In this age of information, cyber breaches in businesses are as impactful, if not worse, than physical break-ins. According to the Cyber Security Breaches Survey 2018, over 40% of businesses in the UK have been compromised at one point in their lifetime. Organisations should, therefore, prioritise measures that shield them against such attacks.Read More »
Launched in October 2009, Windows 7 is now a decade old. In human terms, not that long, but the life expectancy for an operating system is a much shorter one. Windows 7 reached its official end of life on January 14th 2020. What that means is that Microsoft will end all support for Windows 7.
Surveys conducted in recent years have found that at least a third or more businesses are still using Windows 7. Many users are SMEs, but the NHS also reported in July 2019 that they still had one million users using the operating system. Although current users can choose to continue with Windows 7, there are significant risks that should be considered.
Unauthorised access to business information can be disastrous, with effects ranging from loss or corruption of sensitive data to the exposure of customer data to people with malicious intent. Hackers are always coming up with new techniques to breach individual and organisational security. However, most cyberattacks are opportunistic and unsophisticated, using basic techniques to exploit glaring vulnerabilities. A strong password is enough to stop many would-be cyberattacks and garden variety hackers in their tracks.
Businesses process huge quantities of digital data every day and the threat of data loss is a live one. 64% of data losses are caused by hard disk drive crashes or system failures. Other threats include malware attacks and viruses, sometimes introduced through human error.Read More »
What should businesses do to make sure they're covered?
In less than a week, on Tuesday 14th January 2020, Microsoft will end extended support for Windows 7, Windows Server 2008 and Windows Server 2008 R2. Beyond this point, it will no longer issue security updates for any of these operating systems, having already stopped introducing new features when mainstream support ended.Read More »
This year’s Pegasus seminar dates are now available!
As an award-winning Pegasus Software partner, with our own in-house Pegasus support team, TMB Group has a long history of showing businesses how to use solutions like Opera 3 effectively and efficiently. A major part of that is our Pegasus seminars, which we use to keep our customers up to date with the latest changes to their applications and to discuss relevant legislation. Now, we’re taking registrations for our latest Pegasus seminars, and this year we’re changing things up a bit – including opening up these free events beyond our existing Pegasus customer base.Read More »
Do the crime but never do the time.
The idea of good conquering evil is a staple of Western fiction, from novels and plays to movies and TV shows. In the vast majority of cases, you know the hero of the story is going to win in the end, because that's how it's meant to be. It's a nice thought, but in reality, that’s not the case at all: criminals nearly always get away with it – and nowhere is that more evident than with cybercrime. Although the authorities have succeeded in capturing hackers in the past, the vast majority of cybercriminals never face any consequences for their actions. What makes it so difficult to catch them?Read More »
Scientists can't seem to agree one way or the other.
Everyone knows that using gadgets like phones and tablets before trying to sleep is a bad idea. The blue light emitted by their screens plays tricks with our brains, we’re told, making it hard to nod off and get a healthy 40 winks. This idea has become accepted wisdom in recent times, with technology companies now including blue-light filtering as standard in many devices. But new evidence has emerged, suggesting that blue light isn’t a problem at all, and that warm colours are, in fact, what’s keeping people up at night. So what’s going on?Read More »
Companies are reliant on their IT systems to perform to their full potential. For this reason, the quality of the relationship between the client and the IT supplier is key. An IT support service that doesn't run smoothly leads to client frustration. Worse still, a poor service can impact efficiency and reduce business productivity, even leading to loss of revenue. To build a satisfactory and productive working relationship with your IT supplier, follow this straightforward three-point plan.Read More »
Over the years, a business and its key operations may become reliant on ageing hardware and software systems. Known as legacy systems, the time comes when these systems' operational value is outweighed by the challenges of keeping them running optimally. Many businesses face this situation, including large organisations.
Decision-makers can be reluctant to change legacy systems for many reasons. These include cost and disruption to operations, particularly when a system performs a function that is bespoke to the organisation. Yet the risks involved in continuing to use legacy systems are considerable. Look out for the following indicators, which are warning signals that the time has come to replace them.