Comment

Vade the new AI boss for email protection

DigIT is pleased to announce that we are now partnered with Vade 365 Security.

Vade has made some impressive changes, creating a comprehensive email defense system.

Phishing attacks have become increasingly sophisticated, making them a prevalent threat. Vade 365 Security employs advanced algorithms to detect and neutralize phishing attempts in real-time. Whether it's deceptive links or cunning impersonation, this security solution is designed to keep you one step ahead of cybercriminals.

Harnessing artificial intelligence Vade 365 Security conducts thorough threat analysis on every email that enters your inbox. By scrutinizing patterns, behaviors, and anomalies, it can identify potential threats before they become a problem. This proactive approach ensures that your email system is not just reactive but anticipates and mitigates risks.

Malware poses a significant risk to organizations, capable of causing severe damage. Vade 365 Security employs dynamic malware protection mechanisms that inspect email attachments and links in real-time. By identifying and neutralizing malicious code, it provides a robust defense against the infiltration of harmful software into your network.

Understanding that traditional security measures may not be foolproof, Vade 365 Security incorporates behavioral analysis to detect anomalies. By recognizing deviations from normal user behavior, it can flag potential security breaches, allowing for swift intervention before any significant harm occurs.

In the era of cloud-based communication, Vade 365 Security seamlessly integrates with Microsoft 365, providing a unified and comprehensive security solution. This integration ensures that your email security measures align seamlessly with your cloud-based infrastructure, creating a cohesive defense against threats.

Vade 365 Security doesn't rest on its laurels. It actively taps into real-time threat intelligence, constantly updating its database to stay ahead of emerging threats. This commitment to staying current with the ever-changing cybersecurity landscape ensures that your defense remains adaptive and effective.

Comment

Comment

Microsoft SharePoint... Are Servers finally dead?

Microsoft SharePoint is a powerful platform that helps an organization collaborate and share information. It provides a centralized space where teams can store, organize, share, and access information from any device with an internet connection.

SharePoint serves as a centralized repository for documents, allowing teams to create, edit, and share files in real-time. Version control ensures that everyone is working with the latest information, reducing the risk of errors and confusion.

Teams can create dedicated SharePoint sites for projects or departments. These sites are a hub for all related information, including documents, calendars, and announcements. This structure enhances the organization and ensures that everyone involved has access to the resources they need.

SharePoint has a suite of collaboration tools, such as discussion boards, surveys, and task lists. These features foster communication and coordination among team members, whether they're in the same office or scattered across the globe.

One of SharePoint's strengths lies in its ability to automate business processes. Users can create custom workflows to streamline routine tasks, reducing manual effort and increasing overall efficiency. This is particularly beneficial for complex processes that involve multiple stakeholders.

Security is a top priority for any organization, and SharePoint offers robust features to protect sensitive information. Administrators can define access permissions at various levels, ensuring that only authorized personnel can view or edit specific content.

By providing a centralized location for information and collaboration tools, SharePoint minimizes the time spent searching for files or coordinating tasks. This leads to increased productivity as teams can focus more on their work and less on administrative hassles.

SharePoint's communication tools bridge gaps between team members, regardless of their physical location. This fosters a culture of open communication, enhancing teamwork and innovation.

Whether you're a small business or large, SharePoint is designed to scale with your organization. It can grow alongside your business, adapting and changing as companies grow.

In conclusion, Microsoft SharePoint is a versatile solution for businesses seeking to enhance collaboration and streamline their workflows. Its robust features, coupled with seamless integration with other Microsoft 365 applications, make it a go-to choice for organizations committed to driving productivity and fostering a culture of collaboration.

At DigIT Solutions we a fully committing to SharePoint. Don’t hesitate to give us a call to inquire…It could change your company.

Comment

Comment

Why you MUST shutdown or reboot your PC


reboot.jpg

 We process approx. 30-35 computer issues each day. Many problems consist of ‘my computers running slow’ or ‘Outlooks not responding’. Our first course of action is to check the uptime of the PC (how long has it been on). If it’s over three days we perform a restart.

So what does a reboot do..? Imagine writing your daily work life on a sheet of A4 paper for ten days. That piece of paper might start to get a little messy and congested. Now imagine a fresh piece of A4 each day, much easier to understand and work from.

A PC restart is literally like a clean slate for your PC (or A4 sheet of paper in this analogy) all the memory is flushed clean, programs and Windows services are restarted from afresh.

Also any Windows updates that have been download get installed, keeping your system more secure and GDPR compliant.
Also worth noting is that your antivirus updates regularly, many of these updates get applied during a restart. Not restarting can cause your antivirus to be ‘out of date’ and lead to issues with the newer viruses.

So how often should you restart your PC, it’s pretty simple you should just shut your PC down at the end of the day! PC components only last so long so by leaving your PC on overnight you are just wearing out your computer prematurely and wasting electricity. When you drive home from work would you leave your car running overnight ready for the next morning? Didn’t think so….

Comment

1 Comment

Avast Managed Workspace

ui-managed-workplace-services-dashboard.png

We have been testing Managed Workspace from Avast for several months and are please announce that we now have a dedicated service plan in place that incorporates all the powerful features that this software provides.

What does it do? What doesn’t it do should be more the question!

It’s basically a 24 hour monitoring system for your PC’s and Servers. Constantly checking for problems and in some cases fixing them automatically without you even knowing. The Managed Workspace system is broken down into several parts….

Security Assessment
Real-time security assessments to measure your antivirus, Windows patches, user configuration, passwords, and network security levels.

Real-time Monitoring and Alerting
Prevent unplanned downtime, sluggish system performance, and lapsed security protocols. Any issues automatically generates a support ticket for us to look into.

Windows Patch Management

Efficiently address security vulnerabilities by reviewing, approving, and automating patch deployment keeping your company compliant and more secure.

Asset Management
Easily track your company’s assets to help control IT costs, upgrades and deployments.

Task Automation

streamline service delivery by quickly resolving common issues by running automated tasks

If you’re interested in taking your IT support to a new level please give us a call or use the Contact us form.

1 Comment

2 Comments

Bad Rabbit ***Ransomware Alert***

A new strain of ransomware has hit the internet recently. At the moment it seems constrained to Eastern Europe and has infected the Kiev metro system and Odessa airport.

The Infection starts with a fake Adobe Flash installation that is downloaded from hacked websites. The download file contains all the tools to spread itself and encrypt your data.

If you are asked by a website to update or download a Flash update please contact you IT support and DO NOT download until it has been checked.

Be safe...

2 Comments

Comment

New kid on the block

We are proud to announce we are now Cisco Meraki partners… You may have heard of Cisco but what the be-jesus is a Meraki! Let me explain… Meraki was a security company with a range of network devices. Cisco snapped up Meraki and incorporated some of its high end security features- enhancing the brand even more.

Cisco Meraki devices are beautifully made and put together with  sleek aluminum bodies but it’s the configuration, cloud based administration and features that make them a dream to configure, use and deploy. Over the next few weeks I'll post some mini blogs on the features of these amazing devices and how they can have a positive impact on your business.

mx64w-large.png

Comment

1 Comment

Content filters are not Big Brother.

Content filters are hardware or software systems that restricts web traffic and websites browsing.

Many people think this is bad and often get frustrated that they can’t browse any website they like.

In the IT word we try and minimise risk to a computer network and systems. At the moment the internet is not a friendly place, sure its jammed packed with information, useful programs and utility’s but its also riddled with scammers and some very nasty software.

The scammers are very smart and the software they use is extremely clever and designed to circumnavigate defenses on you PC.

The best way to stop all this is to deny access to suspect websites. Content filters usually have categories like gambling, shopping, adult etc.

These sites are the target for scammers to hide their malicious software. It’s  pretty simple to block access to these sites or groups of sites.

The second benefit is your internet usage. We get many calls reporting slow internet which is very frustrating for remote sites or people working from home-only to find out Jim in accounts is watching Sky sports and Jayne the secretary has the internet radio playing on her PC.

Personally, after antivirus products a content filter is the next best defense for you network, get something in place asap!

1 Comment

Comment

Firewalls.....

There seems to be many misconceptions about computer security. Over the next few Micro blogs I'll try to explain and demistify...

Firstly Firewalls. A firewall help protect networks from unwanted intrusions and hackers. Firewalls can be software or hardware and sit either on your computer or between you and the Internet (the internet is a big network you know). Most people have Firewall's and don't even realise. Most  internet routers have  firewalls, Windows XP and newer have basic built in software firewalls.

So what do they do?? Firewalls inspect the network 'traffic' and determine if its allowed through based on predefined rules, anything else gets rejected.

Basically that's it, it doesn't stop you getting viruses or downloading malicious code from websites. 

 

Comment

1 Comment

RAM and Memory...

Ram chips

RAM (random access memory), or memory as its often called are small strips of circuit board that plug into you computers motherboard. RAM often get confused with disk space (hard drive) but in reality they couldn't be more different. As ever, I'll try to explain in plain english how it all works... 

RAM is the 'working space' for your computer.

As programs or files (for example a word document) are opened they a temperaraly opened in RAM. Why? You many ask... Because its fast, very fast, allowing the computers operating system to make changes quickly. Your computer is always juggling what is held in the systems RAM. As your system moves information in and out of RAM it has to store the information leaving the RAM somewhere, right? It gets stored on your hard drive, which is a drasticly slower than RAM. You may have noticed when you have multiple programs and files open your computer gets slower, this is your computer running low on RAM and  writing more and more information to the hard drive. So to answer the question I get asked a lot, "how much memory do I need?" "As much as possible" would be the answer (if it was free!!) because we want to limit the computer using the hard drive (remember its slower) but a minimum of 4 Gigabytes is a good start.

1 Comment

4 Comments

SSD's what the hell are those..?

It's a  hard drive but a very fast one! A "normal" hard drive consists of spinning disks and arms (think record player). Whenever you want to access a program or open a file (a document) the disk spins, the arms move, it finds the relavent bit of information then reads it for your computer to digest and display it on your screen. Cool.. But this takes a bit of time. The faster the disk turns (7200rpm generally) the faster it will read the information.

SSD hard drive upgrades

So, what if there was no spinning, no moving arms and no moving parts? That would be better and faster wouldn't it? Well it is, SSD (solid state drives) are much faster, a normal spinning drive can read data at approx. 80 MB per second, (audio CD's are 650 MB to give it context), SSD's can read five times faster (and in some cases even faster). As the price tumbles and the capacity of the drives increase (the main stumbling point of SSD's) it really is becoming the upgrade of the century. Give us a call for a quote.

 

4 Comments

Comment

CryptoLocker

CrytoLocker

 

 

We have seen a re-emergence of this nasty Ransomware of late. For those of you that are unaware, its’s an email-delivered file that once run, encrypts the documents on your PC (or any mapped network drive). The author will then ask for payment to unlock the files.
Please be on the look out for emails with .ZIP attachments.. Be warned once the files are encrypted they cannot be recovered. They have to be restored from a backup. If you feel you have no choice but to pay the ransom, (have in mind this is extortion) please use a pre-paid card and not your credit or debit card.
The Crypto locker virus (actually it's a program) is very difficult to stop. 
So please be very aware of emails from senders you don’t know.
Also disabling hidden file extensions in Windows may help you pick up the virus before it gets installed. Make sure your backups are good, if you get this virus you’re going to need them!!

Comment