-
Let’s play
Jack Welsch kiedyś powiedział: “Biznes to gra i jak w przypadku wszystkich gier, wygrywa drużyna, która stawia ludzi na boisku i sprawia, że grają razem. To takie proste”. Zgadzam się, może to być proste, ale tylko wtedy, gdy zainwestujemy czas i wysiłek w gromadzenie nowej wiedzy, dzielenie się informacjami i podnoszenie naszych umiejętności. To takie…
-
Would you pay the ransom?
Imagine your good day at work: things go to the plan, all staff on board (no one called in sick), scheduled jobs are getting done and ticked off the list, no complaints from the clients, just good feedback all way round, email is working and so is other technology and so on. Just another great…
-
Czy w razie cyber ataku zapłaciłbyś okup?
Wyobraź sobie swój dobry dzień w pracy: wszystko idzie zgodnie z planem, żaden pracownik nie zadzwonił, że jest chory, nikt się nie spoźnił do pracy, zaplanowane zadania są wykonywane i odhaczane z listy, bez skarg od klientów, tylko dobre opinie przez cały dzień, e-mail działa, podobnie jak inne technologie i tak dalej. Po prostu…
-
Clive’s weekly Cyber Security roundup – 17 June 2022
We will start with the positive news this week. Microsoft, included in it’s Patch Tuesday fixes for the Follina vulnerability. Let’s hope it is a fix that is effective? The Russia Ukraine conflict is still a cyber security risk we should all be aware of: The rest of the week has been a bit slow…
-
Who broke OneDrive – own up Microsoft, we want a name!
This really is a security and compliance article – not just a rant by an annoyed Microsoft Windows 11 user and Microsoft 365 Home and Microsoft 365 for Business subscriber. Of course all of this blog is my personal opinion. There are times when I really do think the coders at Microsoft are only let…
-
FOLLINA – very basics you MUST know
On August 1st 2020 a gentleman known by the name of Benjamin Altpeter wrote a thesis. On one page tucked away inside was a description of an exploit within Microsoft office running on Windows. This issue was reported to Microsoft, but it is not yet clear why, after 22 months when it is rediscovered, it…
-
Clive’s weekly Cyber Security roundup – 10 June 2022
The significant news this week is a zero-day vulnerability in Microsoft Word, that Microsoft has not yet patched – although they have published advice about the issue: Microsoft guidance for Office zero-day vulnerability – Follina – Smart Thinking Solutions The malware is called Follina and it uses macros as part of it’s attack and this…
-
Is your Dad a geek? Do you need a present for Father’s Day?
Father’s Day is rapidly approaching – 19th June for those of you that need to know. Here is my annual “Geek Dad” present list. I have done the hard work of virtually shopping for you to find those gifts that geek Dads are sure to like. No affiliate links here – ideas, just for fun.…
-
Clive’s weekly Cyber Security roundup – 3 June 2022
Sorry it is a little late this week as I took the Bank Holiday off – well nearly there were some posts on Smart Thinking. Let’s start with the Queen’s Platinum Jubilee, we got a four day weekend and it was an excuse for me to run some technology stories from 1952: Platinum Jubilee Technology…
-
Legacy
We had a customer passed our way this month who almost fell victim to “legacy.” LEGACY is a term manufacturers and developers use to describe their older products which are no longer cost effective to support fully. We are talking about things like Adobe Creative Suite 5, Microsoft Office 2013, first generation i7, even hybrid…
-
Clive’s weekly Cyber Security roundup – 20 May 2022
There were two an interesting stories this week about privacy. The first was about how much our of our personal data is being sold and how that impacts on our privacy, so we can see adverts targeted at us. Just how much and often is your data shared? UPDATED 19 May 2022 – Smart Thinking…
-
A stranger requested access to your mail
Request: Access to an email account by a third party Challenge: We had a call the other day from a relative of someone who is terminally ill. They were requesting access to their family member’s business email. Straightforward? No. We protect our clients’ information! Solution: I made the request to the person for a Power…