Skip to main content

Copilot is bringing another productivity boost to Teams

If you’re all about doing everything you can to help your team max their productivity (who wouldn’t want that, right?), then you’re going to love what Microsoft Teams has in store for us with its latest Copilot upgrades.

Imagine, you’re mid-Teams meeting, brainstorming like there’s no tomorrow. Ideas are flying all over the place! Even the quickest note-taker among you isn’t going to remember it all.

Never mind. Copilot’s got it. It can transcribe your conversation and understand your live chat, then summarize the most valuable insights.

It doesn’t stop there. Ever wish you could hit “undo” on a chat message and reword your response? Copilot can help with that too. In fact, it can come up with a fresh message suggestion right there in the chat. That could save you lots of time – and brain power.

Copilot’s call recap tool can help with normal phone calls too. Teams Premium subscribers will benefit from handy recaps. It’s like having that personal assistant you always wished for (but you still have to make your own coffee).

Microsoft’s also made IntelliFrame the default setting for video calls. What’s that, you ask? It uses AI to identify the individual video feeds of all participants so that everyone gets their moment in the spotlight during Teams Rooms calls. It also means no more awkwardly cropped faces or disappearing attendees.

Smoother team collaboration, more insightful meetings, and video calls that look like they’re straight out of Hollywood… who doesn’t want that?! If you’re not already maxing Teams in your business, we can help. Get in touch

Uh oh! You’re at greater risk of malware than ever before

Here’s something not-so-fun but incredibly important to talk about: Malware attacks.

And it’s bad news. These scary cyber threats are hitting small and medium-sized businesses (SMBs) harder than ever before. That means you need to know how you can defend your business.

First things first, what exactly is malware?

Think of it as the digital equivalent of the germs that make you sick. Malware, short for malicious software, is like the flu virus of the cyber world. It’s designed to sneak into your computer systems or network and wreak havoc in all sorts of ways.

So, what kinds of malware are we talking about here?

Well, according to a recent report, there are a few major troublemakers: Information-stealing malware, ransomware, and business email compromise (BEC).

You might be wondering why you should care about malware. Let me set the scene. You’re running your business smoothly, minding your own business, when BAM! A malware attack hits.

Suddenly, your files are encrypted, your systems are locked down, and you’re being held hostage for ransom.

Sounds like a nightmare, right?

That’s the reality for many SMBs facing malware attacks. It’s not just about losing money – it’s about the potential damage to your reputation, your operations, and your customers’ trust.

But there are plenty of ways to fight back against malware and keep your business safe and sound:

Educate your team

Teach your employees to spot phishing emails (an email pretending to be from someone you trust), suspicious links, and other sneaky tactics used by cyber criminals. A little awareness goes a long way.

Armor up your devices

Make sure all your computers and devices are equipped with the best software to prevent attacks.

Back up, back up, back up

Regularly back up your data to secure offsite locations. That way, if you are attacked, you’ll have a backup plan (literally) to restore your files.

Fortify your network

Improve your network security with firewalls, encryption, and other powerful weapons. We can help with all of that.

Stay skeptical

Be cautious of suspicious emails or requests for sensitive information. When in doubt, double-check the sender’s identity and never click on risky links or attachments.

Have a plan

Prepare an incident response plan for dealing with malware attacks. Think of it as your emergency playbook, complete with steps for containing the threat, recovering your data, and reporting the incident.

That’s a lot to take in, but remember, knowledge is power. These are all things we help our clients with, so they don’t have to worry about it. If we can help you too, get in touch.

Be more productive with these Microsoft Edge features

Improving productivity is a never-ending mission for most business owners and managers.

Whether it’s speeding up tasks or improving communication, every little helps. So it’s crucial to make the most of the tools you already have.

And while you might think of your web browser as just a means to access the internet, it can be so much more than that. Especially if you use Microsoft Edge in Windows 11. It has loads of features that can help supercharge your productivity.

Here are five of our favorites.

1. Split Screen for multitasking

Multitasking is a skill every business owner needs, and Microsoft Edge’s split screen feature makes it easier than ever. Whether you’re comparing web pages, researching multiple topics, or simply keeping an eye on different sites simultaneously, split screen lets you view two pages side-by-side within the same tab. It’s like having two windows open at once, but without the clutter.

2. Vertical Tabs for streamlined navigation

Too many tabs? Yeah… we understand that. Microsoft Edge’s vertical tabs offer a fresh perspective on tab management. By stacking tabs vertically along the side of the browser window, you can easily navigate between open tabs and access essential controls like close and mute.

3. Workspaces for seamless collaboration

Collaboration is key in any business, and Microsoft Edge’s Workspaces feature makes it easier than ever to work well with colleagues or clients. Create a workspace with a collection of open tabs, then share it with others via a simple link. It means they can open multiple tabs with one click. It’s perfect for brainstorming sessions, project management, or team presentations.

4. Collections for organized research

Gathering information from the web is a common task. Microsoft Edge’s Collections feature makes this easier, allowing you to easily save and organize text, images, and videos from web pages into custom collections. Stay organized, focused, and productive.

5: Immersive Reader for distraction-free reading

When you need to focus on reading an article or document online, distractions on the page can be a pain. Microsoft Edge’s Immersive Reader feature provides a clutter-free reading experience by removing ads, links, and other interruptions. Customize the text size, spacing, and color scheme to suit your preferences, and even have the content read aloud for hands-free reading.

If your business doesn’t already use Microsoft Edge on Windows 11, this could be the perfect time to switch. Can we help you move over? Get in touch.

Is this the most dangerous phishing scam yet?

Picture this: You’re going about your day, checking your emails, when suddenly you see a message from a company you trust.

You think, “Great! That’s safe to read”. But hold on just one minute… this email is not what it seems.

It’s part of yet another scam created by cyber criminals to trick you into clicking malicious links or giving up sensitive info. It’s called “SubdoMailing,” and it’s as dangerous as it sounds.

What’s the deal?

Just like regular phishing attacks, cyber criminals pretend to be trusted brands.

But here’s how it works: These cyber criminals scour the internet for subdomains of reputable companies. You know those extra bits in a web address that come before the main domain? Such as experience.trustedbrand.com. That ‘experience’ bit is the subdomain.

They find a subdomain that the brand is no longer using and is still pointing to an external domain that’s no longer registered.

Then they buy the domain and set up the scam website.

So, you believe you’re clicking on experience.trustedbrand.com… but you have no idea it automatically redirects to scamwebsite.com.

The criminals are sending out five million emails a day targeting people in businesses just like yours.

And because these emails are coming from what seems like a legit source, they often sail right past usual security checks and land in your inbox.

Here’s our advice to keep you and your data safe and sound:

  • Be wary of any emails that seem even remotely suspicious. If something looks fishy, it probably is.
  • Before clicking on any links or downloading any attachments, take a moment to verify the sender. Look for red flags like spelling mistakes or unusual email addresses.
  • Make sure your employees understand the latest phishing tactics and know how to spot a scam. A little knowledge goes a long way in keeping your company safe.
  • Consider investing in top-notch security software to keep the cyber criminals at bay. It might seem like an extra expense, but trust us, it’s worth it.

As always, if you need help with this or any other aspect of your email security, get in touch.

Creating a Strong Cybersecurity Culture with Cisco Meraki

A person works on a laptop with a padlock icon displayed on the screen.

Cyber threats pose a constant risk to businesses of all sizes. Data breaches and cyberattacks can devastate any business, causing financial losses, reputational damage, and disruptions to operations. The good news is that building a strong cybersecurity culture with Cisco Meraki is one of the most effective ways to mitigate these risks.

Read on to learn how Cisco Meraki solutions can empower your team and simplify your security efforts.

Key Steps to Build a Strong Cybersecurity Culture

Here are the steps to building a strong cybersecurity culture:

Establish Leadership Commitment

Building a successful cybersecurity culture starts at the top. Management must demonstrate a solid commitment to cybersecurity by allocating resources, promoting security awareness programs, and leading by example.

Develop a Comprehensive Security Policy

A well-defined security policy sets clear expectations for employee behavior regarding data handling, password management, internet usage, and reporting suspicious activity. Contact professionals to help create a customized security policy that aligns with your industry and business needs.

Cisco Meraki Solutions for Businesses

A man sits at a computer with a cyber security screen displayed.

Cisco Meraki solutions benefit SMBs. Implementing the right technology solutions can significantly strengthen your security posture. Cisco Meraki offers a suite of cloud-managed security tools for businesses:

Cisco Meraki MX Security Appliances

These next-generation appliances offer comprehensive network security solutions suitable for businesses of all sizes. With features like intrusion detection and prevention, content filtering, and malware protection, they ensure robust defense against various cyber threats.

What sets Meraki MX apart is its cloud-based management platform, which simplifies deployment, configuration, and monitoring from a centralized interface. This streamlined approach and reliable performance make Cisco Meraki MX security appliances an excellent choice for organizations prioritizing scalable and efficient network protection.

Key Features of Meraki MX Security Appliances

Seamless Connectivity

Whether your users are stationed at a corporate office, working remotely, or accessing cloud resources, Meraki MX ensures seamless connectivity by bridging users to public and private cloud environments or the data center. With integrated wired and cellular WAN, switching, and Wi-Fi capabilities, it provides resilient SD-WAN connectivity, optimizing traffic across all available paths.

Superior Cybersecurity Protection

Security is at the forefront of Meraki MX’s design philosophy. Leveraging unmatched threat intelligence from Cisco Talos, it automatically blocks 98% of malware, outperforming industry averages. Its suite of security features includes enterprise firewalling, intrusion detection and prevention systems (IDS/IPS), URL filtering, malware protection, and SD-WAN capabilities, providing a robust defense against evolving cyber threats.

Cisco Meraki MX Advanced Security Licenses

They enhance the capabilities of Meraki MX security appliances, providing an extra layer of protection against sophisticated threats. With the Advanced Security License, you can effectively safeguard networks and data assets from evolving cyber threats. Additionally, Meraki’s cloud-based management platform enables seamless deployment and management of these security features, ensuring that you can easily maintain a proactive security posture.

Cisco Meraki MV Cameras

These cameras represent a paradigm shift in video surveillance, offering a cloud-managed solution combining simplicity and powerful features. These cameras boast high-quality video capture, advanced analytics, and seamless integration with the Meraki dashboard. With their innovative design, MV cameras eliminate the need for complex on-premises infrastructure, making deployment and management straightforward.

Features like motion-based retention and smart alerts enhance security while minimizing storage costs. Whether deployed in retail, education, or enterprise environments, Cisco Meraki MV cameras provide reliable, scalable video surveillance solutions that adapt to evolving security needs.

Cisco Meraki Systems Manager

It is a comprehensive mobile device management (MDM) solution to streamline the management of mobile devices and endpoints across organizations. Systems Manager offers a cloud-based platform, enabling IT administrators to easily deploy, configure, monitor, and secure devices from a centralized dashboard.

With features such as device enrollment, application management, remote troubleshooting, and security policy enforcement, Systems Manager empowers businesses to efficiently manage their mobile device fleets, whether company-owned or employee-owned.

This solution supports various device types and operating systems, providing flexibility and scalability to adapt to the evolving needs of modern workplaces. Additionally, Systems Manager integrates seamlessly with other Cisco Meraki products, enabling you to create a unified network and endpoint management approach.

Putting Everything to Action

Here are a few actionable tips to put the theories into practice:

Conduct a Security Risk Assessment

Before implementing any security measures, it’s crucial to understand your existing vulnerabilities. Contact a professional to conduct a comprehensive security risk assessment to identify potential security gaps in your network, applications, and data storage practices. They can comprehensively evaluate network, data, physical and application security, and user behavior.

Develop a Security Incident Response Plan (SIRP)

A SIRP outlines the steps to take in case of a cyberattack. This includes identifying responsible individuals, procedures for isolating incidents, communication protocols, and data recovery steps. A clear plan ensures a swift and coordinated response to security incidents, minimizing damage and downtime. The critical components of SIRP include detection and analysis, containment, eradication, recovery, communication, and post-incident review.

Integrate Security into Onboarding and Training Programs

Make security awareness a core component of your employee onboarding process. Provide ongoing training throughout the year, using engaging and interactive methods like simulations, quizzes, and real-world case studies. The onboarding process, ongoing training, targeted training, and phishing tests are a few ways to integrate security into employee development programs.

By partnering with professionals like DEVsource Technology Solutions, who join hands with Cisco Meraki’s cloud-managed security solutions, you can establish a culture of security awareness, collaboration, and resilience within your organization. Book a web consultation today!

Is Wi-Fi 7 worth the investment?

You know that staying ahead of the technology curve is vital for all businesses in a highly competitive marketplace. One innovation launched earlier this year is Wi-Fi 7, the next generation of wireless connection.

But what exactly does it offer, and is it worth the investment for your business?

  • Lightning-fast speeds: No more buffering and lagging. Wi-Fi 7 brings blazing-fast speeds to keep your business running smoothly.
  • Rock-solid connections: Forget all about dropped calls or lost connections. Wi-Fi 7 ensures reliable performance, even in busy environments.
  • Futureproofing: Wi-Fi 7 is built to handle the demands of tomorrow’s tech. It’s future-proofing your business’s internet.

Now, here’s the million-dollar question: Should you upgrade to Wi-Fi 7? Well, it depends. While Wi-Fi 7 offers some awesome benefits, it can be a bit pricey to upgrade.

The initial investment includes the expense of next-gen routers capable of supporting Wi-Fi 7, which can range from hundreds up to thousands. And there may also be ongoing operational costs, especially if you’re leasing routers from internet service providers.

If you’re not ready to dive into Wi-Fi 7 just yet, that’s ok. There are plenty of other ways to improve your business’s existing Wi-Fi. From optimizing your current setup to adding extenders or mesh networks, there are options to fit every budget.

We’re all about making sure you find the perfect tech solutions for your business to keep you and your team happy. If you’d like to go through your options, get in touch.

Cyber attacks: Stronger, faster and more sophisticated

A new security report has revealed some alarming trends.

First off, cyber attacks are becoming faster than ever. Breakout times (that’s the time it takes for a criminal to move within your network after first getting in) have dropped significantly. We’re talking an average of just 62 minutes compared to 84 minutes last year.

This is not good news.

Not only are these attacks faster, but they’re also becoming more common. The report has identified a whopping 34 new cyber criminal groups, bringing the total to over 230 groups tracked by the company.

And guess what? These cyber criminals aren’t sitting around twiddling their thumbs. They’re getting smarter and more sophisticated. The report highlights a new record breakout time of just two minutes and seven seconds. That’s barely enough time to grab a coffee, let alone mount a defense.

But here’s the real kicker: The human factor is increasingly becoming the main entry point for these cyber attacks.

They will try to get your people to click a link in a phishing email, which will take them to a fake login page. Once your employee enters their real login details, they have inadvertently handed them over.

Or they pretend to be someone your team trusts. This is called social engineering.

So, what can you do to protect your business from these cyber threats?

  • Educate your employees

Make sure your team is aware of the latest cyber threats and how to spot them. Regular training sessions can go a long way in preventing costly mistakes.

  • Implement strong password policies

Encourage the use of complex random passwords generated and remembered by password managers. Use multi-factor authentication for an added layer of security (this is where you use a second device to confirm it’s really you logging in).

  • Keep your systems updated

Make sure all software and systems are up to date with the latest security patches. Cyber criminals often exploit known vulnerabilities, so staying current is key.

  • Invest in cyber security software

Consider investing in reputable cyber security software that can help detect and mitigate threats in real-time (we can help with this).

  • Backup your data

Regularly backup your data and store it in a secure location. In the event of a cyber attack, having backups can help minimize downtime and data loss.

When it comes to cyber security, it’s better to be safe than sorry. If we can help you to stay better prepared, get in touch.

The little things that make a big difference

Microsoft’s latest Windows 11 update has dropped, and it’s got a small change that could make a big difference to you and your team.

Microsoft has given Copilot, its handy AI assistant, a new place on the taskbar. No more hunting around for the button. Now it sits on the far right of the taskbar, in what we tech folks call the ‘system tray area’.

If Copilot isn’t your thing, no worries. You can easily remove it from the taskbar altogether. But having an AI assistant at your fingertips can be a real boost for productivity, so we’d recommend you give it a chance before giving it the boot.

Before you rush to check if your Copilot button has relocated, let’s talk details.

First off, this update has been rolling out over the last few weeks.

It’s known as Patch KB5034765 (catchy name) and isn’t just about moving buttons around. It’s also packed with important security and bug fixes, including a crucial one for Explorer.exe. This was causing some PCs to freeze up when restarting with a game controller attached.

Probably not an issue in your business, but you never know…

There was also a problem with slow announcements from Narrator, the screen reading tool. That’s been fixed.

While this Windows 11 update may seem like small fry, it’s these little tweaks that can really streamline your workflow and stop your team from being interrupted by problems while they work.

Has your business switched over to Windows 11 yet? Our team can look at your setup and advise whether you’d benefit from upgrading, or you should stay on Windows 10.

Get in touch and ask us for a tech audit.