Are you using Teams to share sensitive data?


Microsoft Teams has fast become one of THE most useful business tools for the way we work today.

No matter where your people work from, they can communicate and collaborate quickly and reliably.

But this remote way of working can also open the door to some MAJOR security issues.

New research shows that nearly HALF of employees frequently share confidential and sensitive files via Teams.

That can be a big problem if employees are using personal equipment rather than company issued kit… it’s simply not as secure as work devices.

More than half of people surveyed say they’ve shared ‘business critical’ information using personal devices. Worse still, 48% admitted they’ve accidentally sent files they shouldn’t have – possibly to the wrong person!

So how can you be sure that your people are using Teams in the safest, most secure way?

The solution lies with regular training and cyber security awareness for employees at all levels of your business – from trainee to CEO.

And you need to make sure you have all the right safeguards in place to protect your sensitive business data. Because if it fell into the wrong hands, the results could be an expensive nightmare, potentially with legal consequences. Just imagine if sensitive employee information got shared outside of the business…

Remember, even a trusted app like Teams is only as safe as the people who use it and the devices it’s installed on.

If you need help with cyber security training, or putting the right protections in place, get in touch.

Published with permission from Your Tech Updates.

Bosses think people do less when working from home


Microsoft has become the leader of productivity over many decades. Can you imagine doing your day to day work without their software?

So, it’s no surprise the tech giant recently conducted a major new survey into productivity in the workplace – and some of the results might surprise you.

Researchers surveyed 20,000 people working for businesses in 11 different countries.

They discovered the majority of bosses don’t believe their employees are as productive when working from home.

In fact, four out of five employers said they thought their people got less done when working remotely.

On the other hand, a massive 87% of staff felt they were MORE productive when working from home.

How is there such a big disconnect?

Microsoft boss, Satya Nadella blames what he calls “productivity paranoia”. What that means is a gap between what employers expect from their people, and what employees feel.

Maybe some bosses want to go back to the way we worked before 2020… but their people prefer the flexibility of today’s hybrid working.

There’s a lot to gain from less commuting and a better work/life balance.

We believe bosses need to communicate better with their people.

Yes, that’s about setting clear expectations and giving feedback if they feel people aren’t performing properly.

But it’s also important to make sure your team have the right tools and technology to allow them to get things done, no matter where they’re working.

Are their devices suitable for the job they’re doing? Do they have the right applications to communicate effectively and collaborate on projects?

Take the time to discuss the tools and technology you’re using with the people who use it every day.

You should also demonstrate how much you trust and value your people. In the long-term you’ll be rewarded with a loyal and productive team.

Need a hand finding the right tools and tech for your specific kind of business? We can help – just get in touch.

Published with permission from Your Tech Updates.

Android 13 is safer for your business


We all use our phones for a lot more than sending messages and making the occasional call.

And that means most of your staff are probably using their personal mobile for work now and then. Everyone does it.

The downside of this is it puts your business data at risk. If it can be accessed on a personal mobile and that device gets breached, that’s a risk.

That’s why the upcoming Android 13 is big news for businesses.

Google’s released more information about the new features on its latest operating system for mobile devices.

There are many features aimed at keeping business data safe and secure, while also helping your people maintain a good work/life balance.

We’re already able to create separate work and personal profiles on our Android devices. This new update makes managing these profiles even easier.

For example, your team can choose which profile they open their apps in.

Let’s say they had to watch a training video for work. They can set their phone to open it in the browser rather than the YouTube app, so it doesn’t affect their personal viewing history (and therefore suggested videos).

IT admins will benefit from more control over how business devices are used. They’ll also be able to monitor security logs for Wi-Fi, Bluetooth, and passwords. And install security patches faster.

But it’s not all about the control that admins have over work-issued devices. Your employees will benefit from having their data encrypted while using their personal profile.

There will also be separate photo galleries for business and personal photos; an improved Lost Mode to lock and locate lost devices; and end-to-end encryption when using the new ChromeOS integration feature.

If you have a Google device, you should already have access to Android 13. Other Android devices can expect to receive the update in the coming weeks.

If you want to talk through the best way to manage mobile devices for your business, get in touch.

Published with permission from Your Tech Updates.

Make sure your cloud server is protected from this


Using a cloud server to drive your business’s technology is a smart idea.

The benefits are huge.

You can use as little or as much storage as you need, without having to worry about limitations or huge bills. Perfect for growing businesses.

Your team can access any data anywhere. Cloud servers were made for the hybrid work world we have today.

And you don’t need to use lots of your office space to house big servers and other equipment.

But when you’re using a cloud server, you must make sure it’s properly secured.

A recent report has revealed cloud servers are increasingly being used as an entry point for cyber criminals to launch attacks.

A huge 41% of businesses that have been hacked revealed their cloud server was how cyber criminals got in.

Scarily, this figure is rising 10% year on year.

Why? Often, it’s because companies don’t invest as much into the security of their cloud servers as they should.

In technology as in life, you really do get what you pay for. Many of the free cloud servers available don’t provide the same level of security and encryption that paid-for services do. Often, they are less reliable as well.

It’s vital that your business does full research when choosing a cloud server to make sure it meets all your requirements and is as safe as possible.

Better still, ask an expert to do this research for you (we can help).

We also recommend a few standard security measures are always followed.

Give all of your team a password manager to encourage them to generate separate long random passwords for every login they have.

The beauty of password managers is they’ll remember these passwords and even autofill the login boxes. That means better security and greater convenience in one package.

You should also provide regular cyber security training for everyone in your business. Business emails are the second most likely place an attack will start.

The first line of defense should always be a human asking themselves “wait, does this look right?”

It’s never possible to prevent 100% of attacks. But if you take all the right steps to keep your business safe your chances of suffering a successful attack, go down dramatically.

If you’d like help choosing the right cloud server for your business, we can advise you – get in touch.

Published with permission from Your Tech Updates.

Your USB cable is about to get a speed boost

We’re all familiar with USB. After all we’ve been using it with our computers since 1996, and now with mobile devices too.

Yes… it’s really been that long.

Without USB it would be harder to connect different types of devices, charge them, and transfer data.

Of course, USB has changed and improved over the years. And there’s another new improvement due in the next few months.

What makes this one fun is that you won’t need to buy any new USB accessories or cables.

The USB Promoter Group, which is the industry body that drives USB improvements, recently announced the planned release of USB 4 2.0.

What’s exciting about that, you ask?

This will actually allow you to double the speeds of data transfer on cables you already own – so long as they’re no more than a couple of years old.

This new standard will see a maximum data transfer performance of up to 80GBps. That’s gigabits per second.

It means displays will perform better and data will transfer faster. Great news to improve productivity in your business.

The USB Promoter Group is made up of tech giants like Microsoft, Apple, HP, and Intel.

Its primary job is to develop USB capabilities to meet the demand of the current market and to extend support for more platform types.

We expect to have an update on USB 4 2.0 in around November.

If you want improved productivity and performance in your business before the end of the year, please get in touch. There are always ways to make things faster in every business.

Published with permission from Your Tech Updates.

None of your team would fall for this trick… would they?


Cyber criminals have a reputation for constantly coming up with new ways to scam us into handing over login details or sensitive data.

And while you might think your team would spot an attempted attack, you could be surprised. We’ve seen a lot of intelligent people – including many business leaders – caught out over the years.

One of the latest scams is very retro… and that seems to be why people are falling for it.

Cyber criminals have gone back to basics. They’re sending USB drives in the post.

The packaging and branding on the drives suggests they’re from Microsoft (they are not).

The story is there’s an updated version of Microsoft Office Professional Plus on the drive and it needs to be installed straightaway.

Of course, this is a complete lie. Microsoft has confirmed that these packages aren’t genuine. It’s warning people it would never send out unsolicited packages.

If you plug the drive into your computer, it will detect a “virus” and ask you to call a support line.

The scammers at the other end will pretend to remove the virus, gaining your trust. And then they’ll ask for payment details to help complete your subscription setup.

It’s old fashioned, but we can see how the mixture of the physical USB, the belief it’s from Microsoft and the fake support line would be compelling for someone who’s busy and just wants to get back to work.

We’re expecting elaborate, clever attacks through our email. Our guard is down with this mix of events.

Play it safe and warn everyone in your business about this scam.

This is also a good time to review the software and staff training you use to protect your business.

You need the right combination of the two… we can help with that. Get in touch.

Published with permission from Your Tech Updates.

Are you using a malicious browser extension?


There are hundreds of thousands of browser extensions designed to help us to save time, be more productive, and personalize our online experience.

And while the majority of them do what they’re supposed to, some are not designed to help you at all…

If you’re unfortunate enough to download a malicious browser extension without realizing, it could harm your productivity and even flood your work with unwanted advertising.

This is known as adware. It’s a form of malware (malicious software) that’s designed to bombard you with unwanted adverts.

It can also change your search engine and send you to affiliate pages when you’re making purchases. These activities generate revenue for the extension’s creators.

In a recent report from a cyber security company, it revealed more than 4 million of its customers have been attacked by adware hiding in browser extensions over the last couple of years.

And often people didn’t realize they were under attack.

There’s a darker scenario where these malicious extensions are hiding actual malware which can infect your computer.

This can lead to sensitive data such as your logins or even payment details being stolen. And of course malware can spread across an entire network.

To keep your business and its data safe from the risk of malicious browser extensions, it’s important you only ever download them from reliable and trusted sources.

Read reviews and look at ratings. If a browser seems too good to be true it probably is.

As the business owner, you might also look into controlling which extensions can be installed by your team. We can help with this, as well as looking at up-to-date software protection and (fun) security training for your team.

Passkeys could improve the way you work


Back in May, we heard there would soon be a successor to the password – the Passkey.

Now, we’re hearing that Apple will start rolling out Passkeys in the next few months in iOS 16. And we’re excited.

Though it’s caused a bit of confusion. Apple is going to great lengths to market the Passkey, and understandably, people have assumed that it’s a feature exclusive to Apple.

That’s not the case.

In fact, Passkeys will be used in a joint effort to boost online security by Apple, Microsoft and Google. The reason Apple is promoting this new feature so hard is to get the message out there.

Microsoft and Google are also keen to spread the word so that people understand how Passkeys work.

The more people take advantage of Passkeys, the safer our businesses are online.

Passkeys – otherwise known as FIDO authentication – work by letting you log into an app or website with just your username and your pre-authenticated device, most probably your phone.

Your device generates a cryptographic token, which makes the second part of a cryptographic key pair. When the pair matches, you’re allowed access to the app or website.

What that means in practice is when you’re logging in, you just use your phone to prove its really you. You’ll just unlock it using your face, fingerprint or PIN.

So long as your phone is within Bluetooth range of your computer it will work.

And without needing a password… bliss…

It’s a far more secure way to access apps and keep your accounts safe from cyber criminals. You never see your cryptographic token, so it takes away a lot of the danger of having your login credentials stolen.

Cyber criminals will be unable to use their normal tactics – such phishing emails, brute force attacks, or key loggers – to steal your credentials.

They’ll need your physical device, making remote hacking much less likely.

If you use Windows Hello, you’ll see that Passkeys are already supported. And it won’t be long until all three tech giants roll out support across their entire product range.

Before then, if you’d like any help or advice on keeping your apps and accounts safer, just give us a call.

See if your email has been stolen

Find out if your business is being targeted by hackers.

Using this tool you can see if your e-mail or phone number has been compromised.

Make sure to enter your mobile number in international format, such as 14841234567.

This is powered by Have I Been Pwned.

If your data has been compromised, it’s possible cyber criminals have used it to attempt to access your systems.

Please contact a cyber security specialist immediately. We can help.

Watch how easily your business can be hacked

Hacking and phishing scams are easily the greatest threats to your IT systems. In this week’s video series, we show you the perspective of both the hacker and a victim’s business.

Using the help of an ethical hacker, this first video shows how easy it is to encrypt your data and demand a ransom.

The second video shows how a login portal can trick you into giving up your own login credentials.

In the final video our ethical hacker exploits an operating system that hasn’t been updated.

We hope these videos have helped you understand how easily your IT systems can be compromised. Without the proper training, software, or resources, a hacker can ruin your business. Get in touch for a consultation of your business and its IT security.