Posts

Image
  Are you using the all-new Teams yet? Microsoft is rolling out a brand-new version of Teams, its video conference, collaboration, and chat platform. We’re being promised a faster and easier way to work. And we all could use a bit of that, couldn’t we? The new Teams is like the superhero of apps for Windows and Mac. It’s faster than a speeding bullet… well, at least twice as fast as the classic version. Plus, it’s on a diet, using up to 50% less memory and disk space. Microsoft went back to the drawing board to reimagine it, make it simpler and more flexible. Now Teams: Plays better with third-party apps Is happier calling phones outside of Teams Gets you into meetings quicker than you can say “not another meeting” This pumped-up version of Teams uses some tech which allows it to share resources with your browser. That reduces how much memory and disk space it needs. And the initial test results? Teams is twice as quick when loading the app, joining meetings, and switchin
Image
  Driving efficiency with cloud ERP software   PEGASUS BUSINESS CLOUD   Cloud computing usage has grown significantly in recent years and the market is expected to be worth a staggering   £59 billion   in 2024. Within this blog post we’re focusing specifically on cloud ERP software which is forecast to grow more than   17%   between now and 2028. Cloud ERP software is at the heart of   31%   of business’s digital transformation strategies and is changing the way businesses operate, and for good reason; the efficiency gains are unbeatable.  Cloud ERP software provides the same functionality as on-premise solutions but without the costs of maintenance, server costs, and with the added flexibility that growing businesses need. Once reserved for only the biggest organisations, technology advancements have made cloud ERP solutions affordable for all businesses, large or small. Why is cloud ERP software becoming so popular? The pace of change has been relentless in recent years with the Covi

Three cyber security threats your team MUST know about

Image
  Three cyber security threats your team MUST know about     Your employees are your first line of defence in cyber security, and their training is as crucial as the cutting-edge tools you've invested in. Are you overlooking this vital element?   We strongly advise you make an ongoing commitment to regular cyber security training for every single one of your team. That means keeping them up to date on the latest cyber threats, the warning signs to look out for, and of course, what to do should a situation arise.   If you’re not already doing that, arrange something now (we can help).   While you wait, here are three urgent cyber threats to address right away:   Admin attack: Email addresses like "info@" or "admin@" are often less protected due to perceived low risk. But several teams may require access to these accounts, making them an easy target. Multi-factor Authentication (MFA), as simple as using a smartphone, can double your security.
  That long password isn’t keeping you better protected   How secure do you think your passwords are? Do you believe that longer is always better? Well, we have some news for you. It’s time for a serious talk about password security. New research has revealed a sobering truth – even passwords that are 15 characters long can be compromised. Yes, you read that right. It’s time to face the stark reality… length doesn’t always mean strength. The eight-character password reigns supreme as the most compromised length of password. But don’t breathe a sigh of relief if yours is a longer one. The 15-character password also makes an appearance in the top ten most compromised lengths. You might ask, “How could this be?” The answer lies not only in the password length but also in the content of the password and whether you use the same password on multiple sites. The most compromised eight-character password is none other than “password” itself, while the most compromised 15-charact
Image
      Is that Microsoft email actually a phishing attack? You’re no stranger to the endless threats lurking in your email inbox. But have you ever considered that an email which seems to be from Microsoft could end up being your worst nightmare? Microsoft, the tech giant we all know and trust, has become the most imitated brand when it comes to phishing attacks. That’s where cyber criminals send you an email which contains a malicious link or file. They’re trying to steal your data. And whilst Microsoft isn’t to blame for this, you and your employees need to be on high alert for anything that seems suspicious. During the second quarter of 2023, Microsoft soared to the top spot of brands imitated  by criminals, accounting for a whopping 29% of brand phishing attempts. This places it well ahead of Google in second place (at 19.5%) and Apple in third place (at 5.2%). Together, these three tech titans account for more than half of the observed brand imitator attacks. But w

The end of life (EOL) for Windows Server 2012 and 2012 R2 is fast approaching

  The end of life (EOL) for Windows Server 2012 and 2012 R2 is fast approaching, with the official EOL date now set for October 10, 2023   Understanding Windows Server 2012 and 2012 R2 EOL Microsoft has a lifecycle policy that provides support for their products, including Windows Server 2012 and 2012 R2. EOL refers to the point when a product is no longer supported by Microsoft, meaning they will no longer provide security updates, patches, or technical support . What does this mean for your business? With this milestone, Microsoft will no longer provide any updates, fixes, or support. So from October 10 th 2023, any businesses running Windows Server 2012 will be vulnerable to cybercrime, viruses, and compliance risks, and without this line of security, you’ll be unlikely to pass cyber essentials. Put simply, if a new Zero-Day Exploit or sophisticated piece of malware were to be developed that exploited a service in the Server 2012/Server 2012 R2 system, there would be