Computers Booting into Tablet Mode

Recently we have had a couple of customers phone us because all their desktop icons had disappeared, very distressed. Chatting to them it turned out that the problem is computers booting into Tablet Mode. 
So if you suddenly find that you have…
  • No easy access to your desktop
  • No program/app icons on your Taskbar
  • Just lots of tiles on your monitor

Then check if your computer has booted into Tablet Mode.
How to get out of it?
  1. Click on the Windows Start icon
  2. Select the Settings cog
  3. Click on System
  4. Select Tablet Mode
  5. Check When I sign in….

Rebecca Mansbridge
August 2018

GDPR: Do you need to email everyone to get permission to contact them?

Image of a person and email

Based on numerous conversations we have had with businesses as they work through their GDPR compliance, there appears to be some confusion with GDPR and email.  Particularly whether they can continue to communicate with their clients or whether they now have to get explicit consent to do so. These communications may take the form of emails or text messages or newsletters. Hopefully this will help…

Read moreGDPR: Do you need to email everyone to get permission to contact them?

GDPR and Passwords

With GDPR password security is more and more important as it is one of the most elementary parts of computer security. Yet lots of customers tell me that remembering passwords is a real problem. Ideally every password should be a totally random mixture of characters, but for many this is too challenging. So here are some tips on GDPR and passwords and how to create passwords that are not ideal but may be acceptable.

Image of a person entering a computer password

Read moreGDPR and Passwords

Encrypting USB devices with VeraCrypt

Part of GDPR (General Data Protection Regulation – more here is assessing the way you store patient data. Many businesses use to removable USB drives which are then taken offsite. When assessing your GDPR risks you may decide that you would like to also encrypt portable drives you use that may contain personal data.

The following gives you step by step instructions on how to use one of the most popular encryption methods: VeraCrypt (which is derived from TrueCrypt).

Read moreEncrypting USB devices with VeraCrypt

Encrypting USB Drives with BitLocker

With GDPR encrypting USB drives with BitLocker is an easy way to help to secure personal data.

Part of GDPR (General Data Protection Regulation – more here is assessing the way you store customer data. Some businesses backup to removable USB drives which are then taken offsite. Or use removable USB drives to transport data. If personal data is stored in this way a GDPR recommendation is that the device is encrypted.  If you have Windows 10 Professional or Ultimate encrypting USB drives with BitLocker is relatively easy.

Read moreEncrypting USB Drives with BitLocker

Update About Spectre and Meltdown Security Flaws

Spectre and Meltdown security Flaws in Most Modern Devices

I am sure many of you will have heard that there are security flaws in Intel, AMD and ARM processors – called Spectre and Meltdown. Spectre affects all modern processors, whereas Meltdown affects Intel, plus Itanium and Atom chips made before 2013. Potentially these flaws could enable hackers to steal passwords and sensitive data from ANY device made in the last 20 years that has a processor. Note this includes Apple devices – see link at bottom of page for which versions have been issued ‘mitigations’ (in Apple speak).

Read moreUpdate About Spectre and Meltdown Security Flaws

November Housekeeping = Internet and IT Security

Image of person breaking into a computer

Over the last 10 months I have constantly mentioned security, security, security, because we live in a world where criminals are exploiting every IT and online weakness they can. In 2015 we had very few businesses phone us with problems.  In 2016/17 we have seen an increase – as criminals are now targetting businesses. So much so, that I think you need to dedicate November to looking at your security.

Read moreNovember Housekeeping = Internet and IT Security