Skip to content

Our Opinion

Recently we have had a couple of companies contact us with their Microsoft email addresses compromised. In one case the passwords that the person had used was a weak – just a simple 7 letter word. So we are recommending that customers ensure that they use strong passwords. ...continue reading "Security: Some Microsoft Email Accounts Getting Hacked"

Recently we have had a couple of customers phone us because all their desktop icons had disappeared, very distressed. Chatting to them it turned out that the problem is computers booting into Tablet Mode. 
 
So if you suddenly find that you have...
 
  • No easy access to your desktop
  • No program/app icons on your Taskbar
  • Just lots of tiles on your monitor
Then check if your computer has booted into Tablet Mode.
How to get out of it?
  1. Click on the Windows Start icon
  2. Select the Settings cog
  3. Click on System
  4. Select Tablet Mode
  5. Check When I sign in….

Rebecca Mansbridge
August 2018

We are pleased to welcome Simon Leach to our team. Simon will be working three days a week from September and will be helping with IT support (and with Healthy Practice support in 2019).

I asked Simon to tell us a little bit about himself... ...continue reading "We are Pleased to Welcome Simon to our Team"

Image of a person and email

Based on numerous conversations we have had with businesses as they work through their GDPR compliance, there appears to be some confusion with GDPR and email.  Particularly whether they can continue to communicate with their clients or whether they now have to get explicit consent to do so. These communications may take the form of emails or text messages or newsletters. Hopefully this will help... ...continue reading "GDPR: Do you need to email everyone to get permission to contact them?"

1

With GDPR password security is more and more important as it is one of the most elementary parts of computer security. Yet lots of customers tell me that remembering passwords is a real problem. Ideally every password should be a totally random mixture of characters, but for many this is too challenging. So here are some tips on GDPR and passwords and how to create passwords that are not ideal but may be acceptable.

Image of a person entering a computer password

...continue reading "GDPR and Passwords"

Part of GDPR (General Data Protection Regulation - more here https://technologytamed.com/gdpr/) is assessing the way you store patient data. Many businesses use to removable USB drives which are then taken offsite. When assessing your GDPR risks you may decide that you would like to also encrypt portable drives you use that may contain personal data.

The following gives you step by step instructions on how to use one of the most popular encryption methods: VeraCrypt (which is derived from TrueCrypt). ...continue reading "Encrypting USB devices with VeraCrypt"

With GDPR encrypting USB drives with BitLocker is an easy way to help to secure personal data.

Part of GDPR (General Data Protection Regulation - more here https://technologytamed.com/gdpr/) is assessing the way you store customer data. Some businesses backup to removable USB drives which are then taken offsite. Or use removable USB drives to transport data. If personal data is stored in this way a GDPR recommendation is that the device is encrypted.  If you have Windows 10 Professional or Ultimate encrypting USB drives with BitLocker is relatively easy. ...continue reading "Encrypting USB Drives with BitLocker"

Spectre and Meltdown security Flaws in Most Modern Devices

I am sure many of you will have heard that there are security flaws in Intel, AMD and ARM processors - called Spectre and Meltdown. Spectre affects all modern processors, whereas Meltdown affects Intel, plus Itanium and Atom chips made before 2013. Potentially these flaws could enable hackers to steal passwords and sensitive data from ANY device made in the last 20 years that has a processor. Note this includes Apple devices - see link at bottom of page for which versions have been issued 'mitigations' (in Apple speak).

...continue reading "Update About Spectre and Meltdown Security Flaws"

Image of person breaking into a computer

Over the last 10 months I have constantly mentioned security, security, security, because we live in a world where criminals are exploiting every IT and online weakness they can. In 2015 we had very few businesses phone us with problems.  In 2016/17 we have seen an increase – as criminals are now targetting businesses. So much so, that I think you need to dedicate November to looking at your security. ...continue reading "November Housekeeping = Internet and IT Security"

We have often visited new clients and found that they don't understand the difference between differential and incremental backups. Nor the consequences. Sometimes with the result that they have lost vital data. So here is a quick summary. ...continue reading "September Quick Tip: Incremental versus Differential Backups"

google-site-verification: googlec34c8230c302d592.html