Stay on top of the Latest IT Tips and Suggestions with this Selection of Blog Posts from BCS

Beware these “too good to be true” Facebook ads


We’ve all been there. You’re scrolling through your Facebook feed, and an ad pops up promising to help you grow your business with some AI-powered software…

Sounds tempting, doesn’t it? Without giving it much thought, you click to see what it’s about.

Bad news: This is a big red flag.

Cyber criminals have been found creating Facebook ads that promise to supercharge your productivity and revenue. But when you click, there’s a catch.

The software they ask you to install is actually malware (malicious software).

And when it’s on your computer it can give the criminals access to your Facebook data, including your ad budget.

You might think, “Who’d fall for such an obvious trick?”

But let’s be real. When you’re a small business owner juggling a million things at once, it’s easy to take the bait. And these hackers are smart. They know how to make their phoney offers look legit, and how to hide the malware on your computer so it’s hard to spot.

How do you stay safe? First, be skeptical of offers that seem too good to be true, because they often are. You can verify ads by Googling the advertiser before clicking on them.

And above all, take steps to secure your Facebook account. Use two factor authentication, where you use a second device to prove it’s really you logging in.

Remember, these cyber criminals might be sneaky, but they’re not infallible. For instance, the researchers who uncovered this scheme found several Vietnamese keywords in the malicious script.

This is another stark reminder of the importance of good cyber security. Yes, running a business is a juggling act, and adding another ball to the mix might feel overwhelming.

But think of it this way: Would you rather spend a little time now securing your account or a lot of time later dealing with the fall out of a breach?

As the saying goes, “Prevention is better than cure.” So, stay safe, stay alert, and protect what you’ve worked so hard to build. If you need some help doing that, get in touch.

And breathe… the “file too large to send” problem is over

How many times have you been in the middle of an urgent email, attaching a critical file, only to be met with the dreaded notification – “file too large to send”?

Frustrating, isn’t it?

Well, Microsoft has heard our collective sighs of exasperation. They’ve announced an update that promises to banish the ‘file too large’ issue once and for all.

And this is one of those rare times where something that feels too good to be true is actually true!

In an official post on the Microsoft 365 roadmap, the tech giant’s revealed its plan to integrate Outlook with Microsoft’s OneDrive cloud storage platform.

It means when you hit that attachment size limit, Outlook will ask you to upload your file to OneDrive, so your document still reaches the intended recipient.

Clever, don’t you think?

Android devices get this new feature first, but for everyone else, the rollout is due this month. We don’t have long to wait.

Soon you’ll no longer need to compress, resize, or even abandon your large files. Or turn to third-party services (which can be a security risk). Microsoft’s paving the way for a smoother, more efficient email experience.

If you’d like a hand getting more from your Microsoft 365 subscription, get in touch.

Google Calendar has a great update for hybrid workers

Have you heard about the latest productivity update from our friends at Google?

They’ve just added a little feature to Google Calendar that could make your life a whole lot easier – especially if you’re a hybrid worker.

Remember back in 2021 when they first introduced the option to share your working location with your colleagues? They’ve taken it up a notch.

Now, you can set up multiple locations for any given day on your calendar. So whether you’re splitting your time between the office and home, or out and about as a mobile worker, Google’s got you covered.

Picture this: you’re only in the office for half a day before you head off to a client meeting. With this new feature, your colleagues will know exactly when and where to find you.

Google is all about helping us work smarter, not harder. They know that loads of us are still working remotely, or juggling a mix of office and remote work. This update is specially designed for hybrid workers.

It’s only available to those with a Workspace account, including:

Google Workspace Business Standard/Plus
Enterprise Standard/Plus
Education Fundamentals/Standard/Plus
The Teaching and Learning Upgrade
Nonprofits
Unfortunately, personal accounts won’t have access just yet.

The working location feature will be switched on by default. But if you prefer that your colleagues can’t find you (we’re not judging… we all get distracted at work) you can easily disable it.

If we can help you get the most out of everyday applications like calendars and email, get in touch.

The hidden dangers of free VPNs: Are you at risk?

Are you aware that the rise in global VPN usage has skyrocketed? The reasons are clear as day: Virtual Private Networks offer increased security, anonymity, and allow access to geo-restricted content online.

But here’s the million-dollar question: Are all VPNs created equal?

The answer is a resounding no. And that has potential implications for your business.

Free VPNs, although tempting with their zero-cost allure, aren’t always what they promise to be. Why, you ask? Let’s take a closer look at free VPN services.

For starters, it’s important to understand that running a VPN service comes with substantial costs. Servers, infrastructure, maintenance, staff – these aren’t free.

So how do free VPN providers keep the lights on? Some employ tactics that could compromise your privacy and security.

Imagine this: You’re sipping your morning coffee, browsing the net through a free VPN, believing your online activities are private. In reality, your sensitive information might be collected and sold to the highest bidder.

Cyber criminals, advertizers, even government agencies could potentially get their hands on your data.

Shocking, isn’t it?

Moreover, free VPNs are notorious for injecting unwanted ads and tracking cookies into your browsing sessions. Ever wondered why you’re suddenly bombarded with eerily accurate ads? It’s probably your free VPN service cashing in on your browsing habits.

Now, consider the potential danger if an employee downloads a free VPN on a company device, or on their personal device that they use for work. Company data could be exposed, representing a significant business risk. Picture a scenario where your company’s sensitive data falls into the wrong hands – a chilling thought, isn’t it?

So, what’s the solution?

It’s crucial to educate your employees about the risks associated with free VPNs. Encourage the use of reliable, paid VPN services that guarantee no logging of data, robust encryption, and superior user privacy.

In fact, you may choose to provide one to them. If we can help you find the safest, most suitable VPN for your business, get in touch.

Remember, when it comes to online security, free often comes at a higher cost. Isn’t it worth investing a few $$ a month to protect your company’s valuable information.

Is this the ultimate browser for business?

It’ll come as no surprise, but Microsoft has yet more exciting news for us. Sometimes we wonder if they allow their employees to sleep!

This time it’s a new browser aimed specifically at businesses: Edge for Business.

The updated browser has security and productivity features that are perfect for employers and their teams alike.

Edge for Business could become the best choice for browsing the web on work-related devices, whether they’re managed or unmanaged. That’s because it will allow companies to maintain a level of control over employees without intruding on their privacy.

And that’s perfect for the way many of us work today. If you’re a Bring Your Own Device (BYOD) company, Edge for Business is also going to be the perfect solution for you.

One of the best things about Edge for Business is that it separates work and personal browsing automatically into dedicated browser windows. It has its own favorites, separate caches and storage locations.

And some sites will automatically open in the relevant browser, like Microsoft 365 will go straight to your work browser, whereas a shopping site will open in your personal browser.

That means you don’t have to worry about accidentally sending a colleague that funny meme you saw on social media.

Edge for Business is currently available to test, but although we understand that you’ll be eager to give it a try, we advise holding off until its official launch in the fall. Let others be the guinea pigs.

And Microsoft has yet to add custom branding capabilities for businesses, but they promise that’s coming soon. The anticipation is half the fun, right?

Edge for Business aims to bridge the gap between work and personal on the same device, ensuring that personal and professional information remains separate and secure. With this new and exciting business browser, you’ll enjoy heightened productivity and security.

If we can help you stay productive and secure in the meantime, get in touch.

This is the latest trend in phishing attacks


Have you heard the saying, “A picture is worth a thousand words”? It seems cyber criminals have too, and they’re using it to their advantage.

In a new twist on phishing campaigns, cyber criminals are luring victims to click on images rather than downloading malicious files or clicking suspicious links.

Let’s dive into the warning signs, so you can keep your business safe from these sneaky attacks.

First things first, what’s the big deal about clicking on an image? It might be promoting a killer deal or one time offer.

But when you click on the image, you don’t go to the real website. Instead it’s a fake site designed to steal your personal information.

Imagine being lured in by a cute cat photo only to find out that Mr. Whiskers was actually a wolf in sheep’s clothing! Not so cute anymore, right?

So, how can you tell if an image is part of a phishing campaign? Here are some warning signs to look out for:

Unexpected emails: Did you receive an email from someone you don’t know or weren’t expecting? Be cautious! It’s like accepting candy from a stranger – you never know what you’re getting yourself into.

Too good to be true: If an email promises you a free vacation or a million dollars just for clicking on an image, remember the golden rule: if it sounds too good to be true, it probably is.

Spelling and grammar mistakes: We all make typos, but if an email is riddled with errors, it could be a sign that something is going on.

Mismatched logos or branding: If an email claims to be from a reputable company but the logo or branding doesn’t match up, assume it’s a scam.
Now that you know what to look for, let’s talk about how to protect your business from these image-based phishing attacks:

Educate your employees: Knowledge is power! Make sure your team is aware of the latest phishing tactics and knows how to spot the warning signs.

Keep software up-to-date: Just like you wouldn’t drive a car with bald tires, don’t let your software become outdated. Regular updates help patch security vulnerabilities that cyber criminals might exploit.

Use strong passwords: It might be tempting to use “password123” for all your accounts, but resist the urge! A strong, unique password for each account can help prevent unauthorized access. Using a password manager is even better.

Enable multi-factor authentication (MFA): MFA adds an extra layer of security by requiring people to verify their identity through another method, such as a text message or fingerprint scan.

Backup your data: In case disaster strikes, make sure you have a backup of all your files. That way, you won’t be left high and dry if your data is compromised.
Whilst cyber criminals are getting smarter and smarter with their tactics, there’s no need to panic. By being aware of the warning signs and taking proactive steps to protect your business, you can stay one step ahead of these digital tricksters.

Remember, not all that glitters is gold – or in this case, not every cute cat picture is just a cute cat picture. Stay vigilant, and don’t let the scammers win! If you need help, don’t hesitate to get in touch.

Now AI can make your Teams meetings more productive

Are you tired of wasting precious time in meetings, only to leave feeling confused and disorganized?

Do you struggle to keep track of all the action items and follow-up tasks that come out of these meetings?

Microsoft Teams has launched a new feature which could solve your problems and boost productivity.

Meeting Recap is an AI-based intelligent meeting recap feature, available exclusively to Teams Premium subscribers. This innovative feature harnesses the latest in artificial intelligence technology to generate comprehensive summaries of your meetings.

That means no more tedious recaps… but hello to accurate and efficient summaries that capture all the key points from your meetings.

The Meeting Recap feature doesn’t stop there. It automatically identifies action items and follow-up tasks, assigns them to team members, and even sets deadlines for completion. This means that everyone involved in the meeting knows exactly what they need to do and when it needs to be done. A great way to improve communication and collaboration within your team.

But it’s not just about efficiency. The meeting recap feature also offers customizable options to tailor the feature to your specific needs. Choose what information is included in the summary to ensure that you receive the most relevant and useful information possible.

If you’re not a Teams Premium subscriber, are there benefits of investing in this new feature?

Yes! For starters, it streamlines your workflow, saving you both time and money.

You don’t have to waste hours trying to decipher meeting notes and action items. Instead, you’ll have access to a clear and concise summary that you can refer back to any time.

Additionally, it improves organization and accountability within your team. With assigned action items and deadlines, everyone knows exactly what is expected of them.

Don’t underestimate the power of this new Meeting Recap – it’s a game-changer for businesses that want to increase productivity.

Don’t wait. If you need help upgrading to Teams Premium, we’re here for you. Get in touch.

Is your business data at risk? Don’t take chances with old tech

When you replace old computers or external drives, do you delete data and then just… get rid of them?

You could be putting your sensitive data at risk.

A new study by a data recovery specialist shows that millions of deleted files can be recovered from improperly wiped hard drives that are sold online.

It’s not just buyers who can access your old files. Cyber criminals often buy used hard drives and attempt to recover data from them. This could include anything from confidential business information to client details.

It’s easy to forget about old data when you’re excited about shiny new technology. However, it’s important to consider what’s on that old drive before selling it or disposing of it.

Even if the drive is encrypted, it’s still possible for data to be recovered. And if the drive is damaged, there’s a chance that some of the data is still salvageable. It’s better to be safe than sorry when it comes to sensitive information.

Think about it this way: Would you leave important documents lying around for anyone to see? Of course not! Your digital information deserves the same level of protection.

So what can you do to protect yourself?

Don’t let your old hard drives become a liability. Take the time to have them properly wiped or destroyed before disposal. If you’re upgrading hardware, consider hiring a professional to handle the data transfer and ensure that your old devices are wiped clean.

This isn’t just about protecting yourself. It’s about protecting your employees, clients, and anyone else whose personal information you may have stored on that old drive.

It’s a small investment to make for the peace of mind that comes with knowing your data is safe from prying eyes.

Don’t take chances with your data – take action to protect it:

? Properly wipe or destroy old hard drives
? Bring in a professional for your hardware upgrades
? Upgrade your overall security practices

If you want to make sure your data is safe, BCS is ready to help, don’t hesitate to get in touch.

Published with permission from Your Tech Updates.

Windows 11 optional update: Why it’s better to wait


Microsoft has just announced an option for people to trial new features before their general release in Windows 11.

This isn’t about fixes to security flaws – everyone gets those at the same time.

This is an opportunity for businesses to jump the queue to receive new features and updates first.

Sound exciting?

Yes!

Worth the risk?

Not quite.

Our advice?

Patience is a virtue!

Sure, it may be tempting to give in to the tantalizing prospect of new features… nobody ever wants to wait. But jumping aboard any trial phase comes with risks.

Bugs, errors, and other stumbling blocks could have a significant impact on your operations, potentially causing chaos in your daily workflow.

Waiting until features have completed a thorough trial process gives you the advantage of other people’s experience. They’ve already dealt with the complexities so, by the time you get the new features, they’ll be polished and dependable. And isn’t that more important for the smooth running of your business?

Trust us, the safe road is the smart road, especially when your business systems are involved. The benefits of being an early adopter may seem enticing, but you don’t want to end up being the guinea pig.

Remember the old adage… good things come to those who wait!

We’re all for keeping up with the latest technology and software updates, but there is a time to exercise caution, and this is one of those times. Don’t be tempted by the shiny new features.

Be patient

Stay safe

And ensure that when the time comes, you’re getting something that’s proven to work

Microsoft already has a lot of (tested and approved) features that can boost productivity and make your work processes smoother. We spend a lot of time helping businesses find the right ones for them. If we can do the same for you, get in touch.

Published with permission from Your Tech Updates.

Charging in public places? Watch out for “juice jacking”

Airports, hotels, cafés, even shopping malls, offer public charging points where you can boost your phone or laptop battery on the go.

They’ve been in the news after the FBI recently tweeted advice to stop using them. Crooks have figured out how to hijack USB ports to install malware and monitoring software onto devices as they charge.

The security risk of “juice jacking” was long thought to be more theoretical than real, but the tech needed to carry out an attack has gotten smaller and cheaper and easier to use. This means less sophisticated criminals are now turning their hand to it.

So how does it work?

The most common charging cables – USB-C and lightning – are dual-purpose. They have pins for charging and pins for data.

When you charge your device, you only use the charging pins. But a compromised charging port – or a cable that someone has left behind – could use both charging pins and data pins without you knowing.

When they use the data pins, criminals can install malware onto your device that gives them access to your credentials and other data. It’s a little like plugging your phone into someone else’s laptop.

To avoid the risk, the best solution is to always carry your own charger and cable, and plug it into a power outlet. If you have no choice but to use a public USB port, invest in something called a USB data blocker. This prevents data being transferred, but the device will still charge.

We help businesses stay secure and productive at the same time.

If we can help you, get in touch.

Published with permission from Your Tech Updates.