Fresh from the press

Blog

Office 365 Logo

Three ways to secure your Office 365

Office 365 is great because it is in the cloud and is available everywhere.  Office 365 is vulnerable… because it is in the cloud and is available everywhere! Under GDPR regulations business owners have a responsibility to protect their clients and staff data.  It would be great if this were just a one-off exercise that we ‘put’ security in place and then never have to worry about it again.  The problem is that technology moves on and so does the methods of attack. Working with a professional IT company specialising in solutions for …
Read More
Windows Logo

The latest Microsoft Feature update is here 1909

The naming structure has been along the lines of 1803, 1809, 1903, 1909.  When these updates were installed you would have found that your computer often took a lot longer to restart while the update was applying. The good news with this update is that isn’t the case this time.  Microsoft has made this update very much like the standard updates you get each week.  So this means that you wont have any down time while the update is applying.  Having just installed this update myself it only took 1 minute and …
Read More
Adobe

New legislation notice from Ofcom

On 1st July 2019, new switching regulations were introduced by Ofcom, and we want to ensure you are fully informed when it comes to requesting switching information from us. You can also request a PAC or STAC code via text, your online account or by phone.  We’re always sorry when our customers are thinking of leaving us, however we aim to provide a great service from the day you join to the day you leave.   Requests by SMS  Switching Information – We will provide you with an SMS/Email detailing relevant information such as your contract end date and …
Read More
Heliocentrix Cloud

A bespoke database solution for a charity fundraising company

The business challenge Our client was evolving. Its services had significantly changed and the company wanted to become more agile in its approach. However, its team was wasting many hours on manual data processing tasks and checks. In addition, the team had grown and the business had expanded to two offices. The company already had a bespoke Access database which had been designed to handle large numbers of charity donators and reconciliation of their payments. This system had performed well in its 10-year lifespan and had adapted to many changes within the business. …
Read More

Bespoke software solutions

Bespoke software solutions – how do you know if one is right for you? Are cumbersome tasks that take you and your team too long to complete costing you money? Do they lose you hours of productivity or possibly even clients? Are you struggling to find a system that could automate these processes? If you have these challenges, then you might want to consider a bespoke software solution. What is a bespoke solution? Choosing to build a bespoke software solution means that you can design a program around your business needs rather than shoehorning your …
Read More

The web just turned 30. How far have we come?

It has been 30 years since Tim Berners-Lee founded the World Wide Web. I attended the celebration at the Science Museum in London where Tim shared his thoughts on how he started the web, and his vision for it; and it made me think about how much the web has changed in this time. To share a brief history, Tim created the web in 1989 while working at CERN as a way of automating the sharing of information that was stored on computers. The idea was that it provided a way for …
Read More

Push v. Productivity

‘A Toxic Cause of Stress’ – Push v. Productivity You are at work deeply engrossed in a piece of work that is near completion and suddenly there is a ‘ping’ and you see you have a new notification. Do you a) click on it – you can’t help it, it might be important b) ignore it but know it’s there like an itch you can’t scratch. Either way, your brain is now disengaged from the task in hand. It can take well over a minute to regain your concentration. Add into the …
Read More

I did not steal your car

I did NOT steal your car! I didn’t STEAL your car! I didn’t steal your CAR! The emphasis you put on different words, can directly influence the meaning. Try it. Read the statements out loud putting in the emphasis.  Now imagine you are reading it in an email… The Importance of Email Etiquette Every now and then an email exchange goes viral reminding us all that a hastily written email can sometimes come back to bite us.  Now that 50% of emails are scanned on our mobile phones, we digest information in a hurry – and a quickly fired off email …
Read More

Cryptocurrencies: Is it Pay Day for Cybercrime?

Dr Mike McGuire, a Senior Lecturer at the University of Surrey, teamed up with a virtualisation tech company, Bromium, and produced ‘Into the Web of Profit’ – a research study investigating the socio-economic and spending differences among cybercriminals. The headlines read like the script of a B list Hollywood movie with 15% of cybercriminals spending to gain status – high stakes gambling, flash cars, gold, drugs, jewellery and prostitutes. So how does it work? Cybercrime, Dr McGuire states, is not a business, it is an economy. Top cybercrime earners include sales of prescription …
Read More

Heliocentrix reviews the NCA Cyber Threat to UK Business Report

The race between hackers’ and defenders’ capabilities is increasing in pace and intensity. The publishing of the Cyber Threat to UK Business Report 2017/18, the new GDPR regulations and the ongoing scandal of Facebook condoning the harvesting of private data means that data security is first page news. We are going to examine some key points of the report in real terms to SMEs. If you think that tech horror stories such as ransomware, WannaCry, crypto-jacking, worms and trojans will never affect your organisation, you can think again. According to data compiled by …
Read More

The War on Malware

Malware: Short for malicious software, this is an umbrella term used to refer to hostile or intrusive programs designed to infect harm on a computer.  It can include viruses, worms, Trojan horses, ransomware, spyware, adware, scareware and other intentionally harmful programs. What you need to know about the malware threat In Quarter 3 in 2017, the biggest number of the quarter was the count of new malware, which reached an all-time high of 57.6 million new samples, an increase of 10% from quarter 2. Source: McAfee. In May 2017 the NHS was attacked by the …
Read More
1 2 3

Scroll to Top