Get ready for another game-changer from Teams

Picture an AI-enhanced experience that streamlines your business communication and improves overall productivity to unprecedented levels.

Sounds a little like science fiction, right? But with Microsoft’s latest announcement, this future is closer than you think.

Microsoft Teams is launching an ‘AI library’ that promises to revolutionise our Teams experience.

The goal?

To empower developers to integrate Large Language Models (LLMs) into their Teams apps. The most famous LLM right now is ChatGPT.

You might wonder how that will help your business. Well essentially, it could mean you have a sophisticated AI at your beck and call during your Teams meetings.

The AI library, rolling out right now, will provide developers with a suite of code functionalities making it easier for them to integrate LLMs into their apps. This means creating Bots, Message Extensions, and Adaptive Cards for more engaging conversational experiences will be a breeze.

Microsoft assures us that the AI library will also aid the seamless migration of existing Bots, Message Extensions, and Adaptive Cards functionalities into Teams.

Isn’t this the same company that gave us the Copilot tool? Yep! Back in March 2023, Microsoft introduced GPT-4 integration across Microsoft 365 with its Copilot tool, which can whip up emails, compile reports, and, as Microsoft claimed very grandly, “rediscover the soul of work”. Who knew AI could be so poetic?

And let’s not forget the recently unveiled tool which uses AI to generate meeting notes, suggest follow-up actions, and even provide timeline markers for instant access to relevant parts of a call.

Microsoft Teams is on a mission to redefine our experience with AI. This isn’t just about making our lives easier; it’s about unlocking new possibilities for productivity and efficiency. Honestly, we can’t wait to see what the new AI library will bring.

If you need help getting more from Teams across your business, get in touch.

Read more

Google Calendar has a great update for hybrid workers

Google Calendar has a great update for hybrid workers

Have you heard about the latest productivity update from our friends at Google?

They’ve just added a little feature to Google Calendar that could make your life a whole lot easier – especially if you’re a hybrid worker.

Remember back in 2021 when they first introduced the option to share your working location with your colleagues? They’ve taken it up a notch.

Now, you can set up multiple locations for any given day on your calendar. So whether you’re splitting your time between the office and home, or out and about as a mobile worker, Google’s got you covered.

Picture this: you’re only in the office for half a day before you head off to a client meeting. With this new feature, your colleagues will know exactly when and where to find you.

Google is all about helping us work smarter, not harder. They know that heaps of us are still working remotely, or juggling a mix of office and remote work. This update is specially designed for hybrid workers.

It’s only available to those with a Workspace account, including:

  • Google Workspace Business Standard/Plus
  • Enterprise Standard/Plus
  • Education Fundamentals/Standard/Plus
  • The Teaching and Learning Upgrade
  • Nonprofits

Unfortunately, personal accounts won’t have access just yet.

The working location feature will be switched on by default. But if you prefer that your colleagues can’t find you (we’re not judging… we all get distracted at work) you can easily disable it.

If we can help you get the most out of everyday applications like calendars and email, get in touch.

Read more

Stop! And think, before you act on that email

Stop! And think, before you act on that email

How many times a day do you respond to an email without really thinking about its contents?  

Maybe it’s a request for some information. Perhaps it’s asking you to pay an invoice. All mundane stuff. But no sooner than you’ve hit send, you’ve fallen victim to a Business Email Compromise (BEC) attack.

A BEC attack occurs when a cyber criminal gains access to your business email account and uses it to trick your employees, customers, or partners into sending them money or sensitive information. They do this by impersonating someone senior, and abusing their position of trust.

It might sound like something that only happens to big corporations, but that’s not the case.

According to the FBI, small and medium-sized businesses are just as vulnerable to BEC attacks as larger ones. In fact, these attacks have cost businesses more than £20 billion over the past few years.

And Microsoft brings more bad news, with its recent findings showing that they’re getting both more destructive and harder to detect.

So, what can you do to protect your business from BEC attacks? Here’s our advice:

  1. Educate your employees: They are the first line of defence against BEC attacks. They need to know how to spot phishing emails, suspicious requests, and fake invoices. Train them regularly on cyber security best practice, like strong passwords, multi-factor authentication, and secure file sharing.
  2. Use advanced email security solutions: Basic email protections like antispam and antivirus software are no longer enough to block BEC attacks. You need more advanced solutions that use artificial intelligence and machine learning to detect and prevent these attacks in real-time. Look for email security providers that offer features like domain-based message authentication, reporting, and conformance (DMARC), sender policy framework (SPF), and DomainKeys Identified Mail (DKIM).
  3. Set up transaction verification procedures: Before transferring funds or sensitive information, establish a verification process that confirms the authenticity of the request. This could include a phone call, video conference, or face-to-face meeting. Don’t rely on email alone to confirm these types of requests.
  4. Monitor your email traffic: Regularly monitor your email traffic for anomalies and unusual patterns. Look for signs like unknown senders, unusual login locations, changes to email settings or forwarding rules, and unexpected emails. Make sure you have a clear protocol in place for reporting and responding to any suspicious activity.
  5. Keep your software up to date: Ensure that you’re always running the latest version of your operating system, email software, and other software applications. These updates often include vital security patches that address known vulnerabilities.

BEC attacks are becoming more common and more sophisticated, but with the right awareness, training, and security solutions, you can protect your business.

Don’t wait until it’s too late – take action today to keep your business safe.

If you want to know more about how to protect your business from cyber threats, our team is always ready to help you. Give us a call.

Read more

Here’s how cyber criminals try to hack your accounts while you sleep

How cyber criminals may hack your MFA

Have you ever felt frustrated by the flood of notifications from your multi-factor authentication (MFA) app?

Well, cyber criminals have too. And they’re taking advantage of “MFA fatigue” to try to gain access to your sensitive business data.

MFA is essential for keeping your data secure. It adds an extra layer of security to your apps and accounts by asking you to verify your identity in two or more ways, such as a password and a code sent to your phone.

The constant alerts can be overwhelming though.

Attackers know this and will bombard employees – sometimes in the middle of the night – with a constant stream of MFA notifications. Which makes it more likely someone will authenticate a login attempt through frustration, tiredness, or just to get the notifications to stop.

But now there’s a new weapon in the fight against MFA fatigue.

Microsoft Authenticator has introduced number matching as a way of making sure your MFA notification is from the correct login attempt, preventing cyber criminals from taking advantage of notification fatigue.

How does number matching work?

When you receive an MFA notification, the app will display a randomly generated number. You then need to input this number to authenticate the login attempt and prove you’re not a cyber criminal trying to access your business data.

That’s not all. Microsoft Authenticator also allows for biometric authentication, which means you can use your face, fingerprint, or other unique physical features to prove your identity and combat the threat of MFA fatigue attacks.

With these security measures in place, your business can stay ahead of cyber criminals and keep your sensitive data better protected.

If you already use Microsoft Authenticator, number matching is ready to use. Simply make sure your app is up-to-date, and you’ll be protected.

If you use another MFA system and want to look at how to make your security better or easier, we can help. Get in touch.

Published with permission from Your Tech Updates.

Read more

Microsoft Azure for Retail Industry


How can your business benefit from the value of the Microsoft Azure portfolio of services for the retail industry? Watch this video for inspiration. It provides a high-level look at how retailers use the power of Microsoft Azure to create personalized customer experiences across all channels, empowering employees and keeping supply chains agile. Discover how Azure’s predictive AI, machine learning and analytics enable you to unlock new opportunities with data to make better decisions and accelerate innovation.

Read more

Cyber attacks are getting smarter and bigger. Is your protection?

Cyber Attacks are getting Bigger and smarter

Have you ever tried to buy tickets for a huge event and found that the seller’s website has collapsed under the weight of thousands of people all trying to do the same thing at the same time?

The ticket site falls over – usually temporarily – because the server is overloaded with traffic it doesn’t have the capacity for.

Criminal Distributed Denial of Service attacks – DDoS, for short – exploit the same principle.

When a DDoS attack targets a business, it floods it with internet traffic in an attempt to overwhelm the system and force it to fail.

This results in the business and its customers being unable to access services. That may trigger a temporary failure, or it could be more serious. Last year, the average DDoS attack lasted 50 minutes.

That may not sound like a long time, but it’s enough to create angry customers, or to bring business to a grinding halt. And downtime can be costly.

The really bad news is that DDoS attacks are not only lasting longer, but they’re becoming bigger, more sophisticated and more common.

Recently, the biggest ever reported DDoS attack was reportedly blocked. At its peak, it sent 71 million requests per SECOND to its target’s servers. Prior to that, the biggest reported incident stood at 46 million requests per second.

Worse still, more businesses are reporting being targeted by DDoS attacks where criminals are demanding huge ransoms to stop the attack.

What does this mean for you?

It’s important you check all your security measures are up-to-date and working as they should be. Are your firewalls up to the task, with DDoS monitoring and prevention tools set up? And is your team fully aware of the importance of staying vigilant?

We can help make sure your business stays protected. Just get in touch.

Published with permission from Your Tech Updates

Read more

When did you last have a health check?

When did you last have a health check?

Did you start a January Health kick? How is it going?

January is that time of year when a lot of us take our health seriously, well for a month or so! It is a good thing to look after yourself, and do something about it.

Your doctor would probably like to see you once a year for a health check, just to find any small problems and stop them from progressing.

It is the same principle with your technology.

So why not book in for an IT check-up, to make sure everything is in great shape for the coming months.

After all we do this for Ourselves, or our car, and it’s a good plan to do the same with your workplace tech. After all it might be working really hard in the year ahead.

What would we do

We will help pick up any minor-but-urgent fixes, that could help prevent a disastrous breakdown in a few months time. (we have just seen this where we identified an issue with a server, which went on the break, and was unable to be repaired just 4 months later)

If there are bigger, but no-urgent jobs that you can safely leave for another day, we will tell you that too.

And if you get a clean bill of health, you can carry on with confidence for the coming months.

It may also be a great time to think about new technology and prioritise your IT projects. We can look at what you need to do with your systems as your business grows.

Our experts carry out top to toe IT health checks for all kinds of businesses, and we will give you honest jargon-free advice on the best solutions for a trouble-free tech set up.

To book your check-up, get in touch

Read more

Holiday Cyber Attacks

Holiday time is coming and so are the Holiday cyber-attacks!

Before working in IT, and Cyber Security, I was in the Military, and whenever we were operating during holiday periods, we knew in the back of our minds that if something was going to happen it would happen during holiday time.

The same is true of cyber-attacks and cybercrime. This year we might see more than previous years, already in early October there was an attack on some of America’s largest airports websites.

It isn’t just the Christmas holiday period that we see the increase

  • Colonial Pipeline (Mother’s Day Weekend (US))
  • Kaseya 4th of July
  • Sony and Microsoft Christmas Eve)

Holiday Cyber Attacks, why and what you can do.

The bad guys are aware that during holiday periods there are fewer employees around to look after the infrastructure. Also we are all preoccupied with thoughts of the festive season. So may click on items that we might not normally do.

Security tips:

  • Train empolyees in cybersecurity and phisihing awareness.
    User error is still the number one cause of malware attacks, make sure all employees undergo an annual social engineering training.
  • What are the internal threats, including scanning and patching software?
    If you are able to make sure these are taken care of this will help in securing your organisation from exploits whilst there is limited supervision during this period.
  • Who has access to your Systems.
    Have you implemented a strategy to restrict who has access to data stores, and applications. Only allowing team members access to what they need and having the right levels of privileged access will help.
  • Protect the Network
    Although perimeter firewalls will assist in a strong defence, you should also deploy firewalls at the endpoint, and this should block applications and traffic, unless it is required.

Don’t get caught out this year! If you need any help on this please call 01752 546967 and we will be happy to help.

Read more

Working from home, is it good for your business?

Working from home. Or remote working, as it’s now called.

It’s the big thing in business, isn’t it? And some people love it.

They’re happier working where they want, and when they want. And that makes them more productive and less likely to leave.

But have you stopped to consider the downside to remote working? The negative elements for your business and your people?

While many employees are happy to work from home using video calls and collaborative software to stay connected, there’s a small percentage who find the whole experience isolating.

And when that happens, it can quickly lead to a drop in motivation and happiness. It can even change the culture within your business.

In turn, this can lead to performance issues which may be trickier to spot.

At the other extreme, some employees will become more susceptible to burnout as they struggle to draw a line between work and personal time. That change in environment can be so important for some.

And while you want your team to be happy and fulfilled in their roles, there are also some practical considerations you need to make for your business.

Practical Considerations

Such as the cost of remote working. Does everyone have the right tools for the job – laptops, phones, office equipment? Maybe even a desk and chair, or an internet upgrade?

Do you need to spend twice – giving them an at home setup and investing in hot desks in the office?

Most importantly, you must put in place full cyber security protection wherever someone is working.

Here’s how we can help you stay safe and potentially save money.

Would you like us to audit your current setup and suggest some options? This is what we do every day. Just get in touch.

Published with permission from Your Tech Updates.

Read more