There are so many versions of Office 365 that it is easy to end up paying too much. Many of a smaller businesses don't use all of the features that come with Office 365 such as Exchange, OneDrive, SharePoint, Skype for Business and Business Teams. So are you paying the right subscription for your business? ...continue reading "Don’t Pay More Than You Need To For Office 365"
Now is a good time to start thinking about replacing or upgrading your Windows 7 computers. Microsoft have said that they will stopping Windows 7 support on 14th January 2020 – this means they will stop issuing security updates. Once this happens your computer security could be compromised (as happened with the old Windows XP computers when they stopped issuing updates).
So we are recommending that you start putting an upgrade plan into place – this will enable you to spread the cost (and there may be no cost at all, other than time).
So think about your old computers and decide whether to...
If you have old computers sitting around not being used, then ensure you dispose of them before 2020.
Don't forget to wipe the hard drive - be safe.
Many business computers came installed with Windows 7 / 8 / 8.1 but had valid Windows 10 licences. These can be upgraded at no cost.
If it’s old then by 2020 it might be time to replace the computer anyway.
If you have a lot of computers that will need replacing start now and spread the cost.
If none of these options are available then you can buy a Microsoft upgrade licence for Windows 10. To check if a computer is suitable for upgrading go to https://www.microsoft.com/en-gb/windows/windows-10-specifications. To buy Windows 10 Professional go to https://www.microsoft.com/en-gb/p/windows-10-pro/. Note that if you don't need the computer to connect to a Microsoft Windows server, then Home version is cheaper, and also it is worth checking out Amazon and similar sites as you can often get a valid licence cheaper there too.
A LITTLE HELP
We can help you with...
- Advice: whether it is worth upgrading, what to buy new, etc...
- Computer audit: so you know which to scrap, upgrade, replace...
- Computer upgrades: guiding you through upgrades or doing it all for you...
Recently we have had a couple of companies contact us with their Microsoft email addresses compromised. In one case the passwords that the person had used was a weak – just a simple 7 letter word. So we are recommending that customers ensure that they use strong passwords. ...continue reading "Security: Some Microsoft Email Accounts Getting Hacked"
We are pleased to welcome Simon Leach to our team. Simon will be working three days a week from September and will be helping with IT support (and with Healthy Practice support in 2019).
I asked Simon to tell us a little bit about himself... ...continue reading "We are Pleased to Welcome Simon to our Team"
Based on numerous conversations we have had with businesses as they work through their GDPR compliance, there appears to be some confusion with GDPR and email. Particularly whether they can continue to communicate with their clients or whether they now have to get explicit consent to do so. These communications may take the form of emails or text messages or newsletters. Hopefully this will help... ...continue reading "GDPR: Do you need to email everyone to get permission to contact them?"
With GDPR password security is more and more important as it is one of the most elementary parts of computer security. Yet lots of customers tell me that remembering passwords is a real problem. Ideally every password should be a totally random mixture of characters, but for many this is too challenging. So here are some tips on GDPR and passwords and how to create passwords that are not ideal but may be acceptable.
...continue reading "GDPR and Passwords"
Part of GDPR (General Data Protection Regulation - more here https://technologytamed.com/gdpr/) is assessing the way you store patient data. Many businesses use to removable USB drives which are then taken offsite. When assessing your GDPR risks you may decide that you would like to also encrypt portable drives you use that may contain personal data.
The following gives you step by step instructions on how to use one of the most popular encryption methods: VeraCrypt (which is derived from TrueCrypt). ...continue reading "Encrypting USB devices with VeraCrypt"