Blog

Blog

Welcome to our Blog

By Sally Latimer-Boyce 22 Apr, 2024
Why Upgrade from Windows 10 to Windows 11
By Sally Latimer-Boyce 22 Apr, 2024
Small and medium-sized businesses are at more risk of a malware attack than ever. It’s time to take action to protect your business. Here we tell you how.
In the never-ending mission to be more productive, the latest Microsoft Edge browser could be a powe
By Sally Latimer-Boyce 17 Apr, 2024
Improving productivity is a never-ending mission for most business owners and managers. Whether it’s speeding up tasks or improving communication, every little helps. So it’s crucial to make the most of the tools you already have. And while you might think of your web browser as just a means to access the internet, it can be so much more than that. Especially if you use Microsoft Edge in Windows 11. It has loads of features that can help supercharge your productivity. Here are five of our favourites. 1. Split Screen for multitasking Multitasking is a skill every business owner needs, and Microsoft Edge's split screen feature makes it easier than ever. Whether you're comparing web pages, researching multiple topics, or simply keeping an eye on different sites simultaneously, split screen lets you view two pages side-by-side within the same tab. It's like having two windows open at once, but without the clutter. 2. Vertical Tabs for streamlined navigation Too many tabs? Yeah… we understand that. Microsoft Edge's vertical tabs offer a fresh perspective on tab management. By stacking tabs vertically along the side of the browser window, you can easily navigate between open tabs and access essential controls like close and mute. 3. Workspaces for seamless collaboration Collaboration is key in any business, and Microsoft Edge's Workspaces feature makes it easier than ever to work well with colleagues or clients. Create a workspace with a collection of open tabs, then share it with others via a simple link. It means they can open multiple tabs with one click. It's perfect for brainstorming sessions, project management, or team presentations. 4. Collections for organised research Gathering information from the web is a common task. Microsoft Edge's Collections feature makes this easier, allowing you to easily save and organise text, images, and videos from web pages into custom collections. Stay organised, focused, and productive. 5: Immersive Reader for distraction-free reading When you need to focus on reading an article or document online, distractions on the page can be a pain. Microsoft Edge's Immersive Reader feature provides a clutter-free reading experience by removing ads, links, and other interruptions. Customise the text size, spacing, and colour scheme to suit your preferences, and even have the content read aloud for hands-free reading. If your business doesn’t already use Microsoft Edge on Windows 11, this could be the perfect time to switch. Can we help you move over? Get in touch.
By Sally Latimer-Boyce 18 Sep, 2021
As a professional IT Consultant (and occasional user of Facebook), I wrote this article after my own Mother's Facebook account was hijacked... ... The perpetrator was only after my Mother's Facebook identify - and thankfully she was not scammed as a result. However, she did ask me why they did it, how they did it, and what she could do to prevent it in future. The easiest way for me to explain was anecdotally:- -- John has a Facebook account. He logs with his only email address ‘john@john.co.uk’ with the password ‘RedApples’ (John likes red apples, so it is his favourite password.) One day, John registers on a website selling Garden Furniture. He sets up an account with "gardenfurniture.com" and activates the account using his email address and favourite password (so that he doesn’t forget it later). Five months later, the garden furnitures website is hacked and thousands of registered users emails addresses and passwords are stolen (including Johns). Now the list of login names and password is on the market, available to the highest bidders. Eric is just one of many who buys that list. Eric is now free to attempt these credentials for ill gotten gains. He comes across john@john.co.uk on the list - password "RedApples". Eric tries logging into Barclays, Amazon, NatWest, Facebook etc (Eric has no idea if he will be successful, but he has both the time and incentive to persevere). Eric is successful - Facebook proves fruitful and he is now logged in as John. Now Eric has access to John's account - including Johns list of contacts. Eric exports a copy of Johns contacts (together with copy of Johns profile photos) and creates a brand new facebook profile (in Johns name). He uploads Johns profile photos, adds a few extra posts copied from the original hijacked account, then logs off - leaving the original Facebook account untouched (no need to draw attention to his unsolicited use of that account). From the new fake Facebook account, Eric is now free to send all of Johns contacts a Facebook request - knowing full well that many will unwittingly accept. A few accepted friend requests later, Eric now has an audience of PEOPLE WHO TRUST HIM BECAUSE THEY THINK HE IS JOHN. . Worse still, Eric can communicate with Johns contacts without John knowning, because the communication is not happening from within Johns original account. Eric now has an audience to illicit loans from, or to hook into narrative that leads them right into a scam. THE MORAL OF THE STORY? Do not re-use an already active password. Use different passwords for every site. Additionally, use a third-party password tool to generate and manage your online passwords. Users with different passwords for every site are less likely to get hacked in the way described above. -- I have now reset my Mother's Facebook password, and enabled two-factor-authentication (instructions below). I also changed her profile picture (so that it no longer matched the fake account). I did actually receive a friend request from fake account holder (which I subsequently accepted). I then observed who he/she had befriended and subsequently private messaged those I knew to warn them that they had accepted a friend request from a fake account. I then sat back and watched the quantity of "friends" start to drop on the fake account - with much pleasure!) I also posted on the wall of the fake account with a message of my own: "warning! this is a fake account - do not accept requests or communication from the trash who created it"! Within 5 minutes of my posting, the fake account was deleted. One small victory. Of course, there are other ways in which your online accounts can be compromised. This was just one of them - and topical to what happened to my loved one. Surf safely everyone. Sally Latimer-Boyce HOW TO CHECK IF YOUR EMAIL ADDRESS HAS BEEN COMPROMISED You can check to see if your email address has been breached by using this third party website . Simply enter your email address then click PWNED? This tool will list website sites that have been breached (assuming it was reported by the website owner) - giving you the heads up on whether or not you should change your password. Dont panic if this site says you have been "pwned" - just look at the section "breaches you were pwned in" and make an informed decision as to whether you need to change your password for any of the listed sites. PASSWORD MANAGEMENT TOOLS I would recommend a password application like 1Password and MSecure (links below). You do pay a small subscription for them, but it is worth it to keep your passwords safe. 1Password MSecure HOW TO SET UP TWO-FACTOR-AUTHENTICATION ON FACEBOOK On your PC or laptop, do the following: - login to Facebook and go to Account > Settings and Privacy > Settings - Click SECURITY & LOG - Click EDIT next to "use 2-factor authentication" Yyou can then chose your preferred method. I personally use "Text Message (SMS)" because I find that easiest, but have a play with all the options to find the one that suits you. HOW TO REPORT A FACEBOOK HACK You can report a Facebook hack using this link: REPORT HACKED ACCOUNT TO FACEBOOK.
By Sally Latimer-Boyce 17 Feb, 2021
When offered an 'all-you-can eat' buffet, you could be forgiven for delighting at the idea of eating an unlimited amount of food. However, there is still a limit – not in produce, but in consumption. There is only so much we can eat in one sitting and unless invited to stay the whole day, the so-called unlimited offer is in truth limited to what you can eat in a given time constraint.
By Sally Latimer-Boyce 27 Feb, 2020
When it comes to resolving IT issues, many end users will automatically reach out to IT support. Whilst this is entirely understandable, there are occasions when this may lead to a missed opportunity of self-help and reduced support costs.
By Sally-Latimer-Boyce 21 Apr, 2017
There are multiple ways you can avoid unnecessary IT support costs - this is just one of many shared in our free book.
Share by: