FAQ & Jargon Buster
- Initial meeting with Amanda to find out where the business is heading and how we can help you achieve those goals
- A plan of action, based on your budget and requirements
- A slick onboarding process managed from start to finish by our team.
- From meeting your team to installing our support tools – your journey to better productivity and less IT headaches start here
Broadband is the provision of internet to your business premises, but won’t necessarily give you access to this broadband using a WIFI connection, unless the router has a WIFI antenna. Typically it stops in the comms room and allows cabled equipment to access the internet.
WIFI allows you to use the broadband connection using a wifi enabled device, so without cables. It is usually given out over your business network by wireless access points (WAP’s). The best solutions are cloud managed, enabling your IT to be able to fix and secure these quickly and remotely, often before you know there is a problem
*Unless you have our secure Ringfence technology where you can use public WIFI with confidence.
Our Illuminate Secure Plus product can educate your staff on all cyber threats and how to avoid them
Cloud IT has helped businesses send their workforce to work from home, but there are a lot of security concerns with this.
Using our Ringfence technology protects business equipment whilst using home networks, but there are other security you should be taking into account. Give us a call to discuss how we can help further secure your business.
- Have a culture of cyber security within your organisation
- Look at implementing certification within your business. Not everyone has the time or budget to implement standards like ISO27001, but
- Cyber Essentials or Cyber Essentials Plus is a good place to start your journey and proves to staff and customers that you are taking cyber security seriously
- Setup MFA for all systems you have access to
- Ensure all passwords within your organisation are secure, not used in lots of different sites and think about implementing a password manager
- Run those windows updates
- Ensure your anti-virus and malware protection is updating and scanning daily
- Make sure you have good, offsite backups and that they are tested regularly.
- Engage with an IT provider that can give you up-to-date advice on emerging threats
Passwords should not be changed regularly! I know, that is new news, we were all used to changing every 30 days, but lets face it, how many of you just updated the number at the end of a very well used password? So best now to have AT LEAST an 8 digit password, or even better 16 and only change it if you think it has been compromised
Recent studies found that a 5 character password with mixture of numbers and letters could be hacked instantly, where those with 12 characters and a mixture of letters (1 uppercase), 1 digit and 1 special character would take 34,000 years to crack
There is no better way to help prevent a cyber attack than training your staff on how to spot them first. Regular, bite sized training that is mandatory, but engaging and not time consuming that can be reported back to management is vital for the security of your business. Combine that with regular fake phishing attempts and you’ve gone a long way towards cyber hygiene for your staff.
We can do an audit and take time to understand the processes and people in your business and advise where and if new software is required
If you haven’t discovered Calendly yet, then look it up – easy way to book out chunks of your calendar without tedious emails back and forth. Your attendee can cancel and rebook at leisure and you can choose the hours of the day you want to have booked for certain events. Syncs with your Outlook and emails you so you are always aware what is happening and when. You can also use it to book teams meetings and organise your team more efficiently
www.calendly.com
www.remarkable.com
Picture the scene, you have a teams meeting with half your staff in the board room and the other half working from home. Which is your scenario:
- All go into the board room with your laptops and listen to screeching feedback between team members speakers and microphones, with the constant on and off mute issue
- You spend 20 minutes trying to get the PC that was left in the board room to speak to the TV, fiddle with the connections and swear as the speaker doesn’t connect or the camera doesn’t show everyone in the room.
- You try connecting your laptop to the TV in the boardroom tech, only to discover it needs 2hrs of windows updates and starts doing so 5 mins before the meeting starts
Using a Teams Room allows you to connect effortlessly. The integrated speaker and camera are always connected to the teams room controller. Just invite the teams room user (purchased with a teams room licence) to the meeting and your meeting will appear on the controller. Click to enter, and control the meeting from it – mute all, invite people in, connect people instantly. Or if you are having an ad-hoc meeting from the board room and need someone’s quick input, just call them from the controller and they are in the room. It’s that easy and its always ready to go with great quality audio and video that will impress clients.
https://www.microsoft.com/en-gb/microsoft-teams/microsoft-teams-rooms
www.jumpshare.com
Smishing – Using SMS messages or other forms of social media to gain your trust and get information from you
Ransomware – Cyber attack where your data is encrypted and you are asked to pay a ransom to get it back. Often the data can also be sold on or uploaded to the internet, even if you do pay the ransom. The money gained is used to finance other organised crime.
- Initial meeting with Amanda to find out where the business is heading and how we can help you achieve those goals
- A plan of action, based on your budget and requirements
- A slick onboarding process managed from start to finish by our team.
- From meeting your team to installing our support tools – your journey to better productivity and less IT headaches start here
WIFI allows you to use the broadband connection using a wifi enabled device, so without cables. It is usually given out over your business network by wireless access points (WAP’s). The best solutions are cloud managed, enabling your IT to be able to fix and secure these quickly and remotely, often before you know there is a problem
Connecting your ipad or laptop to your phone is a much more secure way of working rather than connecting to public wifi* which can be infiltrated by hackers. Depending on the device, it is usually in settings and called Personal Hotspot or Hotspot. If you then ‘allow others to join’ please make sure the password is secure, and then just choose this WIFI from the list of WIFI points shown on your device as you would do with any other WIFI.
*Unless you have our secure Ringfence technology where you can use public WIFI with confidence.