the CEO, as the most visible person in the company, can often be targeted by hackers. All the more reason to have the least access possible!

 

We hope you have found this Blog piece helpful and please do contact us if you would like to find out more about the principle of least access.

 

 

Why engage an IT company rather than a ‘one-man-band’?

We sometimes find that businesses rely on sole contractors (“IT one-man bands”) for their IT Support. Whilst they may find this works for them from a cost perspective, it does pose some challenges.

 

What happens if the contractor is on holiday?

 

What if they’re off sick?

 

Availability issues aside, what assurances do you have that they are maintaining their standards and capabilities in line with the latest technologies? Information Technology is the fastest-moving industry on the planet, and it’s no exaggeration to say that last year’s latest technology is already outdated today.

 

Furthermore, how proactive are they? Are they monitoring your systems continuously? Are they conducting regular patching (particularly important from a cyber security perspective)? Or do they just work on issues on an ad hoc basis?

 

Given the importance of IT to your business (ask yourself honestly- how long could you operate without your IT systems?) is it really something that should be left to an IT one-man-band to take care of?

 

That’s why when you engage a professional IT support company – such as Fresh Mango Technologies – it is so important for your IT Support. In one fell swoop all of the above concerns go away:

  • We have a team of IT Support technicians so there will always be someone available to assist you
  • We train our staff on a continuous basis – weekly internal training and all technicians are required to continue their education with external qualifications every year
  • We monitor client systems continuously and conduct regular server health checks as well as backup checks, and conduct regular patching.

 

If any of this sounds familiar and resonates with you, maybe it’s time to contact Fresh Mango for a no-obligation IT audit – we’ll be pleased to assist and provide our recommendations for smooth and secure management of your IT systems.

 

It’s time to make IT Mango!

Do I have to upgrade to Windows 11 yet?

Short answer – no you don’t have to upgrade to Microsoft Windows 11 yet! Windows 10 will remain in support by Microsoft until 2025.

For the longer answer, read on!

WINDOWS 10 VS 11

Less noise, clutter, and chaos. Microsoft reimagined the way a PC should work for you and with you. Take a look at some of the new features and where they’ve made some improvements.

The newest edition of Windows, Microsoft Windows 11, was released by Microsoft on 5th October 2021. You can find out more about the latest Microsoft operating system below, there are a few key points to note:

  1. There is no rush to upgrade your operating system from Windows 10 to 11. Windows 10 remains in support until 2025.
  2. Windows 11 does have some minimum system requirements. Therefore it may not be possible to upgrade without upgrading the hardware on your PC or laptop or completely replacing it.
  3. Windows 11 is still in the early stages of its release, like any new software it is possible there will be bugs or issues that will be ironed out in time.

For these reasons, our recommendation is to stick with Windows 10 for the time being. However, if you are considering purchasing a new PC or laptop in the near future, please do check to ensure the specification allows it to be upgraded. Fresh Mango will be pleased to advise you.

The latest Windows OS has easy-to-use tools that can help you optimise your screen space and maximise your productivity. Combine that with a Microsoft 365 subscription and nothing will stop you from getting tasks done.

Upgrading

Find out more about upgrading to Microsoft Windows 11 by contacting Fresh Mango. We’ll be pleased to advise on the best approach depending on your business or personal requirements. We can also advise on whether your existing PC/laptop can accept the new operating system.

IT Whack-a-mole

DO YOU FEEL LIKE YOU’RE PLAYING IT WHACK-A-MOLE? ONE PROBLEM GOES AWAY, AND ANOTHER ONE APPEARS? WORSE, THE SAME ONE COMES BACK?

 
 

 

  • This field is for validation purposes and should be left unchanged.

 

 


 
 

 

  • This field is for validation purposes and should be left unchanged.


 
 

 

  • This field is for validation purposes and should be left unchanged.


Do you feel like you’re playing IT whack-a-mole? One problem goes away, and another one appears? Worse, the same one comes back?

Proactive IT support from Fresh Mango Technologies is designed to stop the problem from occurring in the first place! And when you do get a problem, we fix it AND the cause. So you won’t have to ‘whack’ it again!

Stop playing whack-a-mole with your IT support with proactive IT support from Fresh Mango Technologies UK.


You’re not alone. ‘IT Whack-A-Mole’ issues affect the entire IT world. Many modern professionals in IT use the term ‘IT Whack-a-mole’ to refer to processes or pervasive problems that just keep occurring, even after you think you’ve fixed them.

These types of problems are common in a lot of businesses, with hardware & software that fails routinely such as printers, monitors or email. These sorts of issues have become so commonplace in many places they’re the expected norm. We want to change that.

We understand that these are critical tools you need to get your job done and losing them, again and again, sets your business back exponentially. Failure in even one of these areas can bring work to a halt for many businesses, costing you time, resources and money.

We believe the route of these issues lies in poor IT support from companies or individuals who lack the expertise and knowledge to offer truly proactive IT support. Support from Fresh Mango Technologies UK, however, is different. Our team is reliable, dependable, experienced and professional, offering a unique approach to support.

Our approach to IT support means our technicians not only resolve the issues at hand but go above and beyond to ensure the stability of your system even after we’ve stopped working on it. We answer why and how a problem occurred and better yet, provide you with professional experienced advice on how your systems can be improved and adapted to never experience this issue again.

With over 30 years of successfully providing computer, website and IT support across the UK and Caribbean, you know you’re in safe hands. We pride ourselves on rapid response and our friendly, professional, highly qualified engineers who are trained to understand your needs and deliver sound advice and the right solution the first time.

You may also be interested to read our blog piece on the ideal IT System setup.

If you enjoyed this article you may also be interested in Children & Technology: Cookies, Webs & Touchscreen.

Microsoft Out of support dates

When you hear ‘Microsoft Out of Support’ mentioned it may not be clear what that actually means. We’ll explain it below, as well as advise on some of the key dates relevant to Microsoft Products.

Microsoft Out of Support products

When you hear ‘Microsoft Out of Support’ mentioned it may not be clear what that actually means. We’ll explain it below, as well as advise on some of the key dates relevant to Microsoft Products.

What does Microsoft Out of Support mean?

Very simply it means that an item of Microsoft software or a Microsoft operating system will no longer be updated by Microsoft. The software or operating system will continue to operate, but will no longer receive updates.

Microsoft usually reduces support in a step called Extended Support before finally ending all support.

Extended Support means that the products won’t receive any new features or changes anymore, and updates will focus on fixing security issues and major stability issues only.

End-of-Support means there are no further updates of any kind. The lack of ongoing security updates means that the relevant software and operating system will become increasingly vulnerable to cyber-attacks. You should note that no amount of security software (Anti-virus, anti-spam, cyber protection) can prevent this. Therefore at end-of-support (before preferably!), you should plan to upgrade accordingly.

You will find the Microsoft Out-of-support dates for Office, PC operating systems and server operating systems below. If you are operating with any items that are out-of-date, please contact us for advice on upgrading.

 

Microsoft Office Out-of-Support dates

If you are using Microsoft Office  the out-of-support dates are as follows:

Client operating systemsEnd of mainstream supportEnd of extended support
Office 2010no longer supportedOctober 13, 2020 – Ended
Office 2013no longer supportedApril 11, 2023
Office 2016no longer supportedOctober 14, 2025
Office 2019October 10, 2023October 14, 2025
Office 2021October 13, 2026October 13, 2026

Pre-Windows-10

Client operating systemsEnd of mainstream supportEnd of extended support
Windows 8.1January 9, 2018January 10, 2023
Windows 7, service pack 1*January 13, 2015January 14, 2020 – Ended

Windows-10

Windows 10 version historyDate of availabilityEnd of service for Home, Pro, Pro Education, and Pro for Workstations editionsEnd of service for Enterprise and Education editions

Client operating systemsEnd of mainstream supportEnd of extended support 
Windows 10, version 21H2Nov 16, 2021June 11, 2024 
Windows 10, version 21H1May 18, 2021December 13, 2022 
Windows 10, version 20H2October 20, 2020May 9, 2023 
Windows 10, version 2004May 27, 2020December 14, 2021 
Windows 10, version 1909November 12, 2019May 11, 2021 
Windows 10, version 1903May 21, 2019December 8, 2020 
Windows 10, version 1809November 13, 2018November 10, 2020*** 
Windows 10, version 1803April 30, 2018November 12, 2019 
Windows 10, version 1709October 17, 2017April 9, 2019 
Windows 10, version 1703April 5, 2017*October 9, 2018 
Windows 10, version 1607August 2, 2016April 10, 2018 
Windows 10, version 1511November 10, 2015October 10, 2017 
Windows 10, released July 2015 (version 1507)July 29, 2015May 9, 2017 

Server Operating Systems

Client operating systems End of extended support
Windows Server 2022 (Datacenter, Datacenter Azure Edition, Standard) October 14, 2031
Windows Server, version 20H2 (Datacenter, Standard) May 10, 2022
Windows Server, version 2004 (Datacenter, Standard) December 14, 2021
Windows Server, version 1909 (Datacenter, Standard) November 12, 2019
Windows Server, version 1809 (Datacenter, Standard) November 13, 2018
Windows Server 2019 (Datacenter, Essentials, Standard) November 13, 2018
Windows Server, version 1803 (Datacenter, Standard) April 30, 2018
Windows Server, version 1709 (Datacenter, Standard) October 17, 2017
Windows Server 2016
Datacenter, Essentials, Standard)
 October 15, 2016
Windows Storage Server 2016 October 15, 2016
Windows Server 2012 R2 October 10 2023
Windows Server 2012 October 10 2023
Windows Server 2008 R2 February 22, 2011
Windows Server 2008 SP1 April 20, 2009

Microsoft Upgrade Advice

Contact Fresh Mango Technologies today to ensure you have the latest Microsoft packages in place for your business.

A Day in the Life of an IT Support Technician

I thought it may be interesting to write up what a typical day as an IT Support Technician at Fresh Mango Technologies is like.

 
 

 

  • This field is for validation purposes and should be left unchanged.

 

 


 
 

 

  • This field is for validation purposes and should be left unchanged.


 
 

 

  • This field is for validation purposes and should be left unchanged.


I thought it may be interesting to write up what a typical day in my life as an IT Support Technician at Fresh Mango Technologies is like. So I worked with one of our team members on a random day (a Tuesday last month) and kept a diary of everything he did that day.

It turned out to be a lot of fun and I hope you enjoy reading it as much as I did writing it!

IT Support Technician – a ‘typical’ day

Well let’s put something to rest immediately – there’s no such thing as a typical day for an IT Support Technician! We certainly plan the weekly work for the team, and so on a day-to-day basis, they always have a clear schedule in place. However, we never know when a customer may have an urgent IT matter that requires a ‘DER’ (Drop-everything request) and so all plans are fixed in stone until they aren’t!

Fortunately, we don’t get many DERs – with continuous monitoring of customer systems and regular ‘patching’ and other health checks – we keep problems to a minimum. That doesn’t mean they don’t occur though, as we were to see on this particular Tuesday… Here’s how it played out. It’s written in the first person from our technician’s perspective.

Leaving Home

I left home at 730AM to ensure I could beat the traffic and be at our customer premises near Leeds for an 8 AM scheduled onsite visit. The relatively early start was to ensure minimal disruption to the customer (their staff mostly start at 9 AM). This particular customer has quarterly visits and their systems are relatively new, so I anticipated a pretty smooth visit.

After checking in I went to the server room to conduct physical checks and updates of systems. This took around an hour, and then I did a ‘touch check’ of every PC and laptop available. This entails simply talking to every member of staff and asking if they have any IT issues. We find that sometimes people will suffer an annoying issue and they don’t raise it as a support request. By ‘touch checking’ everyone we can iron out any niggles whilst on-site and it’s always appreciated.

At the same time, I handed out special offer cards, ensuring each PC is labelled and had ‘How to contact us’ stickers on them. I found a couple missing and added them.

10 O’Clock

Back to the Leeds office and to my desk to conduct scheduled work and to help deal with any tickets (support requests). It was a busy day. Microsoft had issued an ‘Emergency patch’ update overnight. This means that Microsoft has found a security issue with their operating software, and so the software needed to be updated on all customer computers as soon as possible. So I set about scheduling overnight updates for the customers that had been assigned to me.

Lunchtime (1230)

Having gotten through all my updates, I headed for some lunch. I usually bring something into the office, but I had another scheduled on-site visit with a customer south of Leeds so decided to eat ‘on the hoof’. This was for a straightforward installation of 2 new PCs.

I arrived at the customer premises at around 1 PM and installed the computers. I asked the users to ensure they were set up to their liking (they were) and also did a quick check of their server (not scheduled but I think it’s good practice). Just as I was getting ready to head back to the office, I received a call from Bruno (our Technical Manager). He wanted me to head straight to another customer just a couple of miles away. They had just called to say they thought they may have been hacked. OK, foot-down time!

245 PM

Arrived at the customer’s premises. Bruno had briefed me en route and one of our senior technicians was also accessing their systems remotely to run security checks. Strictly speaking, we didn’t necessarily need someone on-site, but when a customer thinks they have been hacked we always establish an on-site presence as quickly as possible. This is in case we need to isolate a device, or the entire network if a sustained cyber attack is underway.

Fortunately, that was not the case with this particular event. We quickly found the source of the hack – a single PC – and so I immediately quarantined it. This is of course disruptive for the individual using it, but we can’t risk a hacker gaining access to other systems, nor do we wish to see ransomware spread across their network. Having confirmed with Bruno that all scans were negative, I headed back to the office with the quarantined computer so we could diagnose what happened and clean it of any malware.

4 PM

Arrived back at the office, and with assistance from Bruno, we began the diagnosis. As is so often the case, we found that the user had clicked on a ‘phishing’ email. This particular link took the user to a convincing, but fake, Microsoft login screen. This in turn asked for credentials that they had entered. So, the first thing to do was to reset their password, which I did. We then ran a full security sweep of the PC and confirmed no other ‘nasties’ were on it.

That was a close shave for the customer – fortunately the individual who had clicked on the link had the presence of mind to realise something may have been untoward and had notified us accordingly.

545 PM

Time to head home. I arranged for another member of the team to return the quarantined PC to the customer first thing tomorrow since my schedule was taking me to see three clients in North Yorkshire.

So there you have it – a typical day for an IT Support Technician. And it’s still only Tuesday…!

 

 

Computer tax relief

The Chancellor recently announced an extension to the super-deduction corporation tax relief measure, effectively providing computer tax relief.

Computer tax relief – New temporary tax reliefs on qualifying capital asset investments from 1 April 2021

The Chancellor recently announced an extension to the super-deduction corporation tax relief measure, effectively providing computer tax relief.

This means when you purchase (not lease) qualifying investments you can claim 130% tax relief on them until 1st April 2023. This means you should be able to obtain computer tax relief on any computer systems you purchase until that date.

Of course, you should check the position with your accountant before claiming computer tax relief.

So, don’t delay, now’s a great time to commence your computer system upgrades!

You can read the full report from HMRC here.

What you should consider for your IT systems

First and foremost you should review your computer server and determine if it is time to upgrade. If you are still operating on Windows server 2012 then you really have no choice, since this will soon be out of support by Microsoft. Notwithstanding that, if your server is (or will be) 5 or more years old, it’s really time to consider a new one.

Associated with servers is network equipment. Lead times for this equipment, notably switches, are hugely problematic. You should plan on a 6-month lead-time. That means you should start planning now if you wish to have your new IT system in place before the April 2023 deadline.

Finally, you should consider upgrading all your PCs and Laptops. If they are still operating on Windows 10, keep in mind that Microsoft will end support for Windows 10 in 2025. At that point you will need to upgrade to Windows 11. Note that in order to run Windows 11, PCs require a minimum hardware specification. So it is worth considering making the change to Windows 11 now.

Excerpts from the report

General description of the measure

This measure will temporarily introduce increased relief for expenditure on plant and machinery. For qualifying expenditures incurred from 1 April 2021 up to and including 31 March 2023, companies can claim in the period of investment:

  • a super-deduction providing allowances of 130% on most new plant and machinery investments that ordinarily qualify for 18% primary rate writing down allowances
  • a first-year allowance of 50% on most new plant and machinery investments that ordinarily qualify for 6% special rate writing down allowances

Policy objective

This measure is designed to stimulate business investment. It does so by increasing the incentive to invest in plant and machinery by offering higher rates of relief than were previously available.

 

Add extra security to your systems with TFA

In this blog piece, I’ll discuss how to add extra security to your systems with two-factor authentication (TFA). It’s actually very straightforward and provides a step-change improvement to your security.

In this blog piece, I’ll discuss how to add extra security to your systems with two-factor authentication (TFA). It’s actually very straightforward and provides a step-change improvement to your security.

What is Two-factor Authentication?

Two-factor authentication protects your applications by using a second source of validation, like a phone or token, to verify user identity before granting access. It is engineered to provide a simple, streamlined login experience for every user and application, and as a cloud-based solution, it integrates easily with your existing technology.

Add extra security to your systems – Our recommended TFA solution

We have tested several solutions for TFA/MFA and have chosen ‘Duo’ as our preferred offering. Duo is fast and easy for users to set up, and with several available authentication methods, they can choose the one that best fits their workflow. No headaches, no interruptions — it just works.
Because Duo functions like a gateway for your existing and future IT infrastructure, it’s the perfect solution for growing businesses of any size. Set up new users and support new devices at any time, and protect new applications almost instantly — without impacting legacy technology.
Duo natively integrates to secure any application or platform, so whether you’re adding 2FA to meet compliance goals or building a full zero trust framework, Duo is the perfect addition to your security portfolio.

  • Multi-cloud, hybrid, or on-premises environments
  • SAAS tools, critical infrastructure, custom applications, and even SSH
  • Secure remote access

Add extra security to your systems – An example deployment

We use a bespoke management system called JIM. We continuously maintain and improve the security of the system. We implemented Duo so that, even in the unlikely event that a hacker cracks one of our encrypted passwords, they would still not gain access. The account owner would receive a TFA push request on their smartphone, and be immediately alerted to the attempted unauthorised access. So a double-win! Hacker prevented from access, user alerted to attempted hack.

Get Started with TFA!

So why not get started and add extra security to your systems with TFA? It’s straightforward to set up and for your team to use. What’s more, you’ll sleep that little bit easier knowing you have significantly improved your online security.

Current Supply Chain and Cyber challenges

Wow, nearly May already! Another month chalked off 2022, the year is whizzing by again… This month we have two updates from the world of IT that are impacting everyone.

Network switch availability is a major concern

Wow, nearly May already! Another month chalked off 2022, the year is whizzing by again… This month we have two updates from the world of IT that are impacting everyone.


Firstly, the supply chain. With all that is going on in the world, notably in China, current IT hardware prices and lead times are hugely problematic. In particular, network switch availability is the biggest concern. Switch lead times are now at four months. As with any material scarcity, the laws of economics apply and so prices are increasing significantly at the same time.


We are increasing our own stock holding of switches three-fold, but this will take time given the lead times stated above. Therefore we are asking all clients to work with us to forward-plan as much as possible. Any office moves planned in the next 6 months, any planned upgrades etc, we need to order suitable equipment soonest. Please do get in touch if we aren’t already in discussion with you on this.


Secondly, cyber-attacks have reached a never-before-seen height (due in part to the Russia-Ukraine conflict). Cyber software and other IT measures help, but the number one threat to a business remains the internal threat. Over 80% of successful cyber-attacks are a result of poor cyber hygiene by staff. We recommend at-least annual refresher training on cyber hygiene for all staff. Again, please get in touch if you would like to arrange Cyber hygiene training.


That’s it for this month, a bit of a doom-mongering message I’m afraid, but with all the other challenges businesses are facing hopefully the above will assist you with your business planning.

The Ideal computer setup from Fresh Mango Technologies (Part 3)

In this blog, I will set out the ideal setup for your business IT systems. It represents current best practices for small and medium-sized businesses…

The Ideal setup for your IT Systems

In this blog, I will set out the ideal setup for your business IT systems. It represents current best practices for small and medium-sized businesses, with an ever-increasing eye on cyber security.

Initially, I thought it would be a single blog, but it turns out there is a lot to write about! I’m therefore going to publish it in a series of blog pieces. This is Part 3. You can read Part 1 and Part 2 by following the links.

Part 3 – Software

So far in this series we’ve covered servers and networks, and PCs and peripherals. They would all be useless (and expensive!) ornaments without software of course.

In this final part of the series, I will cover some of the essential software required for IT systems in the modern-day environment.

 

Email

Love it or loathe it, email is an essential component of modern-day business operations. Realistically there are only two options: Microsoft 365 and G-Suite (Google).

Microsoft 365 has replaced Microsoft’s server-based email (Exchange). It is a cloud-based email system, providing access to emails wherever you have an internet-connected device. And so is G-Suite!

Your preference for either Microsoft or Google will likely be determined by the other software you use, notably for word processing etc. The majority of businesses use Microsoft Office products, and these are now available within a Microsoft 365 subscription. G-Suite has the same arrangement, so Google docs, Google sheets etc are available with G-Suite.

So it’s really a matter of preference for which route you choose.

Anti-Virus software

A software virus is a catchall term for software that has a harmful effect on computer systems. It manifests in numerous forms, but the main thing to understand about it is that you don’t want it on your computer!

A professional Anti-Virus software solution ensures that if viruses do get through to your system, they are quarantined and neutralized immediately.

We recommend two anti-virus software products – Vipre and Sophos. They consistently rank with high ratings for software protection services in global surveys. We will also be pleased to manage your chosen anti-virus software.

Note that we always recommend the paid, professional version of anti virus software for businesses small and large. Free anti-virus software has numerous drawbacks – there’s a reason it’s free after all!

Anti-spam software

A professional Anti-spam software solution helps secure your incoming and outgoing emails.

Originally intended to prevent inboxes from being overwhelmed with unwanted email, anti-spam software has evolved. It now provides protection against various online threats such as spam, viruses, malware, ransomware, spear phishing, impersonation and more.

Used in conjunction with a professional antivirus solution, your business security is dramatically improved when you deploy anti-spam software.

Cyber Software

Cyber criminals are getting more sophisticated with attackers conducting in-depth reconnaissance to find vulnerabilities before launching their attack. Firewalls, anti-virus and patching are often not resilient enough to protect your IT from being compromised.

Borderpoint is a dedicated managed cyber security service that monitors your IT infrastructure, detects vulnerabilities and threats, intrusion attempts, security anomalies, badly configured applications and unauthorised user activities.

Systems-driven alerts are investigated by Fresh Mango security analysts who escalate identified threats and provide guidance on remedial actions required to mitigate those threats.

Microsoft 365

As well as the email provision described above, Microsoft 365 has additional functionality.

You can add on Microsoft Office software to your subscription – Word, Excel, PowerPoint and so forth. The beauty of this is you never have to pay for another licence for your office software nor pay to upgrade your office software. You will always have the latest version of Microsoft Office.

With the advent of enforced working from home and social distancing, the video software and collaborative working elements of Microsoft 365 have come into their own. Microsoft Teams is now the predominant business-based means of communicating with video conferencing for geographically dispersed teams.

Microsoft 365 also comes with its own cloud file storage system called OneDrive. Like old cloud file storage systems, it is very convenient but does require careful management, particularly when files and folders are shared across multiple members of staff.

Please note that OneDrive and other cloud file storage systems (such as Dropbox and Google docs) are not a substitute for managed folders, files and software deployment that businesses would typically deploy with a server.

Cloud Backup

Every business needs to backup its data and ideally the configuration of its systems. Aside from the obvious business continuity benefits provided by this, backing up to the Cloud also affords some protection from ransomware. It won’t stop it, but it makes it possible to recover from it without paying the ransom.

We have a dedicated site for Cloud backup – everything you may ever wish to know! Take a look here.

Conclusion

In these 3 blog pieces, we have covered the ideal setup for business IT systems – Servers and networks (link to blog piece), Computers and peripherals (link to blog piece) and software in this blog piece.

Hopefully, this provides a good starting point if you are considering the ideal setup for your IT systems. It’s fair to say these only scratch-the-surface, so if you have any queries or would like to find out more, please do get in contact! 

You may also be interested in this article.

The Ideal computer setup from Fresh Mango Technologies (Part 2)

In this blog I will set out the ideal setup for your business IT systems. It represents current best practice for small and medium sized businesses, with…

The Ideal setup for your IT Systems

In this blog I will set out the ideal setup for your business IT systems. It represents current best practice for small and medium sized businesses, with an ever-increasing eye on cyber security.

Initially I thought it would be a single blog, but it turns out there is a lot to write about! I’m therefore going to publish it in a series of blog pieces. This is Part 2. You can read Part 1 here.

Part 2 – The Ideal Computer Setup

The ideal computer setup for your staff is an essential part of ensuring an efficient working environment. The right setup ensures the systems work for them, not against them.

I won’t go into individual PC specifications here, other than to say for a PC or laptop for everyday office use we recommend a minimum specification of i5 processor, 8GB RAM and 256GB hard drive or SSD.

This is more about the ideal setup from a working perspective, particularly given the shift to hybrid and working from home that was accelerated in 2020. So, here goes….

Monitors

With incessant email, the need to access web browsers, video calls and of course accessing Office products (Word, Excel etc), a single monitor can be a real drag on productivity.

That’s why we recommend a dual monitor environment as part of your ideal computer setup. Modern PCs can drive at least 2 monitors and so can many laptops. Indeed with a laptop you can effectively have a 3 monitor arrangement, the laptop screen being the 3rd monitor.

If you’re still working with a single monitor, trust me when I say you’ll feel liberated when you move to a dual monitor setup!

Keyboard and Mouse

If you’re like me and detest clutter on your desk, those keyboard and mouse cables are no doubt a distraction. So we recommend a wireless keyboard and mouse as part of the ideal computer setup. Laptop users will find this particularly helpful, removing you from the constraints of the smaller keypad and tracker on the laptop.

Webcam, Microphone, speakers, headphones

Very much ‘must-have’ items with video calls now being a standard element of day-to-day business. Laptops have good built-in cameras, but the speakers on PCs and laptops can be quite tinny in sound. If you prefer privacy then a set of headphones, with built-in microphone, is probably the best way to go. Lots of options here, its very much a matter of personal preference.

That’s all for computer peripherals. 

Uninterruptible Power Supplies (UPS)

This is an interesting one. At its most basic level a UPS provides battery back-up power for a short time in case of a power outage. In countries or regions with unreliable power supplies, they are very much a must-have piece of equipment. More sophisticated models also provide ‘power smoothing’ features that ensure the power supplied to your PC is clean.

Why is this important? Well, PCs, like all electronic equipment, do not react well to instantaneous loss of power. As well as ensuring you lose anything you are working on, instant loss of power can cause hardware or configuration failures on your computer.

Power smoothing is important for a similar reason. Continuously fluctuating power (frequency, current, voltage) will degrade your computer over time, causing it to fail sooner than its usual life expectancy.

So a UPS brings numerous benefits and is well worth considering.

Next Time

Between part 1 and 2 of this blog I have covered the ideal setup for your IT systems from a hardware perspective. Next time I’ll cover software (oh joy!).

The Ideal setup for your IT Systems (Part 1)

In this blog, I will set out the ideal setup for your business IT systems. It represents current best practices for small and medium-sized businesses, with an…

The ideal setup for your IT Systems

In this blog, I will set out the ideal setup for your business IT systems. It represents current best practices for small and medium-sized businesses, with an ever-increasing eye on cyber security.

Initially, I thought it would be a single blog, but it turns out there is a lot to write about! I’m therefore going to publish it in a series of blog pieces. This is Part 1.

Part 1 – Server and Network Equipment

Server (On-premises) with UPS

Whether or not you need a server depends on the size of your business, typically if you have 6 or more staff a server becomes something of a necessity for productivity. An on-premises server, as the name suggests, is a physical server located in your offices.

Servers provide numerous benefits:

  • At a most basic level, sharing documents across your company
  • Business servers assist in handling communications, database functions or hosting business applications for multiple users
  • Protecting your data – once all your business data and software is on a server (instead of dispersed across desktop computers and laptops) you can deploy a backup system to protect your business from data loss.
  • Running security suites to secure your network through firewalls, intrusion detection, user access management, and software updates.
  • Servers tend to be used to centralise data management and file sharing, as well as managing shared resources such as printers and storage devices. They can also be used to manage things like user identities, logins to the network, access priorities and many aspects of your new system.

More information on servers is available on our website.

Server (Cloud)

There is a lot of misinformation surrounding cloud servers, I will attempt to bring some clarity to it here. A cloud-based server is still a physical server, it simply happens to be located somewhere else (ie not on your premises). Ordinarily, this would be in a data centre.

In order to access your server files etc, you need to do so over the internet (an on-premises server is accessed via your local, internal network).

Aside from that, there is very little difference to an on-premises server. So your server and network still need to be professionally maintained and managed, having a cloud server does not change that.

Hybrid Cloud (Ideal setup for your IT Systems)

Increasingly companies are adopting a hybrid server solution – both an on-premises server and a cloud server. This provides the ‘best of both worlds’ eg:

  • Sensitive data can be retained on your physical server, with the added security that provides
  • Data that you wish to make available to third parties or even staff working off-site can be stored in the Cloud and made available accordingly
  • Software and applications that can only operate in an on-premises environment can still be used (sometimes these may be lost if the software is not cloud-compatible)

Next, I’ll review network equipment for the ideal setup for your IT Systems.

Professional grade router and modem

To complement your server, it’s important to ensure you have professional-grade networking equipment. This means your Router, switches and modem. Professional-grade equipment, as well as being better quality (and therefore longer lasting) has regular ‘firmware’ updates from the manufacturers.

These updates often bring improvements and upgrades to the network kit. Increasingly they also bring security updates as manufacturers try to keep pace with vulnerabilities to cyber-attacks.

Networked Printer(s)

Networked printers allow everyone on the network to print, copy and scan (depending on the printer features). This allows companies to reduce capital expenditure on printers. It also allows your IT Administrators to deploy firmware upgrades to the networked printers.

Centralised IT management is a key feature of professional IT management since it is more efficient and reduces downtime on IT systems.

UPS (Ideal setup for your IT Systems)

Your server should have an Uninterruptible Power Supply (UPS). As the name suggests this is a battery backup of the server. Why is it important? Well, there is nothing that servers (and computer equipment in general) like less than instant power loss. It degrades the life of the equipment, causes data loss and can cause configuration problems. A UPS allows a server to be shut-down in an orderly manner in the event of a power loss.

Modern UPS also have additional levels of sophistication, notably the ability to ‘clean’ power before it reaches your server (and any other equipment connected to the UPS). Again, computer equipment does not respond well to ‘dirty’ power. As well as compromising the ability of the equipment to operate correctly, it degrades the equipment over time.

Next Time – Ideal setup for your IT Systems

In Part 2 I will discuss the ideal PC setup.

You may also be interested in this article.

How to protect yourself from a data breach

Data breaches are very common. A data breach is an intentional or unintentional release of private or confidential information to the dark web…

Data breaches are very common. A data breach is an intentional or unintentional release of private or confidential information to the dark web. They do happen regularly, with emails and passwords being made available for hackers to access. Why is this a problem? Well, people often reuse their passwords for various online accounts. Reusing passwords makes your accounts vulnerable for hackers to access.

How to protect yourself from a data breach
Creating a strong password – best practice for avoiding a data breach. Contact us today to ensure your online accounts are safe.

To prevent yourself from a data breach, it is best not to reuse passwords. This does sound easier said than done, but it is vital that you have a different password for all of your different accounts. You will be very thankful that you have done it. Here are all of the features that your password should contain:

  • The minimum amount of characters use should use is 6, but to make sure your password is very strong, we recommend using 12 or more characters.
  • Include a combination of uppercase and lowercase characters
  • Use at least 1 number
  • Use at least 1 special character

A tip that we have for creating a strong password is to think of a sentence that you will remember and use the first letter of each word for the password. For some of the letters, change them to a special character or number that looks like the letter itself. Also, change some of them to a number. Here is an example:

Humpty dumpty sat on the wall, humpty dumpty had a great fall

H4$OtWHDHaGf

This will help you remember the password, but also avoid having to write it down, which can also be dangerous to do.

What do I do if my online account has been released in a data breach?

The best question to ask yourself is: how did this happen? This will help you understand the purpose and ways to tackle it. Secondly, you should think why did the hacker launch the attack? Most breaches are a result of hackers trying to steal data, but it could have been caused by an employee, either by accident or maliciously.

Next, you should identify and interpret the clues by carrying out digital forensics, which means the collection and interpretation of electronic data in an attempt to preserve the evidence. Technical tools should be used and expert understanding of how to use them.

If all defences fail, every second counts. You must be quick and follow a structured approach for the recovery process. If you don’t have an IT team or Cyber Security expert on hand to do this, be sure to contact us immediately and our cyber security experts can help you save your data. You can visit our cyber security website to learn more about data breaches and other cyber security risks.

We hope this advice has helped!

Why Hackers Hack

Victims of hacks and attempted hacks often take it personally. Why did they come after me? I’m not famous or rich. Why did they come after my company? We’re just a small business…

Why do Hackers Hack?

Victims of hacks and attempted hacks often take it personally. Why did they come after me? I’m not famous or rich. Why did they come after my company? We’re just a small business.

That’s a perfectly natural human reaction. The fact is that cyber-attacks are rarely personal or business-specific.

Hackers are ready to exploit any security crack without taking into consideration who you are or what you do. Here are some of the things that motivate them:

Money

Cyber-attacks do not often result in immediate monetary gain. Hacks allow cybercriminals to extract information that can be exploited for financial gain. For example:

  1. Credit card information
  2. Contact information to be sold to unethical marketing lists.
  3. Username and password logins, to access and take over server resources, and to attempt dictionary attacks.
  4. Sensitive or proprietary information to sell or extort.
  5. High-security information to compromise the premises of a facility

Resources

You might think that your business is not big enough for someone to be interested in tapping into your traffic or your authority. However, cybercriminals will often attack an entire web server.  As a result, your small website might just end up being a part of a big hack.

Cudos

Some hackers break into targets just to prove they can. They also show off their craft by forcing access and stealing valuable information.

Social Justice

Hackers may pursue a religious or political agenda and use their skills to deface targets.

 

So if (when…) it happens to you, try not to take it too personally…

Why don’t I have Administrator Credentials on my PC or Laptop?

Why don’t I have Administrator Credentials?! We’re asked this question from time-to-time, and the short answer is it is standard IT policy for any professionally managed IT network…

Why don’t I have Administrator Credentials?! We’re asked this question from time-to-time, and the short answer is it is standard IT policy for any professionally managed IT network. If you’re keen to understand why this is the case then read on!

IT History – Standardisation

In any business or organisation, standardisation in your IT systems is an essential factor in ensuring smooth and efficient operation. Imagine a situation where every single device was set up in a bespoke manner. No standardisation, differing password policies, differing software, differing access rights to directories and so on. Every user of any device able to make amendments to their PC/laptop as they see fit.

Now try to imagine administering and managing such an IT system from an IT Management perspective. Any time a staff member had a problem, the IT technician would have to run a huge amount of diagnostics in order to figure out what may be going wrong. This is because each PC/laptop has a non-standard setup and settings may have been changed by the user since the last time the computer had an issue.

It shouldn’t be too difficult to realise that managing such a chaotic approach would make the IT management nigh-on impossible. This would lead to significant knock-on effects, not the least of which would be dramatically reduced inefficiencies in the workforce.

So, in keeping with any operation, standardisation is the watchword for efficiency. IT is no different.

That’s the backdrop for why standard IT policies are so important. To the specific issue raised in the blog-title, standard users don’t have the ability to change settings on their system or download software. The former is part of IT standardisation, the latter relates to cybersecurity, which I will come onto next.

Why do you need Administrator credentials?

If a user is insisting on Administrator credentials, the question you need to ask is ‘why do they need them?’ Most people leave car maintenance to the experts. In these days of electronic engine management, it takes an expert to conduct a full car service or repair.

In other words, just because you can drive the car, you don’t mess with what’s under the bonnet (the hood for our US readers). Just because you know how to use your PC/laptop – why do you want or need the ability to mess with ‘what’s under the bonnet’?

Administrator credentials are best left in the hands of professionals who, to be blunt, know what they are doing.

The Cybersecurity problem

Let’s say you, the user of your computer, have Administrator credentials. Let’s also say you don’t go near the operating system or settings. What you do, however, is download software. It may be perfectly legitimate software. So what’s the problem?

Imagine you click on a link in an email. The email looked legitimate. Nothing happened when you clicked the link. No foul no harm, right?

Wrong. The link has opened up a channel to a hacker, and because you are an Administrator, they too can download software to your computer. Be assured that the software they put on your device is not there to help you – it’s there to get your data and to steal funds.

I can provide numerous references of businesses who have fallen victim to cyberattacks that could have been avoided by the simple measure of removal of Administrative rights for all staff – including directors.

Still think you want Admin rights for your computer? Then don’t take my word for it – take a look at the National Cyber Security Centre website. It’s a standard recommendation. It’s worth noting your organisation will receive an immediate-fail on any Cyber Essentials assessment as well.

 

As we say to all our customers – please listen to our advice. We’re offering it in your own best interests!

 

PS – in case you’re wondering – I’m a standard user at Fresh Mango Technologies. Just because I’m the MD I neither want nor need ‘Admin rights’. If I need software to be installed on my computer, I do the same as we ask of our customers – I log a support request ????

Why you should leave your computer switched on

We’re often asked if its best to switch your computer off every day. Our answer is ‘no’, and in this article, we set out why we recommend leaving PCs switched on is the good practice today…

We’re often asked if it’s best to switch your computer off every day. Our answer is ‘no’, and in this article, we set out why we recommend leaving PCs switched on is the good practice today.

Switching a computer off is something of a hangover from the early days of PCs. When desktop computers were first introduced they were power-hungry. Their monitors – which were usually integrated – were huge and consumed a lot of electricity. Similarly, the computers generated a lot of heat and needed power-hungry internal fans to keep them cool.

All of this added up to a big electricity bill, especially for larger companies with lots of staff and computers. So the message was drummed into all computer users – switch off before you go home.

Fast forward to the present day and we have a very different scenario. Monitors are now separate devices to computers, with their own power supplies. Monitor technology is LCD, which means they consume far less power than monitors of old.

The PCs themselves still require fans (unless you have a Mac or tablet) but the miniaturisation of components means the power-demand of cooling fans has also decreased.

So all this means that concerns over power-consumption have been largely alleviated. Of course, there is still some power consumption, so why do we recommend leaving PCs switched on? Isn’t there a cybersecurity issue to consider as well?

These are all good points, here is the rationale for leaving your PC switched on when you leave the office (or kitchen table if working from home) for the day:

  1. It ensures your IT team can conduct updates, health-checks, anti-virus scans and other remote work out-of-hours. This minimises disruption to your business during working hours
  2. It allows your IT team to conduct emergency security patching out-of-hours in the event of a cyber-attack – an increasingly regular occurrence
  3. It prolongs the life of your equipment. Turning your PC on and off every day shortens its life.
  4. As for your electricity bill, your IT team should ensure all displays (the biggest drain on electricity) automatically go to sleep after a few minutes.

So far as cybersecurity is concerned, your IT team should ensure that your login credentials are ‘standard user’ only – ie non-Administrative. So, anyone who successfully hacks your login account remotely won’t get very far – a Standard User has very limited rights for this very reason.

So there you have it – the rationale for leaving your PC switched on! By the way, if your current IT team don’t have your PCs set up as described above, it may be worth getting in touch with the IT professionals at Fresh Mango Technologies!

Home working – some additional recommendations

The ongoing situation with Coronavirus restrictions means many of us are still working from home. We have previously written recommendations for setting up your workstation for remote…

Home working – some additional recommendations

The ongoing situation with Coronavirus restrictions means many of us are still working from home. We have previously written recommendations for setting up your workstation for remote working from home, in this blog piece we will recap some of these and also suggest some further ideas for making your work-from-home life more productive.

Equipment

Laptops remain in high demand. The complete stock wipe-out that was experienced in Western Europe and North America in March 2020 has yet to be fully alleviated. As a result, there continues to be model scarcity and also price fluctuations.

It is worth conducting a home DSE assessment (The HSE website link is here) – the cliché of hunching over a laptop on a kitchen table is all too real for many people, and it really isn’t a healthy long term proposition.

Consider obtaining a docking station, separate keyboard and mouse and at least one external monitor. You may not have a lot of room but at least during the day, you will have the feeling of a home office. Dismantling it at the end of the day also serves as a useful psychological ‘switch’ to tell yourself that you have finished work. It is all too easy to get into an ‘always-on’ habit which studies show are deleterious to health.

If you have back problems, consider a stand-up desk or similar. For example, monitor arms that extend upwards and downwards for standing/sitting are readily available and allow you to mix-up sitting and standing.

 

Network Access from home

If you are accessing files on your office server remotely, you have a couple of options. One is a remote desktop connection where you remotely-control your office PC. The other is a Virtual Private Network (VPM) which allows you to connect directly to your server and work on files as usual. Each option requires software and/or additional hardware depending on your arrangements.

Most people connect to the internet at home using Wi-Fi. This is fine of course, but if you have a VPN link to your server, you may find it regularly drops out. This is because your Wi-Fi connection often drops, albeit just for an instant. In the normal use of email and internet browsing, this would usually not be noticeable. In the case of VPN access, the slightest drop in internet connectivity will cause the VPN to drop.

Therefore, if possible, it is worth connecting your home laptop/pc directly to your home modem/router with a network cable. This is exactly the same kind of cable you have for the connection of your PC to your office network. A ‘hard-wired’ connection like this will improve your VPN connection significantly.

Take care of yourself

Many people find working from home to be excellent – fewer interruptions, no commute gives you more work time and so forth. The flip side of this is it’s all too easy to sit in front of your laptop or PC for hours. The advice we give to our staff is as follows:

  • Have a break at least once an hour. This means physically getting up and walking around, away from your computer.

Recent Cyber Frauds highlight the need to remain diligent

We were made aware of two cyber frauds that we were asked to assist within recent weeks, and thought it would be helpful to share them…

We were made aware of two cyber frauds that we were asked to assist within recent weeks, and thought it would be helpful to share them.

In the first of the 2 cyber frauds, our client received an email from their supplier advising a change of bank account details for invoice payments. They acted on the email and made the payments. Frequent followers of our blogs will know the rest… Yes, it was a scam email and the new bank account was not from the supplier, but from the scammers. Our client lost £5k in the incident.

In the cyber fraud, our client received an email instructing new bank account information from their client (This is a B2C company). They called the client (whom they had never met, since they were overseas) to confirm the email, and having received the verbal confirmation transferred $21k. Unfortunately, it was a scam and the person they called was the scammer, not their client.

We are assisting both clients and the relevant authorities in tracing the emails in the hope that the perpetrators can be tracked down, in the meantime our clients are seriously out-of-pocket. Of course, there is no guarantee of success, especially if the scammers covered their electronic footprints.

So what can be learned from this? Well, very simply businesses should have a policy in place for a change of bank account information. The policy should include calling the supplier using the number you have on record for them – NOT the number they provide in the email. Ideally, you should request a video call with them, especially if you know the person(s). You can also run a second check with another member of their company, ideally someone you know.

People are naturally trusting and it’s all too easy to trust an email from what appears to be a legitimate source. Nonetheless, it’s a simple matter to pick up the phone and speak to them, and nowadays no one should be offended that you are checking, in fact, you will find they are pleased that you did.

These basic policies, and much more, are covered in our cyber hygiene courses. Highly recommended for all staff along with regular refreshers, they highlight the need to remain diligent.

You can also visit our FAQs page to learn more about the importance of staying diligent.

Stay vigilant everyone!

Working From Home Requirements

With the move to home working in recent weeks we’ve seen quite a few new types of working from home requirements and also, sorry to say, that old bugbear cyber security is raising its…

With the move to home working in recent weeks, we’ve seen quite a few new types of working from home requirements and also, sorry to say, that old bugbear cyber security is raising its unwelcome head in new ways. I thought it would be helpful to share some of these.

  • Microsoft Teams – many businesses are getting to grips with video meetings, sometimes for the first time. If you need some help with getting setup on Teams and how it works just let us know. It’s a great tool for keeping in face-to-face contact and integrates with your Microsoft calendar too. Zoom is also a great tool, and there is a plugin for Outlook to help integrate it with your calendars too.
  • Productivity Monitoring software – if it’s important to your business to measure staff productivity and effectiveness, it can be very difficult with staff forced to work from home. Productivity monitoring software provides the solution to this, and we have installed it for several businesses. If you think it may be useful for your business please let us know.
  • I was speaking with one of our customers recently, and he was a bit fed up with working on his laptop. He was delighted when I pointed out you can attach an external monitor, mouse and keyboard (the latter two wirelessly if you like) and the laptop becomes a second monitor. As someone who battles back problems, I know only too well that hunching over a laptop is about the worst thing I can be doing. Do let us know if you would like external equipment for your staff working from laptops at home.
  • Cyber – we have seen two hacks in recent days resulting from people working from personal devices which did not have the same protections as their work devices. Just a reminder that your email and network become exponentially more vulnerable with each additional device attached. If a personal device does not have the same security software as the standard company software, you are open to a local and possibly company-wide breach. It’s worth reviewing/updating your Bring-your-own-device (BYOD) policies with so many people working from home. Let me know if you would like some advice on this, we have some standard policy templates available.

If you would like any advice or support on working-from-home arrangements and requirements, managing geographically-dispersed teams, or IT in general in these challenging times, just let us know.

 

If you enjoyed this article you may also be interested in Children & Technology: Cookies, Webs & Touchscreen.

Find our more about our IT services here.

Working From Home Guidance

I had some down-time over the Easter break which gave me some time to take stock and think about things. (My staff will all testify to how dangerous this is – it’s why they like to keep me busy!)…

Working From Home Guidance

I had some down-time over the Easter break which gave me some time to take stock and think about things. (My staff will all testify to how dangerous this is – it’s why they like to keep me busy!).

Anyway, I was listening to a few radio stations – my favourite rock station out of Austin in the USA and Stray FM much closer to home. I was struck by commentary and call-ins about people giving back and doing what they can for their communities during this incredibly difficult time. It was interesting to note that the desire to help was incredibly strong on both sides of the Atlantic, and I have no doubt it’s the same everywhere.

So I tried to figure out if there was anything that I or my team of IT-Geeks (Sorry guys – experts!) could do to help, and this is what I came up with.

We’ve spent the past few weeks absolutely buried with client requests to assist with home working. The volume of clients moving from an office-based operation to home-based operation was huge, and I’m blown away by the diligence and hard work that all our technicians have put in to assist them. We’re still fielding requests, but the initial wave of demand has calmed down.

It follows that anyone working from home or self-isolating is absolutely dependent on technology to keep working and simply to stay in touch with colleagues, friends and family. It also occurred to me that there are people compelled to stay at home, namely the 1.5 million people who are ‘Extremely vulnerable’ and have been advised to stay at home for 12 weeks.

And there was the answer I was looking for. I’ve therefore asked our marketing team to start promoting free remote IT/computer support to anyone classified as ‘Extremely Vulnerable’ and living within our office postcode districts. They absolutely need to stay in touch with the outside world, and we’ll do our best to help them keep it that way.

If you’re reading this please share it with anyone you think this working from home guidance may help.

Do stay safe and well.

 

Our office postcode districts are:

LS11

HG1 HG2 HG3 HG4 HG5

YO1, YO7

High-tech in unexpected industries

Working in the digital, cyber and IT sector I tend to think of high-technology in computing/electronic terms. Unsurprising I suppose, and I imagine that when most people think of high-tech…

Working in the digital, cyber and IT sectors I tend to think of high-technology in computing/electronic terms. Unsurprising I suppose, and I imagine that when most people think of high-tech then this is what they would be drawn to. But is the digital sector the only high-tech sector? Does high-tech exist in unexpected industries?

A few months ago I was fortunate to have a guided tour of a plant-growing facility in North Yorkshire. The tour was part of helping us understand their business before building their new website. I was struck by the level of science and technology that is applied to an industry that, from a layman’s perspective at least, doesn’t appear to be high-tech at all.

On an ongoing basis they have:

  • Soil imports from Lithuania – apparently it is the highest quality soil available across Europe (who knew?!)
  • A temperature-controlled system for cultivating specific plants
  • Light controls for growing plants across different seasons

plus much more. (As an aside they used to work on the basis of four seasons, but no longer – climate change has created what is effectively a single season for them. But that’s a matter for another blog.)

More recently I watched a documentary on the manufacture of tins (yes I know this doesn’t say much about my social life). Specifically tins for food and drink storage – peas, fizzy drinks etc.

Is a tin high-tech? Well, I’d never thought about it before, but once I did the answer is ‘of course. It’s absolutely astonishing that we can put food stuff into a sealed tin and preserve it for years. Apparently, the key is down to the coating used on the interior of the tin. Moreover, the coatings aren’t ‘one-size fits all’ – specific coatings are required depending on the contents of the tin. This is because different contents can react (chemically) differently to the coatings (you don’t want them to react at all).

Going further back, I recall my ten years spent at Rolls-Royce. They are a hugely diversified power generation company, yet their core business – jet engines – remains the same. The level of R&D, design, material science and testing that goes into building a jet engine is astonishing. Did you know they ‘grow’ the turbine blades from a single crystal for example? High-tech? For sure.

So, next time you look at your Apple Watch or Android phone, maybe spare a moment for the high technology industries. They’re hiding in plain sight.

Feel free to share your own examples of high tech in the comments!

high-tech
What really is high-tech?

How Did Jack Daniels Do It?

During the festive break, I was fortunate enough to visit the Jack Daniels Whiskey Distillery in Lynchburg, Tennessee. I took a guided tour and it was both fascinating and enjoyable; unfortunately, I was driving…

Happy New Year!

Jack Daniels Sign
Jack Daniels Sign

During the festive break, I was fortunate enough to visit the Jack Daniels Whiskey Distillery in Lynchburg, Tennessee. I took a guided tour and it was both fascinating and enjoyable; unfortunately, I was driving so I had to forego the tasting sessions at the end…

I always enjoy finding out how other companies do things, no matter how disparate they may be to the IT and website business. For Jack Daniels I think there were two particularly interesting highlights:

1) Whiskey is relatively commoditised – anyone can make it. How did a small distiller in mid-South Tennessee build a global brand that is now one of the most recognized and popular in the world? There are numerous reasons for this, but the primary one is genuineness.

  • The brand has always remained true to its values – a specific recipe with high-quality ingredients. During World War Two, when high-quality grain was at a premium and being diverted to the war effort, the company refused to compromise on quality, and cut back production rather than use inferior ingredients.
  • They were undoubtedly helped by word-of-mouth marketing – Frank Sinatra (if you don’t know who he is Google him!) took a sip of JD before every concert and carried a bottle with him when touring. When he died and per his Will, he was even buried with a bottle!

2) Ensuring the commitment to quality was – and is – instilled in every worker. There are signs everywhere in the facility which state very simply ‘Every day we make it, we’ll make it the best we can’.

I couldn’t come up with a better statement of intent than that. In 2020, I’ve asked everyone in our Group of Companies to ensure that every single ticket, prospect and customer support request is dealt with as best we possibly can.

Have a great 2020 everybody.

Every day we make it
‘Every day we make it’ – Jack Daniels

The Importance of SOPs in Information Technology

Standard Operating Procedures (SOPs) first came into common business parlance and usage in the manufacturing industry post-World War II.

Standard Operating Procedures (SOPs) first came into common business parlance and usage in the manufacturing industry post-World War II.

Simply put, an SOP is “a set of written guidelines or instructions for the completion of a routine task, designed to increase performance, improve efficiency, and ensure quality through systemic homogenization”*.

So manufacturers set about writing procedures, training their workforce in following them and then monitoring the same to ensure procedures were followed consistently. This brought huge benefits to manufacturers, including:

· Consistency of production – by following the same procedure every product and component would be the same. This brings huge benefits in terms of quality control, reduction in defects and therefore customer satisfaction

· Improved efficiency – no need to try and figure out how to do something – staff are trained on the procedure and then follow it. Eliminating guesswork streamlines processes and makes production faster

· Continuous improvement. With a procedure in place, consistently adhered to, it’s much easier to improve on it. If everyone ‘does their own thing’ best practice is almost impossible to determine. With a standard procedure and a feedback culture in the workforce, it’s possible to improve procedures and processes continuously.

McDonald’s famously adopted an SOP approach to ensure consistency in food production and service. As a result, a Big Mac in New York looks and tastes the same as one served in Tokyo. This doesn’t mean the menus don’t also reflect local tastes – you can order a Teriyaki burger in Japan – but the importance of consistency remains key.

The McDonald's SOP approach
How McDonald’s has approached SOPs

 

So what does this have to do with Information Technology and IT support for customers? Well, I’ve found that as our business has expanded so too has the need for consistency. As a start-up 11 years ago (in the British Virgin Islands) there was pretty much nothing written down – we were focused on building the business. Then as we grew and we recruited technicians, it was possible to explain procedures to them individually and advise them on an ongoing basis. With a co-located handful of staff, this was entirely possible and also made ongoing improvement communications possible too.

Then we expanded and acquired a company in England (CCS2000). We now had a choice – allow the businesses to operate autonomously and ‘go their own way’ – or standardise. We chose the latter route for several reasons:

· We wanted to ensure best practice could be shared across the companies

· First-class IT management requires knowing about the same expertise, training and knowledge no matter where you operate

· We wanted technicians on either side of the Atlantic to be able to provide support to customers no matter where they (the customers) were located

· We wanted to adopt a proactive-support model that minimised client IT issues – to move away comprehensively from the ‘Break-Fix’ approach which (to my astonishment) is still prevalent in the industry.

In adopting this approach we were also mindful of the need for flexibility of approach on a local basis (as for the McDonalds teriyaki burger example). This meant we needed to adopt a dual approach:

1.  Operational standardisation – consistency of approach on all IT-related matters. So for example, setting up a new PC for a staff member in one of our customers

2.  Non-standard standardisation – an oxymoron that means ensuring any non-standard requirements for a customer are recorded and written into a procedure accordingly. Customer ABC may require their PCs to have some additional configuration in addition to our standard approach from (1).

So how did (do) we do this? Well, by the adoption of SOPs in Information Technology.

SOPs Information Technology
SOPs Information Technology

 

I can tell you from experience, it’s much easier said than done! We have been working on it for several years and it’s fair to say that it will always be an ongoing activity. There’s always a new procedure to write or an existing one to amend or improve upon.

Nonetheless, when we acquired another IT business in England (IDT) in 2019, it was clear that all the hard work had paid off. We were able to standardise working practices in a matter of weeks. Furthermore, we were able to adopt best-practice from within the new business to our existing procedures.

It’s worth noting that it isn’t just a matter of writing (and updating) the SOPs. Underpinning standardisation is the need for:

· Ongoing training – existing staff refreshers, new starters all need to be trained and monitored for process adherence

· Open culture – openness to feedback from the technicians following the procedures is key to continuous improvement. It also has the added benefit of participation which lends itself to a healthy work culture

· Integrating tools – we have the benefit of a bespoke business management system that we have developed ourselves (JIM). This allows us to deploy and monitor SOPs accordingly, with the flexibility to amend our processes thanks to the bespoke nature of our BMS.

It’s been a challenging and fascinating journey to move from ‘start-up in the sun’ to a Trans-Atlantic IT business. No doubt it will continue to be so, but without the adoption of SOPs, I know it would not have been possible.

Adoption of SOPs
Adoption of SOPs

How to reduce your reliance on your IT company

What am I on about? Well, I’m evangelical about ensuring my businesses educate our customers on all matters IT, so you can actually REDUCE your reliance on your IT company…

Am I crazy? Possibly. Probably! Maybe… Who knows? Who gets to decide anyway?

What am I on about? Well, I’m evangelical about ensuring my businesses educate our customers on all matters IT, so you can actually REDUCE your reliance on your IT company. Logically that means in time they won’t have to spend as much money with my businesses, or they may even be able to drop us completely and do it (IT – geddit?) themselves. Would you like to know how to reduce your reliance on your IT company? Well, keep on reading…..

So let’s consider:

  • We’re providing FREE education on all matters IT to our clients (and everyone if you follow us on social media or this blog)
  • That FREE education reduces client dependence on us
  • Reduced client dependence means reduced fees for my companies
  • In the extreme you may feel that you don’t need us at all!

Simply put, we’re providing free education which may result in reduced income for us.

Yeah, that’s crazy.

Do you think?

Or maybe there’s something else going on? If so, what?

Confidence and trust, that’s what.

We’re confident that by educating our customers and their staff in computing and IT matters we will increase trust. And if we increase trust, they’ll continue their partnership with us.

Let’s face it, there are too many companies in IT who give the industry a bad name. We conducted a market survey last year, and the number one issue that came out was ‘Trust’. People rely on their IT provider to provide them with IT solutions appropriate to their business. Too often those people don’t understand what is being offered and can be left with an uneasy feeling of paying for something they don’t need.

That is absolutely not what any of my businesses are about. The last thing I want is for our customers to feel that way. We want – we need – you to feel assured with your IT solutions. The only way we can do that is through education and trust.

That’s why if you follow us on social media (Facebook, Twitter, LinkedIn) you will see, at least weekly, tips on all matters IT.

That’s why this year we implemented our ‘IT Roadshows’ – we visit all our contracted customers and present to every member of their staff. What we do, why we do it, computer usage tips,  cyber security tips. Free.

That’s why all our staff are instructed to communicate in plain English – to explain any matter IT in a way that the recipient understands. No bamboozlement.

And that’s why all our staff sign-up to our cultural values. You can read them all here.

 

Crazy? If doing what is right for our customers is crazy, then fine, guilty as charged!

Thanks for reading, until next time…

Interview with Guy Phoenix, Group Managing Director, on the Harrogate Podcast.

A recent interview conducted by Andrew Gray of Truth Legal, with our Group Managing Director Guy Phoenix. Guy talks about his business background and provided recommendations…

A recent interview on the Harrogate podcast was conducted by Andrew Gray of Truth Legal, with our Group Managing Director Guy Phoenix. Guy talks about his business background and provided recommendations to anyone looking to start their own business.

Podcast – Social Media Cyber Perils

Check out our MD Guy Phoenix on Great Yorkshire Radio discussing social media cyber perils and what SMEs can do to protect themselves…

Check out our MD Guy Phoenix on Great Yorkshire Radio discussing social media cyber perils and what SMEs can do to protect themselves.

Podcast – Cyber Security on the Harrogate Business Hour

Check out our MD Guy Phoenix on the Harrogate Business Hour discussing cybersecurity for SMEs with Andrew Gray of Truth Legal Solicitors.

Check out our MD Guy Phoenix on the Harrogate Business Hour discussing cybersecurity for SMEs with Andrew Gray of Truth Legal Solicitors.

What if I told you the biggest risk to your business succumbing to online crime is you and your staff?

Yes, you and your staff are the biggest risk to your business. This is an actual case study of a cyber-crime that we dealt with in 2018.

Yes, you and your staff are the biggest risk to your business. This is an actual case study of a cyber-crime that we dealt with in 2018.

The Start

A local company in Yorkshire (previously unknown to us) approached us, asking us to come and take a look at one of their computers, they had been hacked.

On investigating it was apparent that they hadn’t just been hacked; in-fact they had lost a six-figure sum. It was an existential threat to their business.

We have standard protocols for dealing with cyber attacks, and in this case we immediately:

  • Quarantined the computer in question
  • Conducted a full security sweep of their systems followed by password changes

Day One actions

During this first contact, we observed signs of bad practice. A USB stick was lying next to the infected computer.

‘What’s that doing there?’ I asked.

It turned out that they had been advised to take a copy of software and data they needed from the infected PC and transfer it to another PC on their network so they could continue working on the data in question. (Astonishingly, they had been advised to do this by their principal software provider!). This meant there was a risk that malware had also been transferred.

We quarantined another PC and then the whole network, followed by a full security sweep.

Follow-on actions

Having plugged the immediate gap, we were asked to conduct a complete examination to confirm what happened, how it happened and to report on the same.

We were also asked for recommendations on their wider cyber security arrangements.

Our findings were quite illuminating.

What the hackers did

A Phishing email was sent to one of the client’s generic email accounts. One person monitors these and this one, marked for the attention of accounts, was forwarded on to the accounts team.

Only one person was in the accounts department that day. They opened the email and downloaded the attachment. Nothing happened, so they disregarded it and moved on.

That night the hackers were in and out in under an hour. The attachment had opened a direct link from the hackers to the individual PC. They accessed the client’s accounting system and changed the bank account details of their eight largest suppliers. They then logged out and did nothing else, so there was no sign that anything untoward had happened.

Until 6 weeks later when suppliers started to ring up and ask where their monthly payments were. That’s when we were called in.

What we did

We produced a police-actionable report on our findings and this was submitted to local police and cybercrime units in London. The hackers appeared to be in Hungary, but in fact, were traced to South-East England.

The perpetrators were found and successfully prosecuted in September 2018. All but £9k of the stolen funds were recovered. Obviously, the client was relieved and delighted with this given the circumstances.

However, it could, and should have been zero, and here are the reasons why.

How it could have been prevented – the biggest risk to your business

The client did not have professional IT management in place – they thought (incorrectly) that their software provider took care of it. Had professional IT support been in place, the software that infected the original PC would not have done so – no download would have been allowed through automated procedures. Even if the software had somehow got through, the hackers would not have been able to gain access to the accounting systems, again due to procedures and policies that professional IT management would establish.

None of the staff had cyber hygiene training. With that training, either (or both) of the email recipients could have spotted the potential issue.

Protective monitoring software would have spotted the incoming email and also the late-night access. No such software was in place.

So, there was any number of ways that the attack could have been foiled. As the title states, you and your staff represent the biggest risk to your business succumbing to online crime.

Cybercriminals depend on two things:

  • Trust – or to put it another way, a lack of cyber hygiene knowledge. The human factor is responsible for 80% of successful cyber crimes
  • Poor IT setup and systems– it’s a false economy to set up and manage your own IT systems if you aren’t a trained IT professional

Summary

Since this event, the client has implemented professional IT support (through us), cyber security software (from us) and IT policies in accordance with our recommendations.

A fascinating story right?! Before you close this webpage, let me ask you -are you going to act right now on your cyber security arrangements?

Yes? Good. You should. You can start by requesting our free cyber assessment questionnaire, or arranging an online call with us to conduct it with you face-to-face. We’ll assess your cyber risk and send you our recommendations, free of charge, no catch.

Later? When? Why the delay? Cybercrime is the fastest growing criminal enterprise in the world, it is the biggest risk to your business.

No? OK, well thanks for reading and best of luck! Remember – the biggest risk to your business succumbing to online crime is you and your staff.

We don’t ever want to say ‘told you so’…

Free Public WIFI advice

A recent v-log from Guy Phoenix on use of public free wifi networks – some best practice advice from Fresh Mango in a short 2-min video!

Here’s a recent v-log from Guy Phoenix on use of public free wifi networks – some best practice advice from Fresh Mango in a short 2-min video!

If you enjoyed this VLog, you may like this blog piece!

Why Companies like yours are seeking Cyber Hygiene Training for their staff

Why Companies like yours are seeking Cyber Hygiene Training for their staff. We all see the headlines on the news – ‘millions of records breached’, ‘company loses £££ hundreds of thousands in hack’ etc…

Why Companies like yours are seeking Cyber Hygiene Training for their staff.

We all see the headlines on the news – ‘millions of records breached’, ‘company loses £££ hundreds of thousands in hack’ etc. And let’s be honest, after a while it’s just white noise in our busy lives.

Besides, it won’t happen to me, will it? We’re just a sole trader/small/medium sized business.

Sorry, but no. It will. Without exaggeration, we’re receiving reports of breaches on a daily basis now. And we can say from our own experience that the often quoted statistic – that 80% of breaches are a result of staff inadvertently causing them – is spot on.

That’s where cyber hygiene training comes in. Here are some of the many reasons why companies like yours are now investing in cyber hygiene training.

  1. Firstly, they know that around 80% of successful cyber breaches are due to a lack of staff knowledge.
  2. Secondly, they know that a cyber breach could cost them tens, if not hundreds, of thousands of pounds; possibly it could cost them their business altogether
  3. Also, they’re worried about falling foul of data protection laws and getting huge fines
  4. Fourthly, they know that investing in cyber hygiene training is the most cost-effective way to protect their businesses, even if they already have firewalls and anti-virus software
  5. Lastly, I guess very simply, they just want peace-of-mind.

Poor education and user awareness of the cyber threat can often be the easiest way for an attacker to gain access to your business systems.

By providing cyber hygiene training on operating safely within a cyber context to your staff, you will reduce the potential of attack through social media, internet browsing and routine emails.

Plus, it isn’t expensive! CCS have online courses from just £35. That’s right – £35! Compare that to the existential threat and costs of a cyber breach to your business. It’s a no-brainer isn’t it?

You can get in touch and request a free cyber assessment by contacting us – here are the details.

 

The impact on a Brand of a cybersecurity breach

This is the Transcript of my recent video log (The impact on a Brand of a cybersecurity breach) – my voice is difficult to hear since I was asked to keep it down by the BA Cabin staff for disturbing other…

This is the Transcript of my recent video log (The impact on a Brand of a cybersecurity breach) – my voice is difficult to hear since I was asked to keep it down by the BA Cabin staff for disturbing other passengers. {Sorry!}

I’m actually making this Vlog on board a British Airways flight from London to Austin in the United States, where I’m looking forward to a much needed holiday, taking in the Austin City Limits Music Festival and the Formula 1 Grand Prix – GO LEWIS!

I’ve been incredibly fortunate to be upgraded to First Class by BA, and I’m going to make a separate Vlog for my marketing business to highlight what it’s like. In this Vlog I’m actually focusing on cyber security.

A couple of weeks ago I was invited to present at the Brand Yorkshire conference in Harrogate in the UK. The topic was the impact on a Brand of a cybersecurity breach. I highlighted a few companies to exemplify best and worst practice, and one of the companies I talked about was BA, since they were victims of a cyber breach this Summer. I thought I would take the opportunity on board a long BA flight to reiterate what happened to BA and what they did about it.

What happened?: For more than two weeks this summer (August 21 to September 5), hackers were inside the systems of British Airways.

They took the personal and financial details of customers who made, or changed, bookings on ba.com or its app during that time.

Names, email addresses and credit card information were stolen – including card numbers, expiration dates and the three digit CVC code required to authorise payments.

Around 380,000 transactions were affected. BA blamed a “sophisticated” group of cyber criminals but didn’t give any more details. A post on its website says people should contact their banks, people will be reimbursed and it will pay for a credit checking service.

In summary, BA gave Full disclosure. Recommendations on their website. Contacted the customers.

Now I asked the conference where I presented, what could BA have done better about this cybersecurity breach? Well, it was a bit of a trick question, because I actually think BA did an excellent job – and I’m not saying that because they just upgraded me! They got out in front of it, were open and transparent, contacted their customers and told them what to do, and assured them that they would cover any costs. The additional credit check service was a nice touch too.

The conclusion of my talk highlighted how businesses can prepare for something like this. The first aspect of course is prevention – stop the cybersecurity breach from happening. The BA breach was sophisticated, nonetheless there are means of ensuring your website is protected and monitored. Similarly there are methods for protecting IT systems in general, notably:

  • Cyber Hygiene Training for all staff – 80% of successful attacks are a result of poor cyber hygiene training
  • Software Measures – know when you’re under attack. Continuous Performance Monitoring can alert you to potential attacks and breaches – externally and internally
  • Vulnerability and Cyber Assessment Audits – getting a third party to conduct a thorough and holistic review of your cyber security is the best way to get started on the road to a robust and secure business.

It won’t surprise you to hear that my IT companies – Fresh Mango Technologies (based in the Caribbean) and CCS (based in the UK) provide these services to clients. It’s also worth me pointing out that they aren’t hugely expensive. We have a starter package for SMEs which costs just £195 or $295 a month. When you consider the cost of a breach – frankly it can be an existential threat to most SME’s – it’s well worth the investment.

Finally, from prevention we go to the post-breach action plan. You need a crisis management plan in place. There are plenty of recommended PR plans available online, my favourite is the Adweek plan, because it’s straightforward:

  • Get your plans in order
  • Triage the problem
  • Respond quickly on social
  • Be honest, transparent and direct

I don’t think you’ll be too surprised to hear that my marketing agency can assist with this as well!

Anyway, I think it’s clear that British Airways had options for a  robust crisis management plan in place, and their execution of the same was very good indeed. We had a show of hands at the conference, asking the question who would book on BA.com again. There was an overwhelming majority saying they would without hesitation. Clearly a job well done!

OK, that’s the end of this Vlog, hope you enjoyed it and if you’d like to find out more about how my businesses can help your business, please get in touch. Just drop a message on the social media channel or blog where you saw this video and we’ll get back to you.

Your Dream Car

Maybe sports cars aren’t your thing? How about a luxury brand Grand Tourer like a Bentley or Aston Martin?

What’s your dream car?

A Ferrari? Maybe a Lamborghini or Porsche?

Maybe sports cars aren’t your thing? How about a luxury brand Grand Tourer like a Bentley or Aston Martin?

Maybe you have a young family and so your ideal car is something that can fit the whole family and also rates high in the Safety ratings?

Or perhaps you aren’t really a ‘car person’ and just want something reliable or practical? A Toyota, or a Ford or similar?

Whether your car is a dream, something ideal for your needs, or just a practical run-a-round, I bet there’s one thing they will all have in common.

You service them. Regularly.

Whether you service the car yourself or the local garage/main dealer services the car, you get it serviced.

Why?

Well, it’s kind of a no-brainer really. Servicing the car regularly ensures it runs smoothly and efficiently. It keeps the fuel-consumption optimal. It allows parts and tyres to be replaced before they fail or become dangerous.

It minimises your chances of a break-down, which as we all know creates huge inconvenience.

In short, proactive maintenance of your car ensures it runs smoothly and safely.

Given the context of this blog, no doubt you’ve figured out the analogy by now.

Proactive IT maintenance of your IT systems ensures your computer systems, and therefore your company, run smoothly and securely.

Servers, network equipment, desktops, laptops and Macs (yes Macs – see our earlier blog piece on the need to keep Apple Macintosh equipment updated) all need regular maintenance.

What’s more, they need to be serviced more regularly than your car. The major software providers, notably Microsoft, issue updates and patches regularly. These updates typically include bug fixes, improvements and upgrades. Most notably they include measures to combat recently-identified cyber threats.

Without professional, proactive IT maintenance and management of your IT systems, they will quickly degrade. Worse, without many of the ongoing updates, you may be leaving your company open to a successful cyber attack.

That’s why Managed Service Provision from Fresh Mango incorporates monthly maintenance of your server and networks as standard. That’s not all; to be truly proactive, an IT service needs to do much more than this. That’s the subject for another blog piece another time though.

So, next time you take your car in for maintenance, take a moment to think about your corporate IT. Is it helping your business run smoothly and securely?

If you can’t answer that question with an honest ‘yes’, make Fresh Mango your next call.

If you enjoyed this article you may also be interested in Children & Technology: Cookies, Webs & Touchscreen.

Convenience and cyber security

I’ve been thinking a lot about convenience and cyber security lately. Many of the most successful products and services make our lives more convenient. So much so that we take many of them for…

I’ve been thinking a lot about convenience and cyber security lately. Many of the most successful products and services make our lives more convenient. So much so that we take many of them for granted, probably to the point that they’re considered ‘Staples’ rather than modern conveniences.

Modern Conveniences

Washing machines, microwaves, mobile phones… and now we have voice-activated systems such as Google Home and Amazon Echo. Step-by-step new products make modern life a little bit simpler and easier. They are convenient; they allow us to get on with doing other things, whether for work or leisure.

Unsurprisingly we’re not keen to give up these hard-won conveniences. Would you give up your washing machine? Probably not, I know I wouldn’t. Yet my Grandparents never owned one! That’s just two generations ago.

What about your TV remote control? Probably a bit more easier to live without, but in these days of thousands of channels being available it would make choosing channels a pain. Yet I grew up as a boy with a TV that didn’t have remote control – it hadn’t been invented. We were considered privileged for having a colour TV! That’s less than 40 years ago.

The internet and mod-cons

Fast forward to 2018. The internet has become integral to our lives – business, personal, leisure, everywhere. Many governments have passed legislation to instate internet as a ‘Utility’, giving it the same precedence as electricity, natural gas and water supply.

Boiled down, the internet represents convenience. I can buy pretty much anything I need on the same laptop I’m writing this blog piece on. Pay my bills? Online. Book my next flights and holiday? Sure. I can manage my bank account. Less than 20 years ago all of these would have required a journey to buy goods, services or take care of my bills. The shopping centre, the bank, the travel agent, and so forth.

Would I want to go back to that? Absolutely not! Would you? I doubt it. The internet makes our lives easier and more convenient.

But (you knew there was a “but” coming). By making our lives more convenient, the internet has opened us up to a concept that never existed until late in the 20th century – cybercrime. Protecting ourselves against it does, regrettably, entail giving up some of the convenience of the internet we’ve all become so accustomed to.

Convenience and cyber security don’t immediately feel as if they are symbiotic.

Making life easier for our customers

In the past week, I visited the dentist and also a client with leisure facilities. Both had their wifi network and passwords on public display. Why? Well, it’s convenient for their customers. It’s nice if they have to wait a while to be able to get online. It’s also convenient for them. They don’t have to field requests for the wifi password. Everyone saves time and is more productive right?

Wrong. There is an assumption that everyone with access to the facilities has good motives. What if they don’t? By providing access to your wifi network you potentially provide access to your:

  • IT network
  • Systems, files and folders
  • Client and supplier databases

Do you want absolutely anybody to access these? Of course not, yet that’s what these businesses had done, either inadvertently or with the best motives, or both.

Putting aside the implications of a data breach and fine under GDPR (and you shouldn’t – they’re serious), you’re putting your business at risk. For the sake of a wifi password! As I said, convenience and cyber security don’t appear to align.

Aligning Convenience and Cyber Security

This is just one of the almost countless examples where I see businesses putting convenience ahead of IT security. There are actually relatively straightforward measures that can be taken to improve your online and IT security, without giving up too much convenience. They cost a modest amount of money but compared to the consequences of a cyber breach they really aren’t costly at all.

With SMEs now officially the most targeted businesses for cybercriminals, isn’t it time to give up a small amount of convenience for the well-being of your business?

Convenience and cyber security can go hand-in-hand, you just need to take the appropriate measures, thanks for reading CCS’s latest blog.

Foundations of IT Security

I’ve been thinking a lot about triangles lately. Not the musical kind, but rather how they are such a useful (and simple) means of conveying building blocks and foundations. Notably the Foundations of…

I’ve been thinking a lot about triangles lately. Not the musical kind, but rather how they are such a useful (and simple) means of conveying building blocks and foundations. Notably the Foundations of IT Security:

Foundations of IT Security

With this (very) basic illustration I’d like to convey the main message of this blog piece. Namely that it’s essential to have a professionally established and managed IT infrastructure in your business before you embark on cyber security assessments, hardening, plugging gaps and so forth. In other words, get your foundations of IT security in place.

Cyber security is all the rage presently but, let’s face it, the requirement will never go away as long as we have the internet. Regrettably there are talented IT people who direct their energies towards obtaining information about individuals and companies for their own financial gain. We can’t change that, we can do our best to protect ourselves against it.

So what strategies can be employed to counter the cyber threat? Well, the cyber services offered by CCS are aligned to provide all the necessary counter measures, including:

  • Cyber Awareness Training
  • Continuous Protective Monitoring
  • Cyber Intelligence Assessment
  • Cyber Assessment Services
  • Cyber Essentials Scheme
  • Cyber Security Support Packages
  • ISO27001 compliance

All of these are outlined in detail on the CCS website. However, before embarking on any of these services, you should consider the following basic questions relating to your current IT infrastructure.

  1. Do you have a password policy and enforced password-change policy?
  2. Do you have a server? If so, do you insist that all staff store their data on the server, not their desktop PCs?
  3. What operating systems are you running on your server and PCs? Are they still supported? (Take a look at Microsoft out-of-support systems here)
  4. Do you know if you have conducted health-checks on your server and PCs in the last 6 months?
  5. Do you have backup solutions in place for your data?
  6. Do you have a paid antivirus solution in place? (Sorry – as with all things in life you get what you pay for. Free anti-virus does not provide anything close to sufficient protection)
  7. Do you have a Firewall in-place?

If you can’t honestly answer yes to these questions (and many others not touched upon here), then you need to obtain professional advice and management for your IT systems. Ignoring the security aspects for a moment, if you take care of the above matters your internal systems will run more efficiently. However, you really can’t ignore the security aspects. SMEs are just as likely to be targeted as big corporations.

So whether you’re a small, medium or huge business, professional IT system setup and management form the basis of your foundations of IT security. They’re a pre-requisite for cyber security.

Please, get it done, if for no other reason than you’ll sleep easier at night.