Skip to main content

Heads up: You need to update Windows 11 by this deadline

Microsoft has issued an important update: If you’re using Windows 11, you need to upgrade to version 23H2 before October 8th, 2024. After this, older versions will no longer receive essential security updates, putting your systems at risk.

Why is this important?

Because Microsoft will stop supporting older Windows 11 versions for business accounts. This includes stopping security updates, which are vital for protecting your systems against the latest cyber threats.

The latest version includes advanced security features to protect against new threats, making sure your business data remains safe. But updating to Windows 11 version 23H2 brings other benefits beyond security. 

You’ll also notice performance improvements, making your systems run faster and more efficiently, which is great for productivity. Plus, new tools and features are continually added, helping streamline your workflows and improve overall efficiency. Staying updated ensures compatibility with new software and technologies, maintaining smooth business operations.

Delaying the update could leave your business vulnerable to cyber attacks. Without security updates, your systems will be exposed to potential exploits, risking data breaches and financial loss.

Microsoft typically enforces updates post-deadline to keep people safe, especially for business devices not managed by IT departments. While this is helpful, it’s better to update proactively on your own schedule.

Updating to version 23H2 is straightforward.

  • First, check your current version by going to Settings, then System, and selecting About.
  • Before updating, make sure to back up all your important files to prevent data loss.
  • Navigate to Settings, then Update & Security, and select Windows Update.
  • Click on “Check for updates” and follow the prompts to install version 23H2.
  • Once the update is complete, restart your computer and verify the new version in Settings, System, and About again.

Making sure your systems are up to date will keep your business secure and running efficiently. Don’t wait until the last minute… upgrade to Windows 11 version 23H2 now.

Keeping businesses protected and productive is our top priority. So, if you need any help with that, get in touch. 

Cyber extortion: What is it and what’s the risk to your business?

Here’s a topic that’s been making headlines and causing sleepless nights for many: Cyber extortion.

Is it something that’s on your radar? It should be, because it might affect your business one day.

What is cyber extortion?

It’s a type of cyber crime where criminals threaten to harm your business by compromising its data and digital assets unless a ransom is paid. These threats often involve ransomware, a malicious software that encrypts your data, making it inaccessible until you pay the ransom.

Sometimes, cyber criminals go a step further by stealing data and threatening to release it publicly on dark web leak sites if their demands aren’t met. This dual threat is known as double extortion.

According to a 2024 report, the number of victims of cyber extortion scams has skyrocketed by 77% over the past year. What’s more, small businesses are four times more likely to be targeted compared to their larger counterparts. This is a worrying trend, especially considering that smaller businesses often have fewer resources to defend against these attacks.

In the first quarter of this year alone, 1,046 businesses fell victim to double extortion. That may not seem huge, but bear in mind the actual number is likely much higher since many cases go unreported, hiding in the shadows of what experts call the “dark number.”

The truth is, all businesses, regardless of size or industry, are potential targets. However, certain sectors are more frequently attacked. Manufacturing, professional, scientific, and technical services, as well as wholesale trade, top the list. Alarmingly, the healthcare and social assistance sectors are also seeing a significant rise in attacks, despite the potential societal and political repercussions.

Cyber criminals are opportunistic and strategic. They target regions with strong economic growth and shared languages. For instance, cyber extortion attacks in the US have increased by 108%.

While the rise in cyber extortion is a big worry, there are steps you can take to protect your business. Here are some key strategies:

Back up your data: Make sure you have a robust backup plan. Keep your critical data in an offline or offsite location and regularly test your backup restoration process.

Keep software updated: Make sure all your devices use the latest software, especially those connected to the internet.

Implement Multi-Factor Authentication (MFA): Strengthen your access controls with MFA. This adds an extra layer of security by requiring multiple forms of verification before access is granted (such as a code on a separate device). Also, limit user access to only the systems they need for their job.

Patch and vulnerability management: Regularly update your systems to fix any security vulnerabilities. Cyber criminals often exploit known weaknesses, so staying on top of patches can prevent many attacks.

By understanding what cyber extortion is and how it works, you can better prepare your business to defend against it. Remember, the key is to be proactive.

If we can help prepare your business and keep it safe, get in touch.

Slow PCs? Manage which applications launch at startup

Staying on top of how your technology is set up is crucial for maintaining a reliable network. And one often-overlooked aspect is managing which applications start up when your business’s PCs start up.

With lots of software wanting to auto-start, it can slow down your system and potentially introduce security risks. But did you know that Windows 11 offers a useful feature that alerts you whenever new apps are added to the startup list?

Every time you hit the power button on your PC, it loads a set of apps automatically. While some of these are essential, others might not be, and can slow down your system’s performance. Over time, as you install more software, your startup list can grow, leading to longer startup times and a slow experience.

Not only that but keeping an eye on startup apps is good security practice. Unwanted or unknown apps starting automatically can be a red flag for malicious software (malware) or other security threats. By receiving alerts about new startup apps, you can quickly identify and investigate any suspicious additions, making sure that your systems stay secure.

How do you enable these alerts in Windows 11? It’s a simple process:

  • Start by opening the Windows 11 system settings. You can do this by clicking the Start menu and selecting the gear icon or by pressing ‘Windows + I’ on your keyboard.
  • In the settings window, click on ‘System’ in the left sidebar, then select ‘Notifications’ on the right.
  • Scroll down to the bottom of the notifications page. Just above Additional settings, you’ll find ‘Startup App Notification’, which is switched off by default. Move the slider to ‘On’.

From then on, you’ll receive a notification whenever a new application is added to the startup process. You can even customize what this notification looks like by clicking on the arrow next to the slider button, allowing you to adjust its appearance and sound to suit your preferences.

Turning on these alerts brings several benefits to your business. First, it helps keep your PCs running efficiently. By staying informed about new startup apps, you can quickly disable any unnecessary software that might be slowing down your system. This means faster start times and better overall performance, allowing your team to get to work without delays.

Secondly, it enhances security. Receiving alerts for new startup apps means you can immediately investigate any unknown or suspicious additions. This proactive approach helps prevent potential security threats from taking hold, safeguarding your business data and systems.

Lastly, it’s a great way to keep track of what’s installed on your machines. With various team members possibly installing different software, these alerts give you a clear overview of what’s being added to the startup list, making sure that only approved applications are running.

To further manage startup apps, you can use Task Manager. Press ‘Ctrl + Shift + Esc’ to open Task Manager, then select the ‘Startup’ tab. Here, you’ll see a list of all the apps that start with Windows, along with their impact on boot time. You can enable or disable apps by selecting them and clicking the appropriate button at the top right.

By regularly checking this list and using the new alert feature, you can keep your startup process streamlined and your system secure.

A better answer is getting someone to set all of this up and manage it for you. We specialize in making technology easy for businesses. If we can help, get in touch.

PING, WHOOSH, or BEEP? Now you can decide with Teams

If you’ve ever found yourself wincing at the sound of a Microsoft Teams notification breaking your concentration, you’re not alone.

Here’s some news that might be music to your ears then: Microsoft has just rolled out an update that promises to make these interruptions much more manageable. With the latest update, you can customize your notification sounds on Teams. We believe that will make it easier to stay focused and prioritize your work.

Instead of the generic “ping” that jolts you out of your workflow, you could opt for a more soothing chime or even a subtle whoosh. This might seem like a small change, but it can make a big impact on how you manage your day. Being able to differentiate between urgent alerts and less critical messages through sound can help you prioritize effectively and reduce unnecessary distractions.

For business owners like you, this update is more than just a new feature – it’s a tool to enhance productivity and team efficiency. By allowing your team to customize their notification sounds, you make it easy for them to tailor their work environment to their personal needs. For instance, urgent messages from key contacts can be assigned a distinct sound that grabs attention immediately, while routine notifications can have a softer, less intrusive tone.

This kind of prioritization is essential in a busy work environment where managing time and focus is vital. It can help prevent important messages from getting lost in the noise of everyday communications and ensure that team members can respond promptly to those pressing issues without being constantly disrupted.

The business benefits of this update are clear. First, it helps create a more focused and efficient work environment. When employees aren’t constantly interrupted by generic notification sounds, they can maintain their concentration for longer periods, leading to higher productivity levels.

And by enabling the muting of notifications during meetings or focused work sessions, the update makes sure that important discussions and deep work sessions go uninterrupted. This feature is particularly handy in today’s hybrid work environment, where distractions can come from multiple channels.

While the customizable notification sounds are a standout feature, Microsoft Teams offers a huge range of other benefits that make it an invaluable tool for business. It integrates smoothly with other 365 applications, providing a unified platform for all your business needs.

Whether it’s collaborating on documents, scheduling meetings, or managing projects, Teams brings everything together in one place. Teams has a robust set of tools that make teamwork easier and more efficient.

If you’re not already using Teams, where have you been? Give it a try and see how it can help you streamline your workflows and communication.

We can help you customize Microsoft Teams to be perfect for your business. Get in touch.

How to Customize Your Facebook Memories: Avoid Seeing Certain People or Dates

Hey there, fellow Facebook users!

We’ve all had those moments when a Facebook Memory pops up, and we’re instantly transported back to a time we’d rather not revisit. Whether it’s an old friendship, a past relationship, or a specific date that brings back tough memories, Facebook Memories isn’t always a walk down a rosy memory lane. But don’t worry, Facebook has got you covered! You can actually customize what shows up in your Memories.

Here’s a step-by-step guide to help you filter out specific people or dates in your Facebook Memories:

Step 1: Open Facebook and Head to the Memories Section

  1. Log in to Facebook: Open your Facebook app on your phone or go to the Facebook website on your computer.
  2. Access Memories: On the left-hand side of your News Feed, you’ll see a menu. Click on the “Memories” option. If you’re on mobile, tap the three horizontal lines (Menu), scroll down, and tap on “Memories.”

Step 2: Customize Your Memories Settings

  1. Go to Settings: In the Memories section, look for the “Preferences” or “Settings” option. It’s usually a small gear icon.
  2. Edit Preferences: Click on “Edit Preferences.” This will open up customization options for your Memories.

Step 3: Filter Out Specific People

  1. People: Click on the “People” option. Here, you can add the names of individuals whose appearances in your Memories you’d like to block.
  2. Add Names: Start typing the names of the people you’d rather not see in your Memories. Select their profiles from the list that appears. Once added, Facebook will ensure that those individuals don’t show up in your future Memories.

Step 4: Exclude Specific Dates

  1. Dates: Next, click on the “Dates” option. This allows you to block out specific days or even entire date ranges.
  2. Add Date Range: Click on “Add New Date Range.” You can input the start and end dates that you’d prefer to avoid. This is super handy for those anniversaries or time frames you don’t want to be reminded of.
  3. Save Changes: After entering the dates, make sure to save your changes.

Step 5: Review and Adjust (Optional)

  1. Review Your Preferences: You can always go back and review your settings. If there are new people or dates you’d like to add, or if you want to remove some from the exclusion list, you can do so anytime.
  2. Stay Updated: Facebook often updates its interface and features, so keep an eye out for any new options that might make your experience even more personalized.

And there you have it! With these simple steps, you can take control of your Facebook Memories and ensure they bring you joy instead of unwelcome reminders. So go ahead, tweak those settings, and enjoy a more positive trip down memory lane.

Is that Chrome extension filled with malware?

If you use Google Chrome in your business, you’re probably familiar with extensions. These useful tools can enhance your browsing experience in countless ways, from blocking annoying ads to reducing distractions.

Extensions are incredibly popular because they can add so much functionality to your browser. But just as you need to be careful when installing new apps on your phone, you must also be cautious when adding new extensions to your browser. That’s because they come with a risk of malware.

It’s short for malicious software – that’s any software intentionally designed to cause damage to a computer, server, or network. Cyber criminals use malware to steal data, hijack systems, and even empty your bank accounts.

Google Chrome holds about 65% of the browser market share worldwide, making it the most popular browser by far. This popularity makes Chrome a prime target for cyber criminals. While cyber attacks sometimes exploit vulnerabilities in the browser itself, there’s an easier way to target Chrome users: Through malicious extensions containing malware.

Although Google keeps a tight watch on its Chrome Web Store, the risk is still there. A recent report claims 280 million people installed a malware-infected Chrome extension between July 2020 and February 2023. That’s a huge number and highlights the importance of being vigilant.

Surprisingly, many malicious extensions remained available for download on the Chrome Web Store for a long time. On average, malware-filled extensions stayed up for 380 days, while those with vulnerable code were available for about 1,248 days. One particularly notorious extension was downloadable for 8 and a half years before being removed.

So, how can you protect yourself and your business from these malicious extensions? Here are five steps we recommend.

1. External reviews: Since checking ratings and reviews on the Chrome Web Store isn’t always reliable (many malicious extensions don’t have reviews), look for external reviews from trusted tech sites to judge whether an extension is safe.

2. Permissions: Be cautious if an extension asks for more permissions than it should. If a new extension requests extensive access to your data or system, this could be a red flag.

3. Security software: Use robust software to catch malware before it can do any harm. This is your last line of defense if you accidentally install a malicious extension.

4. Necessity: Before installing any new software or browser extensions, consider whether you really need it. Often, you can achieve the same functionality visiting a website.

5. Trusted sources: Only install extensions from trusted sources or well-known software providers. This significantly reduces the risk of downloading a harmful extension.

Chrome is the most popular browser, which means it will always be a target for cyber criminals. Google’s security team works hard to review every Chrome extension to ensure they are safe, but it’s still crucial to be vigilant.

If you’re unsure whether your extensions are safe or not, or you’d like more advice around keeping your business secure, our team can help. Get in touch.

Save time by accessing your Android phone’s files with File Explorer

Microsoft is working on an update that will allow Windows 11 File Explorer to directly access files on your Android phone, making file transfers smoother and faster than ever before.

Why’s this is such a big deal and how it can boost productivity for you and your team?

Imagine you’re in a meeting and need to quickly pull up a document or photo from your phone. Normally, you’d have to email it to yourself or transfer it using a cloud service. This can be time-consuming and cumbersome.

With the upcoming Windows 11 update, you’ll be able to access your Android phone’s files directly through File Explorer. No more fumbling with multiple steps, just quick, easy access to what you need.

This feature isn’t just about increased convenience; it’s a big productivity booster. By streamlining the process of transferring files between your phone and computer, you can save time. When you’re busy, every minute counts, and fewer interruptions make a smoother workflow.

Your team will also benefit from this update. This can lead to better collaboration and faster decision-making.

From a technical standpoint, this feature is designed to be user-friendly. There’s no need for complicated setups or third-party apps. It will be built right into the Windows 11 operating system, so once the update is rolled out, you’ll have everything you need at your fingertips. It lets everyone on your team take advantage of the new functionality without needing training or support.

Of course, we must mention another important aspect to consider: Security.

Microsoft is known for its robust security measures, and this new feature is no exception. Your data will be protected throughout the transfer process, giving you peace of mind that sensitive information remains secure.

Sounds good, doesn’t it?

We don’t have a release date yet. But if you want more help with productivity tools to make your business more profitable, we can help. Get in touch.

Protect your business from a data leak with Microsoft Edge

Microsoft Edge for Business has just rolled out new data leak control capabilities. And that could be a good thing for keeping your sensitive info safe.

What are data leak control capabilities?

In plain English, they help prevent your sensitive information from getting out to the wrong people. Think of it as having an extra lock on your digital doors, making sure only the right people can access your important data.

Every business handles sensitive information, whether it’s financial records, client details, or proprietary data. If this information leaks, it could mean big trouble: Financial loss, legal headaches, and a hit to your reputation.

This new feature in Microsoft Edge helps keep your data secure by making sure only authorized people can access it. It also stops accidental sharing.

Depending on your industry, you may have strict rules about data protection. These new controls can help you stay on the right side of regulations.

And let’s not forget your customers. They’re more aware than ever about data privacy. Using a browser with strong data leak controls shows you’re serious about protecting their information, which can boost their trust in your business.

Microsoft Edge for Business has added this new feature into an easy-to-use package. You can set policies on how data can be shared – like stopping certain types of data from being copied or emailed to unauthorized recipients. This way, you’re less likely to have accidental leaks.

It uses artificial intelligence to spot potential threats and unusual data movements. Edge can alert you to a potential leak before it happens, giving you a chance to act proactively.

If you’re already using other Microsoft products like 365 or Microsoft Teams, good news: Edge for Business integrates smoothly with them, letting you apply consistent data protection across all your tools.

Ready to give it a spin? Here’s what to do:

1. Update your browser: Make sure all your business’s devices are using the latest version of Microsoft Edge for Business. This makes sure you have all the newest features and security updates.

2. Set your policies: Work with your IT support partner to set up data sharing policies that make sense for your business. Microsoft provides guidelines and templates to help you get started.

3. Train your team: Make sure your employees know about the importance of data security and how to use the new features. A quick training session can do the trick.

4. Monitor and adjust: Keep an eye on how things are working and tweak your policies as needed. You want to find a balance that keeps your data secure without disrupting your workflow.

Better still, why not get our team to just do this for you. Get in touch.