logos large

£5000 Grant For Cyber Security

September 2, 2015

Geoff Courts The Department of Culture Media and Sport issued a press release in July announcing a government grant of up to £5000 to help boost the uptake of the new Cyber Essentials and IASME standards in cyber security for small businesses. Ed Vaizey, the Digital Economy minister made the announcement of a new voucher […]

Tesla-Powerwall-price

Tesla Powerwall | More Power To You

September 2, 2015

Geoff Courts Tesla have developed a new battery that might just revolutionise the way we store electricity. Tesla’s CEO and product architect Elon Musk (who is also the CEO of SpaceX, the commercial space travel company seeking to be one of the first to provide commercial flights into space) commented “The issue with existing batteries […]

Windows 10 Release | July 2015

September 2, 2015

Microsoft are releasing Windows 10 on 29th July, and will be providing it as a free upgrade provided that you are running a licensed copy of Windows 7 or Windows 8, and you upgrade within a year of the launch date. Microsoft are putting a lot of weight behind this release. Windows XP was arguably […]

Microsoft WIFI | A hotspot service

September 2, 2015

Jack Jones Early news of a WIFI hotspot service emerged this week from Microsoft along with a (very) bare site for its promotion – www.Microsoftwifi.com – in fact, not much more than the words “Coming Soon”. Rumours suggest that this service will connect over 10 million WiFi hotspots across 130 countries to link your mobile devices […]

gmaps

Google Maps | Come Find Yourself

September 2, 2015

Jude Brown Google is (sometimes) an easy way to get a reliable (sort of) answer to the question you have or something you are interested in, but you wouldn’t necessarily think you could find a person’s whereabouts online by simply searching their name. Google maps has released a new feature that will let you type […]

Word Cloud "Big Data"

What Is Big Data?

September 2, 2015

Ciaran Kenny We’ve all heard the term and most people have a vague notion that it is a concept that has something to do with huge organisations sifting through huge amounts of data. And, yes it can be something like that – but why do they do it? What’s in it for them? OK, so […]

Fun With iPhones

September 2, 2015

Fun With iPhones Jack Jones Some of you will have known about a “hack” for iPhones that surfaced in recent weeks where a person can send a text message to an iPhone causing it to restart. Some of you probably had some fun with it – I certainly did amongst my technology illiterate family. The […]

goldfish

What Was I Just Doing…?

September 2, 2015

Jude Brown Microsoft have carried out a study on 2000 people, testing the concentration in the brain and measuring the time of the attention span in the average human being. Now you will probably think ‘what the hell is he on about?’, but this was a real study carried out by scientists, and they have […]

drone1

Drone Deliveries | Too Dangerous?

September 2, 2015

Geoff Courts Amazon has been looking at trialling the use of drones for some time now, with the goal of eventually airlifting all parcels directly to the customer. The airspace between 200-500ft above ground—between to top of most buildings and the bottom of commercial aviation airspace—is where they would like to operate. The drones would […]

Internet Of Things | Traffic Management

September 2, 2015

Internet Of Things | Traffic Management Driverless cars are already being trialled by Google in the US and the UK, with some positive, albeit early, results. One benefit that researchers at the University Of Texas are looking at is its use in traffic management. Imagine a world without traffic lights. The team are working on […]

Dash It

September 2, 2015

Jude Brown On April fool’s day I read an article on the BBC news website about a magic button that orders an everyday item of your choice with just a single press. For example, say you are running low on toilet paper, and need an urgent top up, you can press the button to place […]

mdm

Office 365 | Mobile Device Management

September 2, 2015

Jack Jones Almost all of us have mobile devices, and many store corporate data in some way – commonly an email account at the very least. Bring Your Own Device (BYOD) is a growing concern for business owners as it can pose a security risk to the protection of corporate data. The same personal device […]

New Google Rules On Responsive Websites

September 2, 2015

Ciaran Kenny Google’s getting tough about mobile friendly websites. Do you need to care? As of April 21st Google has started to penalise websites that are not mobile friendly, but what does this mean in practice? Well we all know that more and more browsing comes from Smart Phones and Tablets rather than traditional desktop […]

outlook

De-Clutter Your Inbox

September 2, 2015

De-Clutter Your Inbox Geoff Courts We got a call from a client querying an email they had received which sounded a lot like spam. ‘It asked me to tidy my inbox, then a folder appeared’. “Oh dear” I thought (or words to that effect—”Don’t ####ing open it then!”). Turns out it was legit; Microsoft have […]

Quick Tip | Separate Taskbar Icons

September 2, 2015

Quick Tip | Separate Taskbar Icons Jack Jones If you don’t like the stacked view that Windows 7/8 Offers by default, here’s how to change it. Right click on your taskbar and choose Properties. Under the Taskbar Appearance Header, change the Taskbar Buttons option to “Never Combine” or “Combine when taskbar is full” Untick “Lock […]

logos large

We Are. Are You? Would You Like To Be?

September 2, 2015

Ciaran Kenny It has taken a bit of work to get there but I’m delighted to announce that Macnamara is now certified as compliant with both the UK Government Cyber Essentials and IASME (Information Assurance for SMEs) Information Security Standards. The next step for us, is take the necessary external audits to move up to […]

t1000

The Next Wave Of 3D Printing

April 2, 2015

Geoff Courts 3D Printing has been around now for a bit; we even tried it ourselves back in March 2014 via one of the other tenants in our building. But a company called Carbon3D has developed a new method that could revolutionise manufacturing. 2D as 3D Current 3D Printing isn’t actually quite as the name […]

heartbeat

The Only Way To Log In Is With Your Heartbeat

April 2, 2015

Yousaf Saeed You all may be thinking ‘what on earth is he talking about?’ I don’t blame you. At first I was thinking the same thing. In this short article I am going to tell you about a bracelet that a small firm in Canada known as Bionym has invented which logs you into your […]

Outlook-13

Quick Tip | Outlook Favourites

April 2, 2015

Geoff Courts If like me you have lots of Outlook folders, and possibly several connected mailboxes, you might struggle to keep track. Luckily there is help. If you right click any folder and choose ‘Add To Favourites’ it will appear at the top. It a great if you are having conversations with key suppliers, or […]

password

Password Protect Yourself

April 2, 2015

Jude Brown One of the most basic IT security requirements is a strong password which can help stop people getting into your account. A complex password is used to take the ease out of hacking an account by setting the password into mixture of capital and lower case letters, numbers and symbols to stop people […]

Spare Me The Apple Watch

April 2, 2015

Ciaran Kenny I remember when I was at university a wise old professor (much younger than I am now but who we dismissed as a doddering old fool) predicted that the day would come when computer chips would be printed as easily and cheaply as text on paper: they would, he said, approach zero production […]

mstsc

Transferring Files In Remote Desktop

April 2, 2015

Geoff Courts Not all of you will have used remote desktop, but if you are a home or ‘remote’ worker, or possibly an office worker that uses software hosted on a remote server, chances are you have come across it at some point. Every now and then you might want to move a file between […]

firewall

What is a Firewall?

April 2, 2015

Geoff Courts You will have come across the term, I am sure, and probably have a vague idea of what it means. A Firewall is part of the computer or network security system that restricts traffic based on a set of rules. These rules determine what types of traffic are and are not allowed through. […]

Quick Tip (And A Good Practical Joke)

April 2, 2015

Yousaf Saeed We’ve all at one time or another accidentally leaned on our keyboard and pressed a random combination of keys that has caused weird hidden punctuation icons to appear, or caused our mouse to do funny things when clicked. One combination that coincidentally came up a few times recently is a caller reporting their […]

kali

The Year Of IT (in)Security | What Is Penetration Testing?

April 2, 2015

Ciaran Kenny Penetration testing is traditionally the way businesses have sought reassurance as to the security of their network. The way it works is you hire a team (or even just one) of White Hat hackers and they throw against your network exactly the same tools and exploits that the Black Hats (bad guys) use. […]

spam

Watch Out, Spam’s About

April 2, 2015

Jack Jones Spam email isn’t a new trend. The first spam message was sent on 3rd May 1978. A marketer working for a technology company – DEC (Digital Equipment Corporation) – decided to advertise a new computer to a group of ARPANET (the early Internet) users – around 600 people. Today there are upwards of […]

telescreen

Too Smart TV

March 10, 2015

Geoff Courts User’s of Samsung’s new SmartTV have raised concerns over the privacy policy of using the devices, which seems to suggest that they should not discuss sensitive topics of conversation in their living room while the device is plugged in. [The Guardian, 9 Feb 2015]. The warning has of course been likened to the […]

toaster

Smart Technology | Does Anybody Want Any Toast?

March 10, 2015

Geoff Courts Smart TV? What’s next? Talking Toasters? Remember that episode from Red Dwarf? Apart from being very funny, it’s also a good light hearted warning about ‘smart technology’ and how something that starts out as a benign and useful robotic idea can turn against it’s human creators in unexpected ways. Recent developments in ‘Artificial […]

personalise

PC Experience | Personalise IT

March 10, 2015

Jude Brown The general look and appearance of your PC can get a little boring, and the majority of the time you don’t pay attention to the icons and background of your desktop, but anyone using Windows 7 and above can personalize your desktop to feel more familiar. Last month Geoff introduced the way to […]

appstore

Apple Watch | New Apps?

March 10, 2015

Geoff Courts The hotly anticipated Apple Watch is due out this year as the latest (and greatest?) addition to the wearable technology market. But as with all gadgets like this, it’s not the device itself that is going to make it a winner, but the apps that you install that make it into something really […]

Quick Tip | Editing Multiple Items

March 10, 2015

Jude Brown The fastest way to edit/delete multiple items is to hold down CTRL while dragging across multiple items or selecting them individually. You can delete, cut, copy etc. all at the same time. Also, CTRL+Delete will delete the whole word not just one letter at a time.   Tweet

Yousaf Mac

My First Week at Macnamara ICT Ltd as a Support Desk Analyst

March 10, 2015

Those of you that are clients will perhaps have heard a few new voices recently. After taking Jude on in Technical Pre-Sales last year (and admittedly one or two other false starts) we’re happy to welcome the latest member of the team, Yousaf Saeed. Apart from dabbling in kick boxing and as a night club […]

matric

The Year of IT (in)Security | Part 3: Who Are The Hackers?

March 10, 2015

Ciaran Kenny Have you ever wondered about hackers? Should we be worrying about teenagers who don’t like daylight, or Trinity in The Matrix (and by the way, Trinity’s exploit in The Matrix was a rare example of a real hacking exploit being executed line by line in a Hollywood film), or maybe it is foreign […]

her

Meet Cortana

March 10, 2015

Jack Jones You may have guessed from previous issues that I’m quite a Windows Phone supporter and guess what, something else to add to the Windows Phone Armoury hit my device this week. I realise that many of these features aren’t new, and this isn’t intended as a comparison against Siri, just a sharing of […]

charging

Quick Tip | Fast Charge

March 10, 2015

Ciaran Kenny If you need to charge your phone in a hurry put it into flight mode while charging and you will get a full charge in less than an hour (I know you might miss some crucial emails during that hour but the break is worth it). It also works to prolong the time […]

goovsmic

Rumblings Of War

March 10, 2015

Ciaran Kenny OK, maybe not war but certainly a dangerous skirmish going on. Twice in a row now (December and January) Google has published (on its Google Security Research Page) details of critical security flaws in Windows 7 and 8.1. According to Google, the details were only published 90 days after Microsoft had been informed […]

encryption

The End Of Cryptography? Not Likely

February 16, 2015

Geoff Courts In the furore following the recent Paris terror attacks, David Cameron waded once again into the area of communications, vowing to put forward new laws to allow the security services to read encrypted communications. The announcement was met with some incredulity amongst IT professionals, not to mention free speech and privacy advocates (we’ll […]

whatsapp

What’s App With That?

February 16, 2015

Geoff Courts Encryption is everywhere. Any time you log into a secure site (one that starts HTTPS or has a padlock in the address bar) you are using it, and rightly so. Without it, you would be sending your login details in plain text. Intercepting internet traffic is pretty easy, and it would mean that […]

Office Moves | Do It Right

February 16, 2015

Geoff Courts Every business will at some point undergo a change of premises or the setting up of a new one. This is often a stressful process, and involves a huge amount of pre-planning and organisation. While your IT Support provider won’t (and probably shouldn’t) be too involved in choosing the furniture, they can (and […]

bes

Why Managed Print?

February 16, 2015

Dave Hughes A lot of companies are now taking up managed print services, and it’s not difficult to see why. With the opportunity to reduce your document production by up to 20% and have a positive impact on the environment by reducing your waste, you’re effectively getting paid to ‘do your bit’. Most organisations find […]

blowup

Plug and Play—or Switch Off And Destroy

February 16, 2015

Jack Jones This article is partly a “Tale from the Service Desk” and partly a piece of advice, but I’d like to share a story which is rather relevant in this cold weather. One of our clients recently had a bit of a disaster on their hands after using an electric heater in the office […]

translate

Google Translate | Instant Fluent

February 16, 2015

Jude Brown One of the new ‘big things’ in tech I’ve noticed recently is the updated Google Translate app that came out on 14th Jan 2015, which can be used as a real-time interpreter of different languages. 90 of them, in fact. Why learn French or German when you can just speak into your phone […]

The Year of IT (in)Security | Part 2: Defence

February 16, 2015

Ciaran Kenny So, if the Sony Corporation can’t keep the bad guys out, if JP Morgan managed to expose over 80 million account details to hackers and target.com managed to leave its customers’ credit card details available to intruders for a couple of weeks, really what is a small business to do? If even the […]

Windows-8.1-Logo

Quick Tip | Customise Your Start Menu in Windows 8.1

February 16, 2015

Geoff Courts Windows 8 still gets a bad press, but I don’t believe it’s as bad as all that. In fact I rather like it, and have always felt that the nay-sayers just don’t really understand what you can do to make it work for you. A lot of the fall out came from the […]

Why Would You Want A Virtual Machine?

February 16, 2015

Ciaran Kenny Surely real machines are much better. Well, in the wonderful world of IT actually virtual can be a lot better than the real thing. Server hardware has now advanced so far beyond the demands of most businesses that a standard server operating system uses only a fraction of their capacity: just like that […]

topic_net-neutrality

Net Neutrality | Equal Access For All

January 6, 2015

Geoff Courts US President Obama recently brought to the spotlight an issue that has been at the heart of the ‘Open Internet’ since it’s inception. Net Neutrality is the principle “that Internet service providers and governments should treat all data on the Internet equally, not discriminating or charging differentially by user, content, site, platform, application, […]

utilities

The Internet and The Web

January 6, 2015

Geoff Courts The terms are often used interchangeably, but they are actually two distinct things. The Internet is the physical infrastructure or cables, routers, servers, and other devices, all interconnected. They use the common language of TCP/IP to transmit packets of data. The Web is the system of hypertext linked documents that are accessed via […]

4G Coverage is limited to certain areas of central London, but more postcodes are added every month

4G Fast Broadband Next Day

January 6, 2015

Jude Brown So most of you should know what 3G is, and probably use it day to day to surf the internet on your mobiles, but not all would have used 4G day to day. 4G has been discussed in previous newsletters by Ciaran and Geoff (January ’14 & August ’14), and this time I […]

aircon hat

Victorian Wearable Technology

January 6, 2015

Geoff Courts Our last issue of 2014 had a short piece on Wearable Technology and looked at some of the pending designs like the Apple Watch. But wearable tech is not new. The Victorians were keen inventors and were known for some fairly awesome technology such as the paddle steamer (Isambard Kingdom Brunel), steel (Henry […]

kim

The Year of IT (in)Security | Part 1: The Enemy

January 6, 2015

Ciaran Kenny For anyone with even a passing interest in IT security, 2014 came to a fascinating end: what with the Sony hack escalating to become an issue of US national security, a reassessment of where the Stuxnet worm might have originated (hint: it seemed to focus on ‘enemies’ of the US), and the discovery […]

smash

Managed Print

January 6, 2015

Jack Jones I find printers rather annoying– when they stop working, they rarely give us good reason. Like a sick pet, something’s wrong, but they can’t say what. Depending on your volume of printing, you may be spending hundreds (yearly, possibly even thousands?) of pounds on paper, ink and printer servicing. You try to print […]

mobile

Quick Tip | Mobile Shortcuts

January 6, 2015

Geoff Courts Typing on a mobile phone can be annoying. Really annoying, especially if you want to go fast and autocorrect changes what you meant to say into something that might cause the person you’re messaging to call the Police or social services. So, to save time and aggravation all round, you can create short […]

cyberstreetwise

Cyber Streetwise

January 6, 2015

Geoff Courts Cyber security is something that, by now, you will have realised we keep harping on about. The UK government has a standard known as ISO27001 for Information Security Management, and achieving it means that you know you have a secure system. The cost of getting it can be quite high for a small […]

logo xmas

2014 | That Was The Year That Was

December 2, 2014

Ciaran Kenny Great, another year down and, as ever at this time, it is irresistible to think back over the last twelve months and consider how we have done. And, having done that, admit that we didn’t do quite as well as we hoped and get stuck into those New Year’s Resolutions. So how was […]

roads sm

Back To The Future

December 2, 2014

Geoff Courts I won’t start by saying ‘remember the film…?’ – of course you remember it. Next year, October 26th 2015 to be precise, is the date that Marty and Doc travelled to in the future. In 1985, the sci-fi classic imagines all sorts of fanciful—and not so fanciful—technological leaps we could look forward to. […]

windows_10_0

Windows 10 | Sneak Preview

December 2, 2014

Jack Jones This month, I got my hands on Microsoft’s technical preview (an early release in-development version for techies to play with and test) of Windows 10, their latest desktop operating system. “Where’s Windows 9?” I hear you say. Some say that Microsoft saw this release as such an advance from 8.1 that it deserved […]

Worldwide availability of YouTube dropped from 100% to 0% for over an hour during the incident

How To Take The Web Offline

December 2, 2014

Geoff Courts [Header image:Worldwide availability of YouTube dropped from 100% to 0% for over an hour during the incident] When, back in 2008, the government in Pakistan directed the state owned telecoms company to block YouTube, the engineer assigned to the task made a small mistake. Rather than blocking the site, he instead advertised to […]

powerbi2

Small Business, Big Data

December 2, 2014

Ciaran Kenny I think most people have heard about Big Data by now and wondered whether they should worry about it. Just in case you’re not sure, it is through the power of Big Data that supermarkets make such astounding discoveries as the Friday evening spike in nappy and beer sales – on the same […]

Wearable-tech1

Wearable Technology

December 2, 2014

Jude Brown Apple, Sony, and Microsoft have always been front-runners in technology, but could you imagine them teaming up with Ralph Lauren, Gucci or Luis Vuitton? Not just yet, but it may be something we will see in the future. Any fans of the BBCs ‘The Apprentice’ would have cringed at the idea of the […]

greenpadlock

Where’s That Green Padlock Gone?

December 2, 2014

Ciaran Kenny Even though cryptography is all around us it is very rare that it intrudes on our consciousness. This month though Google took the interesting decision to stop showing sites as secure when they are using the outmoded SHA-1 standard. So how does this impact on you? If you are using Google Chrome you […]

word-2013-logo

Quick Tip | Word Headers

December 2, 2014

Geoff Courts Have you noticed in Word at the top, there are some pre-formatted text styles? These aren’t just shortcuts to help you make your document look pretty (or look Microsoft, if you take a dim view), but actually form the basis for making your work navigation friendly. If you go to the View tab, […]

cctv

CCTV Killed The Network

December 2, 2014

Jack Jones I bring you an interesting story from our service desk this month where we found a basic CCTV system (4 cameras and a recorder box) that brought an entire network to its knees. It was an interesting one (in a “Geeky” sense) and the story went a little something like this… Stage 1: […]

pingit

Will you Paym by Cash, Card or Pingit?

November 27, 2014

Sarah Rench Since 2012, Barclays have offered a service called Pingit which allows users to make payments straight from one mobile user to another. In April 2014, Paym, pronounced Pay ‘Em’, launched its services to enable mobile payments for other banking institutions. Paym is run by the Payments Council, an industry body that expects ‘one […]

vpn

VPN | Securing Your Public Internet Connections

November 6, 2014

Geoff Courts You may have heard of a VPN, or maybe not. If you have, you probably use it for work to connect to your office to access files when you are out if you don’t have remote desktop access. They can also be used to bypass restrictions on accessing specific websites or web content, […]

octopus

Public Wifi Concerns

November 6, 2014

Geoff Courts I read a very interesting, but rather worrying, article recently on the website medium.com by a Dutch journalist. He was interviewing a hacker (one of the good kind) who demonstrated how easy it was to intercept all the internet activity of everyone sharing the public Wifi connection in the coffee shop they were […]

microsoftdynamicscrm

CRM | A User Experience

November 6, 2014

Jude Brown Microsoft Dynamics CRM, (Customer Relations Management) is software used for marketing and sales at Macnamara and is a product I personally depend on to do 99% of my day to day work. Ciaran introduced CRM in a previous newsletter (January 2014), but I wanted to touch back and give an explanation of how […]

ISO27001

Do We Have Time For Standards?

November 6, 2014

Ciaran Kenny For most of us there aren’t enough hours in the day to deal with the endless demands of running our operations, whether we’re running a business, a charity, an arts organisation, or any other type of enterprise. There just isn’t enough time for standards. Don’t worry I haven’t joined UKIP and I’m not […]

10 steps edit

10 Steps To Cyber Security 10 | User Education And Awareness

November 6, 2014

Geoff Courts In the 10th and final part of this series looking at the GHCQ recommendations, we look at an aspect of security that has been mentioned in every other section, and that is the role of People. All systems are there to be used, but while systems can be programmed using rules, people are […]

admin

Admin Rights | Too Much Control

November 6, 2014

Jack Jones Administrator rights on a computer allow you to change anything in the machines configuration and to access, and delete, system files that are crucial for it to operate correctly. Many of you will be administrators on your home PC but you should not have these rights in the office. All user accounts at […]

wifi1

Quick Tip | Wireless Hotspot

November 6, 2014

Geoff Courts Mobile internet access is something that we all need, and take for granted on our mobile devices. But what about when you are using your laptop and don’t have access to a public Wifi connection? A 3G/4G dongle would be one way to solve that, but why carry around extra hardware (and pay […]

Four-rotor German Enigma cypher machine, 1939-1945.

Top Secret | For Your Eyes Only (Probably)

November 6, 2014

Ciaran Kenny Did you use secret codes as a child? It may be a generational thing but I remember secret alphabets were very popular when I was at school. Our fool proof secret method involved writing out the alphabet from A – Z and then beneath that a jumbled up version of the alphabet and […]

01

What is a VPN and how to set it up in Windows 7

November 5, 2014

VPN stands for Virtual Private Network, and is a way of connecting to your company network directly. It’s called a virtual private network because you don’t actually have a direct physical connection to the network, but you log on to it over the internet. Sometimes it can be referred to as a VPN tunnel, which […]

ios8

Apple’s iOS8 Update

October 8, 2014

Jude Brown So nearly a week and a half after the release of the iOS 8.0 update, I have finally decided to download it. The update that everyone on twitter is blagging on about. If you’re like me, and quite laid back with your mobile phone you probably wouldn’t have downloaded it on the release […]

iphoen wave

Why Charging Your Phone in a Microwave Won’t Work

October 8, 2014

Geoff Courts So, Apple released another OS along with their latest iPhone so the rest of us won’t feel left out. That was jolly nice of them. As I’ve stated previously, I’m no Apple fanboy, but I do like the iPhone. I can’t resist a slight chuckle though when I read about how some people […]

OOO

Out Of Office, Out Of Mind

October 8, 2014

Ciaran Kenny I wonder if the automated out of office reply is really any use these days. Does everybody really need to know that you’re on holiday or, as it is uniquely called in out of office replies, “annual leave”? Anyone who really needs to have access to their email will have access to their […]

zip2

User Awareness Required

October 8, 2014

Geoff Courts You will see on our back page another report of a Cryptolocker variant infection we were faced with on one of our supported machines. Ciaran on the next page talks about whether it’s right to trust your IT Support provider with the security of your network. It might seem odd for an IT […]

My Experience of an ICT Apprenticeship

October 8, 2014

Our newest member of the team Jude Brown writes of his experiences of the first few weeks of his apprenticeship at Macnamara, and why he chose that over some of the other choices available: Before joining Macnamara I had two choices. Go to university and study for 3 years where I would end up with […]

10 steps edit

10 Steps To Cyber Security 9 | Incident Management

October 8, 2014

All organisations will experience an information security incident at some point. Investment in establishing effective management policies and processes will help to improve resilience, support business continuity, improve customer and stakeholder confidence and reduce any financial impact Geoff Courts Our penultimate installment in the series looks at Incident Management, and given that every organisation will […]

Thinking About Security

October 8, 2014

Ciaran Kenny As you know we have been running a series about IT security for several months now. Everyone agrees that security is a good idea. But, as business managers/owners, just where do you start when it comes to security? You might take the view that your IT support company has a grip on this. […]

word-2013-logo

Quick Tip | Format Paste

October 8, 2014

When pasting text into Outlook or Word, you can choose how you want the pasted text to be displayed. This is especially helpful if you are pasting content from a web page or from another document which has radically different formatting. Keep Source Formatting If you are copying from a location and want to keep […]

lockedfolder

Cryptolocker | Don’t Panic!

October 8, 2014

Jack Jones This month on the service desk here at Macnamara, we had an encounter with some malware that worked very much like CryptoLocker at a client. It was one of the many versions that has come out of the original CryptoLocker but this one had no popup or warning. In fact, it was a […]

brewsters bitcoins

Bitcoin Challenge

September 30, 2014

Geoff Courts Remember the 1985 film Brewsters Millions? Richard Pryor’s character inherits $300million dollars, but there’s a catch; he has to spend $30million in 30 days with nothing to show for it at the end, a task that he soon finds is much harder than it seems. Well, we thought it would be a cool […]

onedrive

An Exploration of OneDrive for Business

September 30, 2014

Geoff Courts We like Office 365, in case you hadn’t noticed. It’s a really useful place to host and manage email, but that’s just one of a range of services included in many of the most commonly used licenses. This month, I’m going to examine OneDrive in a little more detail. Document Storage SharePoint has […]

What is this Monster called Cryptolocker and should you be scared?

September 30, 2014

Ciaran Kenny I have to admit, Cryptolocker and its variants is a very clever bit of malicious coding. I can’t help but have some degree of admiration for the criminal mastermind(s) who came up with this. I’m sure you have heard about it but, just in case: Cryptolocker is no more than a tiny little […]

403709-cryptolocker-threat

Not invincible after all!

September 30, 2014

Ciaran Kenny In a fair fight: your data versus Cryptolocker, Cryptolocker’s going to win. Once it’s got your data you’re not getting it back unless you pay. But, we don’t have to play fair with Cryptolocker and, thankfully, an alliance of security firms and law enforcement agencies have managed to hijack the hijackers and grab […]

The internet, like a spiders web,  allows many possible routes between  different points

The Day The Internet Broke

September 30, 2014

Geoff Courts We are sometimes amused when we receive a report that ‘the internet isn’t working’. Of course the internet is working, I’m using it right now. In most cases, it’s far more likely that your PC has lost it’s connection than the entire web has fallen apart, but in fact something similar did happen […]

10 steps edit

10 Steps To Cyber Security 8 | Home And Mobile Working

September 30, 2014

Geoff Courts Our 8th installment looks at the risks around the rising phenomena of remote and mobile working. It would helpful to first make the distinction clear; mobile working relates to use of mobile devices such as smart phones and tablets, while remote working relates to the use of devices (commonly home PCs or laptops) […]

win phone

Hands On with Windows Phone 8.1

September 30, 2014

Jack Jones If you use a Windows Phone, like myself, you may have been eagerly awaiting the next, major update to the Windows Phone platform – Windows Phone 8.1. Well guess what, this week, my phone gave me the notification that the update was ready. The release is staggered to customers at different times across […]

Quick Tip | Resizing Images

September 30, 2014

Jack Jones This issue’s quick tip involves installing a very small piece of software, which is free and was highlighted to us by one of our clients – a great find. Image Resizer for Windows allows you to right click on any image file and resize that to a selection of pre-set sizes (half size, […]

badusb

BadUSB | Worse Than You Thought

September 30, 2014

Geoff Courts In August, two computer security researchers from SR Labs gave a presentation about a newly discovered fundamental flaw in the way USB devices work, and one that will change the way we see them forever. We all by now know the risks of using USB sticks on a computer infected with malicious software […]

erase

The Right To Be Forgotten

August 14, 2014

Geoff Courts On the 13th May 2014 the European Court Of Justice found that search engines must now process requests from the public to remove pages from their search results where they feel the information is inaccurate, irrelevant, or excessive’. The new ruling isn’t actually a new law, but a clarification of the 1995 Data […]

raid bug

What Is A RAID?

August 11, 2014

Patrick Cairnes If you have ever ordered a new Server, one of the items in the configuration you should have seen is the RAID (it’s not bug spray). In short, this is where multiple hard disks (the bit where all the data is stored) are used to either improve performance (by writing different bits of […]

search

Improve Your Google Search

August 11, 2014

Jack Jones There are a few simple tricks which aren’t widely known, which enable you to get the most from your Google search. Display results containing every part of your search Using the ‘+’ symbol, tells Google to display results that contain every term which follows a “+” symbol. For example; Searching for ‘office 365’ […]

10 steps edit

10 Steps To Cyber Security 7 | Malware Protection

August 11, 2014

Geoff Courts The 7th instalment in the series of GCHQ recommendations looks at the impact of Malware. Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems—Wikipedia What Is The Risk? Disruption to businesses services, export of sensitive information, or legal or […]

squeeze

So Slow In The City

August 11, 2014

Ciaran Kenny ADSL (Asynchronous Digital Subscriber Line) has been a great technology (remember dial up?) but it is getting a little tired. In these days of cloud computing good Internet connectivity has moved from being important for business to be being critically important. Nonetheless, it seems odd especially in Central London that businesses should be […]

ieheader

Quick Tip | Multiple Home Pages

August 11, 2014

Jack Jones Having your own homepage for Internet Explorer (or any browser) is useful to load up your favourite or most used page. However, what if you have more than one or you can’t choose a favourite? Set multiple homepages! For me, the pages I want to open up straight away are our ticketing system, […]

Double Modem! 56Mbps twice!

A Real Alternative to ADSL

August 11, 2014

Ciaran Kenny Up until a few years ago it was consistently the case that people experienced much better technology at work than they had at home; but they weren’t usually allowed to play games on the office PC. These days most people have half a dozen much cooler devices lying around at home than they […]

byod

Bring Your Own Device | Privacy Concerns

July 1, 2014

Geoff Courts Bring Your Own Device (or BYOD because everything important needs an acronym) is the current trend to towards employees using their own personal devices (which includes phones, tablets, laptops, and even home PCs for remote workers) to access their company data. BYOD is not a new phenomenon as such, merely that the prevalence […]

stolen

Stolen Laptop | Taken, Tracked, Returned

July 1, 2014

Jack Jones One of our clients reported one of their laptops, under our management, stolen from their house and asked if there was anything that we could do to help. A simple alert on our system notifying us when the laptop came online was the first step. Sure enough within a few days, the laptop […]

mobile

Which Mobile?

July 1, 2014

With so many to choose from, all ostensibly able to do the same thing, choosing one over the other is really a matter of preference. Here we briefly explain ours. Ciaran | Why I Love My Windows Phone 8 Note, I don’t say, “Why I Love my Nokia Lumia 920 (or whatever the model number […]