In an uncertain world, be certain of your Business Security.

Beefing-up business security never hurt anyone, so best start now.

 

The world is an unstable place. If you look at any aspect of nature there is constant change, and an ever-moving needle trying to point due-equilibrium. It’s the same with humanity, as stability is very hard to achieve in a global economy, let alone a global society. 

 

With the recent invasion of Ukraine by Russia, we see once more how easy it is to poke holes in the thin sheet of stability that the developed world enjoys. The frankly horrible human situation and the emerging refugee crisis are obvious priorities for the international community to fix, and to try to prevent from happening in future. 

 

In the UK, most of us find ourselves removed from these events, with an unfortunate minority very personally involved, through family, friends or colleagues who have ties to Ukraine or Russia, making the pain of what is going on very real and present. It’s certainly struck close to home for us at Pearce IT, with some team members having very close ties to Ukraine. Recent events have left us all in shock; we’re doing what we can to support those affected, and we stand with Ukraine. 

 

The displacement of people isn’t the only disruption that stems from the crisis – fuel and energy prices, as well as food prices have been affected across Europe and the wider world. It’s important to consider these issues in perspective against the human tragedy involved, but the fact is that these issues do impact day-to-day routine in nations with fuel, energy, food, and other service and manufacturing needs affected by the current situation. 

 

Then, of course, there’s the issue of cybersecurity.  

 

Should I worry about foreign state cyberattacks? 

 

There’s a great deal of real fear surrounding the disruption of tech companies, banking, and service infrastructure across the globe by Russian state actors, and whereas this is not entirely unfounded, it’s important to consider the vulnerability of the UK national cyber infrastructure in a wider context. 

 

We have, currently, a relatively strong national cyber security and cyber warfare capability, with the armed forces and GCHQ working together to make sure that the country enjoys robust defence from nation states looking to harm areas of our society that require technology to function, and to protect national infrastructure from cyber attack. It would be reasonable to fear attacks in these areas during direct military action against the UK, but if there is no ongoing threat from a foreign power then it is reasonable to assume that our institutions would be able to defend us from normal levels of cyber-espionage. 

 

That leaves another, much more immediate threat that we need to guard against – cybercrime. 

 

How do cybercriminals take advantage of global disruption? 

 

International disruption is a call-to-action to cybercriminals everywhere. They know that elevated security on national infrastructure and a focus on foreign threats will allow them greater freedom of movement to concentrate on members of the public and businesses, and so cyber attacks by criminal groups on the general populace and the business community will be increasing right now.  

 

The current situation will be creating new opportunities for phishing, smishing, spoofing, and other message-borne threats to carry malware, ransomware, and harvest login or payment card information from unsuspecting users. Typical of these are emails and messages that look like they come from bona-fide senders, soliciting charity donations or assistance for people affected by the current crisis, but are in fact phishing for login or personal payment details. As many of these attacks are email-based, reliable email filtering and anti-spam software will be able to harden most networks and disallow cybercriminals access to the low-hanging fruit. Mail filtering packages such as SpamTitan Plus can make sure that no nasties are making it into your inbox, and that your team or family aren’t clicking on things that they shouldn’t be.  

Multi-Factor Authentication (MFA or 2FA) is available on most online portals, email services, and websites, and if enabled means that there is an additional level of security in place that is very difficult to circumvent. By ensuring that MFA is enforced in your business or your personal email, you can remove most immediate cybersecurity dangers. Productivity packages and email platforms, such as Microsoft Office 365 use MFA to secure your logins and access to online data storage, and backup platforms such as Dropsuite can make sure that your emails and storage are backed up and proof against ransomware. 

 

That covers the threats directed at you purposefully, but what about the places that you visit online?  

 

How can I guard against visiting bad URLs? 

 

Surfing the internet has always been associated with issues around security, and although general website security has vastly improved in recent years, the web is still full of sites that carry malware, addresses that are insecure or redirect you to malware-heavy locations, or adware, spyware, and other privacy-based threats watching your online activity and harvesting your data. 

 

Installing a modern internet security package is the best way to ensure that you stay safe online, and cutting-edge software such as Bitdefender can help you to avoid dodgy sites and embedded malware with real-time site scanning, as well as maintaining a constant blacklist of known bad sites. Your payment details can be secured by fully encrypting all of your online card payments, so you can shop securely. 

 

How can I fully secure my network? 

 

With so many threats ranged against the average user, it’s essential to make sure that your cyber security toolkit is up to date and that you’re using everything you can to keep your network safe. If you need comprehensive cybersecurity advice and products, then please get in touch with Pearce IT today. We have powerful security tools on-hand to make sure you’re protected from the array of cyber threats out there, all at extremely competitive prices. We also offer unlimited IT support for as little as £10 per user per month, so you can rest easy knowing that you have a dedicated team of service professionals available to you, with no contracted time limits getting in the way of resolving your IT issues. Get in touch with us on 01453 222000 for a comprehensive security review and reliable advice. 

Why It’s Vital to Back-Up your Office 365 Data

As we move into deepest, darkest winter, pop another log on the fire, grab your cocoa with both hands, snuggle up, and get ready for a bone-chilling tale of ill-prepared users, and how you can avoid the pitfalls of not backing up your online data… 

Wind the clock back to a fictitious Christmas five years ago, and you’re just getting ready for shutdown, everyone has extra workload to make sure you can close your business over the holidays without loose ends flapping everywhere. It’s been snowing heavily, and the roof tiles give way slightly, letting a drip-drip-drip of near-freezing water seep into your on-premises server until…  

Well, you get the picture, but you learned from that and moved your emails, files, and working domain into the Cloud, using Microsoft’s excellent Office 365 platform. A few years on since ‘That Christmas’ you don’t have to worry about that leaky roof, dodgy servers, or users’ endpoints being critical points of failure. You’re relaxed. All-chill. Sit back and pop your feet up. Everything is in the Cloud. It’s all backed-up automatically, right? Nothing can go wrong.

Or so you thought…  

 

OK, enough with the theatrics 

 

Whilst we’re on the subject of stories, there’s a myth that if you have Office 365 data in the cloud, it’s backed up. Wrong - Microsoft don’t back-up your data as standard, so it’s vital to have a solution in place to protect yourself, your users, and your customers. It’s also easily assumed that your Office 365 data in the cloud is invulnerable and proof from equipment failure, and this is true to a degree; Microsoft for example do run a tight ship when it comes to making sure their cloud platforms have high-availability and geographical redundancy, meaning that the virtual machines that run all this wonderful cloud wizardry are ready to switch over to another physical host machine or data-centre elsewhere in the region, should a certain machine or server-hall develop a problem or get particularly swamped with operations, keeping your user experience fairly uninterrupted and consistently responsive. 

 

That, however, is not the entire spectrum of cyber-threats that you’re up against on the modern web. Data-thieves or ransomware attackers can still gain access to your Office 365 infrastructure through hacked user accounts (company directors or department heads needlessly having Admin rights with no additional checks is a classic security failure) and can possibly hold entire document libraries for ransom. Then there’s the good-old genuine mistake, where someone has deleted or changed a file, or moved something so it cannot easily be found, or permissions have been changed on cloud storage, with users are locked out of sites or libraries with no access to their data until a fix is identified and implemented. Let’s not even mention the damage that a disgruntled employee, or any other bad actor inside your organisation, can do in the space of minutes, let alone the hours, days, or weeks that they may still have access to your data during any notice period. It’s also worth looking at the wording on your cyber insurance, should you have a policy (most organisations should, and in some sectors it’s a legal requirement). Likelihood is, if you’re not backing up your cloud data, your policy is invalid.

 

We’re getting dramatic again… 

 

For good reason, as despite them running a high-availability, geographically redundant platform, there’s no secret-sauce that Microsoft pour on Office 365 that magically makes it significantly more secure than other cloud platforms, and as mentioned there’s no supplied backup solution. There are also still ways to get into Office 365 Cloud Tenancies uninvited, and organisations need to ensure that they are doing everything in their power to check that the doors are locked, and the drawbridge is up.

 

The X Factor 

 

Multi-Factor Authentication (MFA or sometimes referred to as 2FA) is now used everywhere, from websites to banking apps, and even some Electric Vehicles now have the option to require input from a mobile device before they can start. There’s no doubt that knowing something (password) and having something (your phone) mean that any individual looking to gain access to your cloud platform account surreptitiously now has the serious problem of not only needing to know your password, but also needing physical access to your mobile device. It’s fair to say that simply by turning on and enforcing MFA across your organisation, the size of the attack surface (The sum of the different points, or attack vectors, that an unauthorized user can try to enter or extract data from an environment) available to your everyday hacker becomes very small indeed. 

 

That takes care of one threat, but we’re still left with zero-day ransomware, genuine error, or malicious disruption. If only there was a way you could just save everyone’s email, OneDrive files, Teams activity, and SharePoint files and folders to a separate cloud backup, that would back up these data at several points throughout the day without any prompting or interference, allowing you to just reload individual items or entire user accounts’ worth of files back to earlier versions or their original places… well, there is. 

 

Enter Dropsuite 

 

Cloud backup services have been around for a while, with varying levels of value and functionality for the admin or end-user, but the solution that we recommend is a cloud backup service called Dropsuite. 

Dropsuite is a brilliant system that, once it has access, can back up and save Office 365 data with incremental backups running every couple of hours. Everything is easy to control from a central console, making the platform a breeze to deploy and manage for in-house IT admins and MSPs alike. We make Dropsuite available to clients from as little £3.75 per Office 365 user, per month, which is an absolute steal if you’re looking to bulletproof your Office 365 data for a reasonable cost. 

In addition to highly granular file storage backup and recovery for SharePoint and OneDrive, Dropsuite’s Email Archiving solution helps organizations efficiently store, safeguard, manage, and discover data from most email systems through Journaling. This means that shadow copies of all selected email activity are automatically created and moved to a storage area in real-time. Retention, eDiscovery, Legal Hold policies, and Compliance Review are just a few items that make Dropsuite’s Email Archiving a super-strong tool for your business’ communications archiving and compliance. With unlimited email archive storage and powerful search functions, finding relevant communications for historic and current projects or legal issues is a doddle. 

 

Packed with other features, it’s a must-have if you’re looking to deploy some serious data-security onto your Office 365 tenant, or if you manage multiple tenants and are looking for a cost-effective backup and storage security solution.  So, with Dropsuite there’s really no excuse not to implement this vital layer of security, and in doing so make sure that you and your users don’t star in some dark wintery tale of your own. 

If you need advice or guidance on the best way to protect your data in the cloud, then pick up the phone or drop us a mail today. We’ll be happy to hear from you, call us on 01452 222000.

Are Hackers Hiding Behind Your MSP?

Managing your own IT can be a time-intensive and unrewarding task, and when your business requires maximum focus it’s a hindrance to have to constantly check on the health of your network, your hardware, and your cyber security. Small wonder then, that the first thing that most business owners do when things start to get busier is to retain a Managed Service Provider (MSP) to take care of things for them. Handing over your IT to a support provider can be wonderfully liberating, and should you be paying for all the bells and whistles, you can rest easy that your network is solid, protected from all the cyber-nasties out there wanting to get hold of your valuable data. Right?

Well, Maybe Not.

It’s worth remembering that MSP’s are businesses themselves, and they should by rights be making sure that they are doing as good (or better) of a job protecting their own systems and networks as they do yours. After all, these are the guys to whom you’ve just handed the keys to your (and your customer’s) digital kingdom, so it’s best to make sure their vaults don’t open on both sides as it were. Sadly, many MSP’s can be guilty of trying to maximise their margins by managing your network with cheap – and sometimes wildly inappropriate – software, data storage, or remote management systems. If you have a managed network, it’s worth checking with your current or future MSP whether they are running potentially vulnerable management software, as this could leave you wide open to a cyberattack if they are not secure.

Vulnerable… What?!?

RMM (Remote Monitoring and Management) platforms are cloud-based systems that allow MSPs and IT admins to sign into an account and monitor or control entire networks of endpoints running remote agent software all from a central cloud dashboard. For just one MSP, this could be several hundred customer networks, running thousands of machines. All those businesses under your control… it’s a great deal of responsibility, so you only give your network into the care of those that are competent enough to take care of it properly. Sadly, it’s sometimes not enough to take an MSPs’ competence at face value, as however hard they try, their RMM (or another mission-critical software or hardware solution) may not be as secure as they, and by extension you, might think.

In the case of one major platform provider, SolarWinds, there have been massive breaches and zero-day attacks on their Orion IT management suite, first in 2020, and in July of this year, potentially exposing huge numbers of MSPs worldwide to cyberattack. In the July hack, likely perpetrated by a group of Chinese hackers dubbed ‘Spiral’, there was a vulnerability in the platforms file-sharing application, which resulted in the hackers being able to gain access to machines and networks connected to the platform.

Does It All Check Out?

It's vital to do your research, and there is always a very strict routine to follow when retaining the services of a platform provider, especially if you are responsible for other people’s networks in addition to your own. You should always check that the platform is certified for use on the networks and systems you will be using it on, that the provider has a strict, definitive, and above all, regular policy of applying updates, that their platform supports Multi-Factor Authentication, and if their platforms are notorious for being vulnerable or having significant outage. This should help keep the number of unauthorised access attempts to your, or your customers’, networks to zero.

Our Promise

We would just like to reassure all our customers – past, present and future – that Pearce IT uses no software or management systems provided by SolarWinds, and that we only touch your network with the most stringently tested and approved software and Remote Management and Monitoring systems.

We take the security of our clients very seriously, so if you’re looking for a strong partner to help you to protect your network, please get in touch with us today.

Disaster Prevention and Recovery

Running a business today often relies upon a huge amount of data. Whether that be data about clients, employees, contracts or financials, most, if not all, of this information will be stored and tracked digitally.

Suddenly losing access to all that information is a panic-inducing possibility that doesn’t bear thinking about for most business owners, but it’s essential to ensure your organisation has strategies in place should disaster strike. Developing these strategies can be a complex process, and the range of services available can each offer their own set of benefits and downsides.

One of the first steps to take is to get an understanding of the different threats and points of failure faced by your current IT systems. Several factors need to be considered; one clear point of failure is an IT systems vulnerability to power surges or fluctuations. Depending on the size of the business and the amount of equipment kept on site, different steps need to be taken to ensure any issues with power don’t lead to a catastrophic failure or data loss. Working via a cloud-based system that takes regular backups, like the service offered by Microsoft’s Office 365, can help solve this issue. Because data is stored remotely, it doesn’t rely on any one machine or network, and won’t result in data loss should a machine fail for any reason.

Cloud Services do vary by provider on how they protect data, and it’s worth double checking what each service guarantees as part of the deal, but it’s often part of the package for business clients that their data is stored with geographical redundancies in place. These redundancies ensure the data is protected in the event of emergencies on the client’s end, or even if servers fail in one of the providers’ data centres.

Another vector for potential disaster is the risk of a virus, malware, or ransomware attack. Cyber security threats can enter the system through an external source, often the internet, and cause immense harm to business infrastructure and its ability to operate effectively. Like the virus’ biological namesake, digital viruses can spread quickly throughout an organisation’s network, and there have been several horror stories in recent memory of large organisations having huge amounts of essential data held to ransom. In 2017, around 60 NHS trusts were hit with a version of the infamous ‘WannaCry’ ransomware, affecting healthcare professionals' ability to access patient records and other essential data.  

To maintain an effective defence against potential intrusions, it’s important to invest in reliable cyber security measures. There is a plethora of different anti-virus programs available, that differ in the exact safety measures and services they provide. Conducting a thorough evaluation of the specific needs faced by an organisation is useful in sorting through all the options. Making sure whatever choice you make is regularly kept up to date is also essential, as viruses and malware are regularly changed in order to try and circumvent security measures, meaning an out-of-date anti-virus program is almost as bad as not having any at all.  

Both the use of cloud services and anti-virus software are examples of preventative measures a business can take to safeguard data in the event of a disaster. While they are both important parts of the toolkit, they make up just single components of a wider disaster recovery plan. Some options can both serve as a precaution against a disaster occurring, while also playing an integral part in restoring operations to normality should the unfortunate occur. Any business, but especially those that deal with high volumes of sensitive data, should have a bespoke strategy in place to make sure any downtime incurred by security failures, data breaches or otherwise unforeseen circumstances is kept to an absolute minimum.  

If you want to talk to a professional team about how you can develop one of these plans or talk through some of your options for data security, contact the Pearce IT Team today!  

 

What Is Remote Monitoring and Management, and Do I Need It?

Having a faultlessly running IT infrastructure is a dream of every organisation, and the ongoing challenge that faces every single Managed Service Provider or IT department the world over. When you’re in charge of somebody’s network, there are many objectives and goals that vie for your attention every minute of every day; security, storage, software, internet access, and performance are all important individual factors, but the overarching goal for all IT professionals is to ensure that their network is running smoothly overall. 

Tools Of The Trade 

You simply cannot do this without certain tools, and the most important tool (and the one that usually sees the most use) in the IT pro’s arsenal is the Remote Monitoring and Management system, or RMM. This is a management platform that runs software agents installed on network endpoints. An endpoint can be any device - a server, workstation, laptop, even a tablet or phone – that connects to your network and essentially performs tasks. The RMM software monitors everything that happens on the endpoint; it has access to system logs, performance metrics such as system temperature, Hard Drive speed, memory and CPU usage, and is able to perform system tasks at an administrator level. It regularly checks in with a handler system – often a server in the cloud – which runs the management platform and collates all the reports and system messages from endpoints on networks it is monitoring. This is then presented via a sophisticated Graphical User Interface (GUI) to an IT professional responsible for the health of the network. 

It’s a two-way connection, meaning that at any point the IT professional can access your endpoints remotely, either overtly, with the knowledge and assistance of the user, or covertly, when the system is locked or there is no operator. Depending on the setup, there’s also the possibility of turning on systems remotely, completing tasks, then shutting down again. Remotely accessing a customer’s endpoints makes troubleshooting and repairing difficult software and system issues far easier. It’s far more efficient than attempting a fix solely over the phone, via email, and even in person, as RMM platforms seamlessly integrate with password management and antivirus software, so there’s no scratching around for logins, passwords and product keys - they’re all available at the click of a mouse. 

If there are clear advantages to break-fix scenarios for customers’ networks by using RMM software, then these are very much secondary when compared to the bonuses gained in preventing software and hardware issues. 

Prevention Is Better Than Cure 

RMM software is an incredibly useful tool for predicting when and where a network will fail, where the security holes are, and which machines are on their last-legs or in dire need of a tune-up. It can even show you which machines are running certain software, when that software was last patched, and how often launching that software creates problems for the rest of the operating system or indeed the rest of the network. Patching this software is a doddle and can be scheduled to be done out-of-hours or across certain parts of the network only. Installing certain patches and skipping others is also a feature of many platforms, keeping bloating of endpoints to a minimum. With scripting an option on many RMM platforms, entire user profile or software suite installs can be scheduled to run when a business is closed, or when a user signs-out for the day. 

Is There A Catch? 

So what are the downsides to having an RMM deployed on your network? Surely there are issues with having an all-powerful monitoring and management suite deployed on every machine in your network, silently collecting data and keeping a hidden eye on every task, click, and keystroke? Well, not really. If you’re worried about the security of your data, the depth of functionality of RMM software is completely adjustable when it comes to each network, and only you and the administrator, be they in-house or working for your MSP, can control the level of access and see the data that these systems collect.  

The More You Know… 

There’s always a place for refined data in keeping your network healthy, and in terms of system usage analytics, working out when you need to make changes to IT processes, or make purchases to replace ailing infrastructure or software, then RMM deployments are invaluable. If you’re interested in introducing an RMM system to your network, or elevating your service plan to include some of the more useful functionality of your existing RMM deployment, then get in touch with Pearce IT, and we can help you to make your network more secure and more efficient for a very low cost per-endpoint.  

After all, the more you know about your network, the more you can do with it. 

Review Your IT Strategy

Pearce Blog Banners (1).png

September’s finally here, and hopefully with it comes a little peace and quiet as all the kids go back to school. With a bit more serenity and time to focus, now’s the perfect time to look at your IT strategy and check it's doing its best for your business.

The pandemic shifted many of us to working from home, only visiting the office when necessary. Many businesses had some degree of infrastructure in place to facilitate this shift but might not have had the time to look at how it affects their overall IT strategy.

An important part of modern business management is ensuring your IT strategy takes full advantage of any available resources. If every employee is aware of and understands your IT strategy, it can go a long way towards achieving your business goals and getting the most value out of your business’ IT infrastructure.

So, what is an IT Strategy, and why do we need one?

As part of your overall IT Capability, your IT strategy document lays out your business’ ability to utilise its technological assets and skills effectively, to add value. One thing to keep in mind is that your IT strategy is a business document that should be able to be understood by any employee, not just those with a technological background.

Beyond meeting business needs and improving organisational processes, the purpose of an overarching IT strategy is to clarify your long-term goals and create a framework that can be referred to when making short or mid-term decisions. Almost all companies have been forced to make changes over the last 18 months, so your existing IT strategy might need adjusting slightly to maximise the technological capability of your business.

Now that children are back in school, focus on your IT strategy and evaluate how your needs might have changed since it was first implemented, or even whether you need to start from scratch!

To get started, there are a few key elements and principles to bear in mind when thinking through a new strategy or amending an old one. Firstly, the core principle of any strategy is to enable your organisation to meet its goals. It is important to directly reference these business goals and reorientate, where necessary, to support your overall vision. While it's easy to get dragged into the minutiae of software, tools, and pipelines, it’s essential to keep the end goal in sight.

One of the most straightforward ways of getting started is to perform an audit. By speaking to employees, customers, or anyone else involved in the process, you can find out which areas are hindering processes and can even gain some valuable insight on how to address those issues. It’s important to make sure all aspects of your current IT strategy and infrastructure are included in any audits; any progress made could become redundant if anything slips through the cracks.

If you want some help getting started with your IT strategy, or want a hand performing a comprehensive audit, contact Pearce IT Today!

Windows 11 Update

Pearce Blog Banners.png

Back in June, Microsoft revealed the latest version of its globally adopted operating system series, Windows 11. This came as a bit of a surprise, as Microsoft had previously touted Windows 10 as the final version of the software to be supported endlessly via regular updates.  

Supposedly, the new version was born out of a scrapped lite version of Windows destined for touch and multi-screen portable devices. Instead of going ahead with this mini or lite version, Microsoft has decided to roll the features designed for it into a major release.  

A few features were revealed in June, with several more being revealed in the following weeks. Microsoft is promising updates will be 40% smaller, hopefully a relief for those of us that put them off until the last possible minute!  

The user interface is one of the most obvious places getting a shake-up. The start menu has been moved to the centre of the screen, light and dark themes are available as default modes, and a rounded corner design has been adopted system wide. The taskbar is optimised for touch and other peripherals, as well as being centralised and renamed the ‘Dock’ in an ‘Apple-esque’ fashion. 

Microsoft is also promoting ‘Artificial Intelligence powered dynamic features’, enabling widgets to display different information according to the time of day, and which apps are currently being used.  

A much-needed improvement to multitasking features is coming too. Snap groups and layouts allow you to arrange multiple windows across the display, not limited to the side-by-side layout currently enforced by Windows 10, but in rows and columns too.  

Windows will also remember the arrangement of these snap layouts the next time you come back. This useful timesaver will hopefully yield a convenient boon for productivity. Multi-monitor support will also be improved and integrated to remember what apps were opened on a monitor when it is reconnected. 

Some more exciting changes are coming to the Microsoft store. Windows’ in-built media and app store is seeing a full redesign with some tighter content curation, to eliminate the high amount of low-quality, third-party applications that currently dominate the platform. Microsoft made a point of showing that popular apps like the Adobe Suite and Disney+ will be ready to go in the store on day one.  

One slightly more interesting development is the support of android apps like Tik Tok or Instagram, which will also be downloadable from the store. In line with the support of android apps are the improvements to the touch features, likely carried through from the earlier version of a touchscreen specific OS mentioned previously. 

Gaming fans will be pleased to note a welcome revision of the previously cumbersome Windows 10 Xbox app. The app will be replaced by a new Game Pass app, to integrate Windows more directly with Microsoft’s gaming subscription service. Players will be able to directly buy, manage and access games available on the service or through its affiliates like Bethesda and EA. Auto HDR and better full and widescreen support will also be welcome quality-of-life changes for gamers everywhere.  

It can’t all be good news though, and Microsoft has been under a little fire for making the required specifications too high for even some fairly recent machines. The earliest compatible CPUs listed on Microsoft’s website are only from a couple of years ago, but this doesn’t mean older processors won’t work at all, Microsoft has only officially validated more recent hardware.  

There are also, for the technically minded, requirements for UEFI, Secure boot and TPM. UEFI and Secure boot might eliminate some older machines from being able to run the new operating system, but the TPM issue is more complicated. In short however, most prebuilt systems from around 2016 should have a Trusted Platform Module already installed, whereas motherboards used for DIY systems are less consistent but have been increasingly included as standard since around the same time.  

Users of older machines without some of these features might be able to exploit some workarounds to access Windows 11, but many will stick to the familiar territory of Windows 10. The more adventurous users might be finally tempted to switch to a lightweight Linux distribution, well known for keeping elderly PCs on life support for a few more years.  

Should your current machine fall short of Windows 11 however, Microsoft has already stated that it will continue to support and provide security updates for Windows 10 through until 2025. Most of the advertised changes at the moment appear to be welcome benefits to productivity and quality of life. Windows 11 is expected to arrive on your screens this October. 

If you want a hand checking that all your gear will be ready to go when it rolls around, or you want to find out what the best option for your organisation is, get in contact with Pearce IT today! 

 

Green IT = Cheaper IT

Pearce Blog Banner (6).png

With a heatwave roasting the UK at the moment, people may have felt a stark reminder of the broader climate change affecting the planet. In an increasingly online and computer dependent world, a significant part of the changes needed to reduce our waste and power consumption must be felt by the IT sector. Tech companies are inarguably responsible for some contributing issues, from the energy expended extracting the raw materials, to the power we use to run machines on a daily basis.  


Many organisations in the IT space have begun to adopt ‘Green IT’ policies, with the aim of minimizing or eliminating the negative impact of IT operations on the environment. This could be attempting to switch to renewable power sources, offsetting carbon use through tree planting, or trying to increase the lifecycle of equipment.  


One of the most significant points of waste and pollution for the IT sector is the relatively short lifespan of the equipment used. An adage within the IT industry entitled ‘Moore’s Law’, named for the former Fairchild Semiconductor founder and later Intel CEO who thought it up, predicted that the number of semiconductors in an integrated circuit would double around every two years. In layman’s terms, the relative power of a computer would double in the same period, rendering machines produced just two years earlier obsolete. While Moore’s law is no longer realistically thought to apply at anywhere near the same rate to commercially available products, the industry has emphasised the importance of regular upgrades to consumers. Although, most daily computer users are unlikely to feel the benefit of regular, incremental upgrades outside of 3D graphics or other industry specific intensive tasks. Focusing consumer attention on upgrades rather than maintenance means a lot of machines have a lifespan of just a few short years and there are a phenomenal number of resources and energy spent on producing replacements.  


Companies like Apple have historically fought the ‘Right to Repair’ movement at every turn, only faltering slightly in the past couple of years. Recently the tech monolith started supplying repair outlets with parts, though some suspect this may only be an attempt to cut out the lucrative third-party parts industry they were growing increasingly jealous of. The EU have recently introduced legislation requiring manufacturers to facilitate the repair of their electrical goods for at least 10 years after coming to market. This will directly benefit consumers who wish to extend the lifespan of their equipment and hopefully reduce the colossal sum of resources used to produce new machines, as well as supporting a fast-growing circular economy of professional repair shops and second-hand markets.  


Here at Pearce IT, we’ve been dedicated to implementing Green IT policies for a long time. The telecoms section of our business managed to achieve carbon neutral status all the way back in 2012!  


One of the significant changes we’ve made to offset carbon is switching to electric vehicles. Though our traveling around might have been limited since the onset of the COVID-19 pandemic, electric vehicles still save a huge amount of carbon emissions through our day-to-day activities.  


If you’re interested in finding out more and want to know how you could offset your carbon footprint through more environmentally friendly IT practices, contact Pearce IT, call 01452 222000.

The fall in cost for telecoms

Pearce Blog Banner (1).png

The price of telecommunications for businesses is falling.

Many people who have standalone landline systems have seen their prices drop in recent years. In 2017, data usage over fixed connections grew by 44%, while data use over mobile connections increased by 46%. However, despite the widespread adoption of superfast internet, 4G, and the launch of 5G telecommunications networks in more recent years, average monthly spending on phone and cable services has decreased over the last decade.

Why have telecoms become cheaper?

The mobile phone industry is an excellent example of how to describe certain fundamental supply and demand principles. It demonstrates, for example, how advanced technologies and increased production will lower prices - even as demand increases.

Back in the early 2010s, few people had smart phones - even fewer relied on mobile devices to conduct day-to-day online business. Since mobile usage and the need for 4G access wherever you are has become a necessity rather than a luxury, prices have dropped to reach demand.

We understand that you want to protect your business, and one way to do so is to keep your expenses as low as possible. We will help you reduce the cost of your messages without sacrificing accuracy or functionality.

To give a comparison example, back in 2015 when 4G first made its big debut in the UK, a large plan-only sim deal with 10GB would typically start at around £32. Compare that to current deals and you can now easily get 10x the data at a fraction of the cost.

Even the physical side of telecoms has become cheaper. While the latest flagship models of phones still cost a lot, large phone companies now offer budget versions of their phones and significantly decrease the price of last year’s flagship; allowing more people to keep up to date with technology and making buying or leasing work phones more viable than in earlier years.

Why your business should take advantage of cheaper telecoms.

Telecoms keep people together; whether it is allowing workers to connect to each other while working remotely or needing a system in place to allow clients to have a secure point of contact that upholds the professionalism of your company.

Without a good telecom system in place, you end up losing out on productivity and waste time through tracking down missed messages from clients and colleagues. The past year has shown us how important proper communication channels are within the workplace. With more companies opting for permanent at home working or flexible working – so not all employees in a traditional ‘one office’ setting - having a telecoms system upholds productivity and is the backbone of remote working.

If you are a long-standing business, it is possible that your telecoms agreement has not been updated in some time. Unfortunately, many people stuck on old plans will not be offered the latest deals and are missing out on these cheaper options. That is why it might be time for you to evaluate your current telecommunication systems and see if you could be saving money by upgrading to a new plan.

What Pearce IT can do for your telecoms.

Pearce Telecoms understands that you need more than just a decent internet connectivity, telephony connection, and network convergence. You must still be able to communicate with your clients and friends no matter where you are or what you need.

The modern business is never still. The business world is a fast-changing and fast-moving environment, and you will often need dependable connectivity on-the-go or in remote locations. Because of this we understand how important your telecoms are and that you want to ensure you have the best plan for your business at the best price. To keep your expenses as low as possible whilst retaining a high quality of product.

We will assist you in reducing the cost of your telecoms with our amazing sim plans and phone leasing contracts. Providing you with a variety of mobile packages to fit your needs and keep the teams chatting and open, no matter where they are.

Pearce Telecoms offers consultation and cost review services to ensure that you are having the right product and price with your money and company needs. We have dual sim and phone offers to accommodate any company size or need, offering limitless calls, emails, and data, ensuring that your employees are still linked. Whether you are after Apple of Android, we can provide you with leasing opportunities to outfit your workers with the hardware needed on a variety of contracts.

Get in touch with Pearce Telecoms today for a telecoms audit and to see what deals would suit you best, call us on 01452 222000.

Why should you care about your cyber security? 

Pearce Email Banners (4).png

Cybercriminals are getting more advanced. From choosing their targets, to the tactics they use to attack various security systems, it’s easier than ever to fall victim to a cybercriminal’s activity.  

Social engineering is still by far the most successful form of cyber threat, with ransomware, phishing, and spyware being the most common entry points. Third-party and fourth-party suppliers that handle data and have weak cybersecurity policies are another prominent attack route, emphasising the importance of vendor risk management and third-party risk management. 

Cybersecurity is critical because it includes everything related to securing our confidential data, personal identifiable information (PII), protected health information (PHI), personal information, intellectual property, data, and governmental and business information systems from misuse and destruction by criminals and adversaries. 

 

How could cyber-attacks affect you? 

 

A lack of emphasis on cybersecurity will harm your company in a variety of ways, including: 

  • Economic costs – intellectual property theft, business identity theft, trading chaos, and the cost of replacing broken systems. 

  • Costs of reputation – consumer dissatisfaction, loss of existing and prospective buyers to rivals, and inadequate media attention. 

  • Regulatory costs – because of GDPR and other data breach rules, the company can face regulatory penalties or punishments as a result of cybercrime. 

GDPR and other regulations have made cybersecurity unavoidable for companies across all sizes. Security issues threaten enterprises of all types on a daily basis and often make the front page, causing permanent reputational harm to the firms involved. 

 

How to protect against cyber threats: 

 

Two factor authentication: 

 Two-factor authentication (2FA) is an additional step added to the log-in phase, such as a code sent to your phone or a fingerprint scan, that helps verify your identity and prevents cybercriminals from accessing your private details. 

2FA is a subset of multi-factor authentication, which is an automated authentication mechanism that allows a person to verify their identity in several forms before being granted account access. Two-factor authentication gets its name from the fact that it needs a combination of two factors, whereas multi-factor authentication requires more. 

An ATM card is a clear example of two-factor authentication in the real world. To enter your account, you must not only physically display the card, but also type in your PIN. 

 2FA gives that extra sense of security – it’s just that much harder for someone to access your accounts illegitimately. 

 

Why do I need 2FA? 

 Passwords have traditionally been a poor form of protection on their own due to the sophisticated nature of hacking as well as the general frustration of password formation and usage. According to a Harris Poll, 78 percent of Generation Z uses the same password for different accounts, raising their potential risk if a thief figures out their passwords. Furthermore, almost 23 million accounts still use the password "123456." 

Adding an extra step to account entry makes it more difficult for hackers to access your personal information. If you apply a knowledge attribute to your bank account, a cybercriminal who knows your secret would be unable to enter the account until he or she has your phone when the authentication code is sent. 

In addition to this, it is easy to accidentally type your password into an illegitimate site, so even if your password is hard to guess there is still a chance someone could get their hands on it. Also, many large companies experience data leaks and breaches during which time your password information is vulnerable. So 2FA helps to protect your accounts between the time of the breach and you being notified to change your passwords. 

 

Antivirus protection: 

 Antivirus software is intended to track, deter, and react to malicious software in your device, such as viruses – it is an integral component of a successful protection policy. 

Antivirus programmes run in the background and scan any files you access, comparing it to suspected viruses and other forms of malware, helping you prevent them from infecting your computer. Device scans are also performed by the programme to ensure that no viruses are inactive on the server. If your antivirus programme detects a virus or other malware signature, it can interrupt the file from running and place it in quarantine, where it can either uninstall it automatically or you may opt to run it if you are sure it is a false warning. 

Antivirus security is critical for any company who wants to keep its data and operating infrastructure from being compromised. Antivirus software acts as a security guard at the entrance, blocking intruders from entering. Since prevention is much more successful than treatment, it is preferable to have a mechanism in place built to track and deter virus attacks rather than spending time and resources fixing them. 

 

If you need some more guidance on upping your cyber security and ways to protect yourself from cyber-attacks and cyber-crime, get in touch with Pearce IT today!