RCS Technologies Ltd's cover photo
Ensure your business has all of its IT solutions handled when you rely on the on-site services from RCS Technologies Ltd. Here at RCS Technologies Ltd, we know your organisation needs to ensure that critical IT systems are always available to support core business functions.
Unfortunately, maintaining IT systems with an in-house IT staff can be costly and inefficient. With our proactive company, we carry out maintenance for your business once or twice a month and check to make sure everything is updated, all malware scans are carried out, and general maintenance gets done on site. Our company offers a large selection of IT services for your business, including backup solutions, IT consultancy, IT security audit, and disaster recovery. Count on our staff to handle all of your important needs, so you can focus on your internal operations.
RCS Technologies Ltd's cover photo
Microsoft has released security updates that are impacting some security AV vendors, causing some of their customers using Windows 7, Windows 8.1, Windows 2008 R2, and Windows 2012 to occasionally experience system fails or hangs during boot up after application of the update.
A small number of Sophos customers have reported experiencing this issue. Sophos is working very closely with Microsoft to resolve the issue
IMPORTANT NOTE: IF YOU HAVE NOT YET REBOOTED YOUR WINDOWS 7 WINDOWS 8.1 WINDOWS 2008 R2 OR WINDOWS 2012 YOU SHOULD UNINSTALL THE LATEST MICROSOFT SECURITY UPDATE BEFORE REBOOTING
RCS Technologies Ltd's cover photo
Be aware that the latest update for Windows 7 10/04/19 KB4493472 is causing a considerable amount of issues preventing users from logging in to their device. If you are experiencing an issue you will need to boot up the device in safe mode and remove the offending update, once you have done this you will need to reboot the device.
RCS Website service levels
RCS offer a complete IT support and management service for businesses. We can give a full service to ensure that your IT system is working at it's very best.
We proactively update, back up, and manage all your computers and servers remotely. Every aspect of your network is monitored, and issues can be spotted and fixed before they can cause any type of problem.
We are focused on expertise, patience and attentiveness, while staying ahead of the technology curve. Our goal is to provide you and your company with the best and most up-to-date technology solutions possible.
Disaster Recovery & Business Continuity
It’s only sensible to safeguard your business data and systems because as everyone knows, potential threats are just around the corner. A reliable disaster recovery plan eliminates the possibility of data loss – and all your worries as well.
Having a well-planned backup strategy is the most effective way to protect your vital data from prohibited modification, destruction, or disclosure of vital information. On behalf of virus, password cracking and hacking, electronic eavesdropping, spyware, and social engineering tactics steadily on the rise, properly backing up and storing your data has never been more important.
From technical to strategic, find out how we can help you move your business forward.
Microsoft will be ending extended support for the Windows 7 as of January 14th 2020 We should now upgrade to Windows 10 to continue receiving support.
Microsoft ended mainstream support for Windows 7 on January 13th 2015 but their extended support won’t end until January 14th 2020
This means that the company stopped adding new features and ended complimentary support, but it still provides bug fixes and patches. This applies to Microsoft business, developer and desktop operating system products.
When support ends the main issue will be no more security updates, so your systems running Windows 7 will become vulnerable to un-patched security risks within the operating system and on the applications it runs. An upgrade will become essential to remain protected against the hundreds of thousands of malware software (Trojans, Worms, Adware and Spyware) that hit the internet every day
What do you need to do then to prepare for Windows 7 end of life?
• Identify machines that need to be upgraded or replaced
• Ensure that any machines still running Windows 7 have Service Pack 1 installed
• Put security controls in place to keep critical systems separated from Windows 7 (or older) machines that cannot be upgraded or removed due to limitations or hosted apps.
• Create a timeline plan and budget to replace and upgrade.
Windows 7 will not become obsolete but with Microsoft cutting off all support in 2020 it only makes sense to upgrade to Windows 10 for a fully supported system.
If you have any questions about this article please feel free to call us on 0116 3667020 we are here to help.
It has come to our knowledge an email is making its presence felt, this is a blackmail attempt. Using old passwords you may have had, or are still using, the scammer is using your data to extract money from you, using different means.
The link above shows how they are trying to gain money from you using bitcoins. the content of this scam email does not necessarily have this format, but they all have the same means, they are trying to get your money.
ON NO ACCOUNT should you reply to these scammers, it is best practice to change all passwords regularly especially if you have had an email with this content.
October is Cyber-Security Month,
A number of organisations and businesses have been participating in the campaign in Europe and the US, with the Better Business Bureau in the US offering a number of tips for staying safe online throughout the month.
Advice from the bureau includes avoiding suspicious links and attachments, sticking to trustworthy websites, improving the strength of passwords, and updating security protection software on computers and other devices.
Google's homepage has a small note indicating that it is Cyber-Security Month, with a message encouraging you to perform a quick security checkup.
This checkup involves issues within four sections; Your devices, recent security events, sign-in and recovery and third-party access. If clicked Google account holders will be informed of any unusual activity on their account,
Give us a call 0116 3667020 we can help with all your IT needs, including backup solutions, IT consultancy, IT security audit and disaster recovery. Count on us to handle all of your important needs so you can focus on your internal operations.
Be Aware There has been numerous reports of phishing emails lately. These emails come into your email account, looking just like a company you do business with, it might be your utility company, your bank or your online shopping companies.
These would be telling you that maybe your account is in arrears or your card or account has been compromised
How can you tell if this is true without opening the email? Get hold of the company that is supposedly trying to get hold of you. Ask them about the email you have received, they will let you know if they have sent this or not.
Also have you won something you haven’t signed up to? You could get these YOU’VE WON pop up ads, it’s just a way of getting hold of your bank details, if it’s too good to be true it almost always is.
On no account should you open or click on any link in the email until you have verified the source.
Microsoft Teams is a collaboration app that helps your team stay organized and have conversations—all in one place. Here's a quick look at the left hand side of Teams.
Teams - Find channels to belong to or create your own. Inside channels you can hold on-the-spot meetings, have conversations, and share files.
Meetings - See everything you’ve got lined up for the day or week. Or, schedule a meeting. This calendar syncs with your Outlook calendar.
Calls - In some cases, if your organization has it set up, you can call anyone from Teams, even if they’re not using Teams.
Activity - Catch up on all your unread messages, @mentions, replies, and more.
Use the command box at the top to search for specific items or people, take quick actions, and launch apps.
Get the app you want
Download Teams for your desktop, iOS, or Android.
Or just use Teams on the web at https://teams.microsoft.com.
Get the apps
Training: Microsoft Teams is a hub for teamwork. Learn how to use Microsoft Teams to connect and create in brand new ways.
It has been an exceptional summer so far, but it isn’t just humans and animals suffering from this heat, we must look after our computers, they overheat which can be serious in the extreme weather we are experiencing now.
Look at the tips below to help your computer keep cool this summer.
*Try to keep your computer in a cool, dry area to prevent overheating
*Don’t have too many computers running off one power supply, if the socket is affected by a power surge then all computers could be damaged
*Do not share the power with air conditioners or fans.
*Inspect power protection devices to make sure they are functioning properly.
*Protect your computer during electrical storms, unplug the telephone line from the modem jack or use a telephone line surge suppressor.
*Turn off and disconnect the power cord during an electrical storm.
*Try not to leave your laptop in a hot car, not even in the boot. If you must leave it make sure it has been turned off completely, inside a hot car temperatures are almost always going to reach outside the laptop safe range.
Stay safe and cool this summer,
if you have any questions give us a call we are here to help.
The 3 Best Cybersecurity Solutions for Your Business
Hacking attempts on businesses have reached all-time highs and will only increase as the level of interconnectivity around the world also increases. There is a parallel to the access of internet globally and the pressure on individuals to keep their data secure. Cybersecurity has to be one of the most, if not the most, important aspects of any business’s profile.
Oftentimes an IT professional is required, either contracted or hired, to fully lockdown an intranet and secure a system. This means management of everything from password control to anti-fraud so that a company is not at risk of being besieged. There are, however, strategies that can be employed to ensure that your company stays safe and secure.
1. Secure the Network
One of the most important things a business can do is lock down its network both externally and internally. This can be done through a couple of ways. Firstly, if using WiFi, make sure that your access point is hidden and is encrypted using a firewall.
This will create a harder barrier for hackers who will have to use tools and other devices to get through to your access point. This protects your internal network from external viruses and unwanted visitors. It is also important that if you are using a switch that it is the safest and most up-to-date machine. Update all of your devices regularly and have an employee monitor all of the traffic. The only way to truly secure a network is to keep a watchful eye and constantly encrypt.
2. Educate Staff
Sometimes the most effective strategy is to bring in a cyber security professional that can break down what a virus is, how to create effective passwords, and how to encrypt files.
The more knowledge your staff has of the threats the less likely you are to be exploited. There is nothing more dangerous than an employee who is ignorant of download policies who then accidentally downloads a virus and starts a breach.
Informing your employees of how to deal with technology in the safest way possible is the best way to prevent any hacks or exploits. So much of cybersecurity comes down to an individual keeping their information safe and using common practical knowledge. It is always important to hold your employees to the highest standard and in cybersecurity it is even more important.
3. Keep Updated
It is imperative that your technology stays up to date and is always on to the newest version. Even updating the Thin Client that your company uses can completely secure your employee teams.
Even with the best software developed by the most qualified software engineers, older machines have loopholes that can be exploited through hard-coded USBs and CD-ROMs. It is also important that ports are encrypted so that only registered and known devices can be used on a computer at any time.
Keeping antivirus and firewalls up to date while constantly upgrading technology can ensure that your company will always be the hardest one to crack. Strong password policies and strict employee rules about information sharing will ensure that you never suffer an attack from the inside. The best solution for businesses is diligence as being on top of the game is the most surefire way to stay protected.
Better website security.
You can see how serious cyber-attacks are for small businesses and ecommerce websites. The good news is that website security is something you can improve
If you are collecting any sensitive information on your website including email and password, then you need to be secure.
Invest in HTTPS
Enable HTTPS, also known as SSL (secure socket layers). So that any information going to and from your server is automatically encrypted. This prevents hackers form sniffing out your visitors’ sensitive information as it passes through the internet.
Use better passwords
Passwords are a serious issue. Don’t let your website become compromised. One practical way to significantly reduce risk is by strengthening your passwords and regularly changing them every few weeks
Keep software up to date
Keeping all software up to date is vital. In keeping your site secure. This applies to both the server operating system and any software you may be running on your website. When website security holes are found in software, hackers are quick to attempt to abuse them.
We have seen first hand within the business where the IT Support industry as a whole goes wrong.
From the hollow promises, overcharging of hardware goods and charging for services that are provided for free to the general public online, we decided that enough was enough.
Here at RCS Technologies, we know your organization needs to ensure that critical IT systems are always available.
We established RCS Technologies Ltd, out of the frustration of seeing what firms do to the public at large and decided that giving a customer-centric excellent service would be the core goal of our business and one of the pillars of the firm that we used to build our ethos from the ground up.
We made a promise to ourselves that an honest, reliable, pro-active service where we will go the extra mile to find you the best price for your hardware needs, that we will give you impartial advice even if it means we don't make a penny from it and to give you peace of mind that your IT needs are in safe hands.
SEVERE DESIGN FLAWS IN MODERN CPUs WERE OFFICIALLY DISCLOSED 2 WEEKS AGO BELOW IS SOME INFORMATION ON WHAT YOU NEED TO KNOW
WHAT ARE SPECTRE AND MELTDOWN?
Spectre and Meltdown are the names given to different variants of the same fundamental underlying vulnerability that affects nearly every computer chip manufactured in the last 20 years and could, if exploited, allow attackers to get access to data previously considered completely protected. Security researchers discovered the flaws late in 2017 and publicized them in early 2018.
WHAT'S THE DIFFERENCE BETWEEN SPECTRE AND MELTDOWN?
MELTDOWN got its name because it Melts security boundaries normally enforced by hardware. By exploiting Meltdown, an attacker can use a program running on a machine to gain access to data from all over that machine that the program shouldn't normally be able to see, including data belonging to other programs and data that only administrators should have access to.
SPECTRE By exploiting the Spectre variants, an attacker can make a program reveal some of its own data that should have been kept secret. It requires more intimate knowledge of a program’s inner workings, and doesn’t allow access to other programs’ data but will also work on just about any computer chip out there. Spectre’s name comes from speculative execution and the fact is it will be much trickier to stop. While patches are starting to become available, other attacks in the same family will be discovered.
WHY ARE SPECTRE AND MELTDOWN DANGEROUS?
SPECTRE AND MELTDOWN PATCHES.
Microsoft has announced it will resume rolling out patches for AMD devices running Windows 7 SP1 and Windows Server 2008 R2 SP1, Windows 8.1 and Windows Server 2012 R2, and Windows 10, version 1709. Updates for four versions of Windows 10 — 1511, 1607, and 1703 — are still paused. As are updates for Windows Server 2016 and Windows 10 Enterprise. If you are using an AV and still haven't received the Windows patch yet, you are advised to wait until your AV vendor either issues an update that sets the registry key for you or specifically recommends that you do so, yourself.
Be the first to know and let us send you an email when RCS Technologies Ltd posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.
Send a message to RCS Technologies Ltd: