Are you letting future custom walk out of the door?

Posted by: Mark Northall | | No Comments »

Clients and Customers now expect to log on to free, good quality and fast WiFi when they enter Retail or Office locations. If you’re not providing this free WiFi, your competitors are. Customers are also willing to swap their contact details for the use of your free Internet facilities and you can use this valuable information to proactively market to them.

MBM's WiFi solution

MBM has a WiFi solution that will enable you to provide a quality service to your customers and allow you to collect data that would otherwise literally walk out of the door! MBM Technical Director Jason Timmins explains how ProWifi came about.

 

“We’ve been supplying high quality managed WiFi to hotels and businesses for years, but we noticed that smaller venues also offer WiFi and that this WiFi is often really poor quality. Almost every café, restaurant, bar and pub we visited had WiFi set up like you’d have at home. Connecting involved simply being given a WiFi code. WiFi like this gives nothing back to the venue owner as no customer data is capture. It’s also insecure as customers could see and hack each other. There’s also no control over the type of content that can be viewed and one user could consume the entire Internet connection.

 

We created ProWiFi to address this situation. Now, small venues can buy a WiFi solution online which connects to their existing Internet router and is preconfigured straight out-of-the-box. The venue owner simply screws the WiFi box to the wall and plugs it in, providing the venue with a simple but affordable managed WiFi solution. Customer data is easily captured and automatically added to a marketing mailing list. Users are protected so they cannot see each other’s data and access. Websites are filtered and blocked to prevent unsuitable sites being accessed in public areas. Usage limits are set to ensure that no one user ruins the WiFi service for other simultaneous users. It’s a major step forward!

 

At MBM we strongly feel that WiFi is particularly important to small venues. Cafés, for example, need good quality WiFi to draw in business customers. Restaurants need safe WiFi to amuse bored kids. And bars need reliable WiFi so people can ‘check-in’ and update their social media.”

 

Businesses interested in finding out more can visit www.ProWiFi.co.uk or contact the MBM Sales team on 01902 324494

Posted in: Cloud
tagged with: , , , ,

MBM Ltd – Microsoft Silver Partners – Press Release

Posted by: Mark Northall | | No Comments »

A Wombourne-based Business is celebrating achieving Microsoft Silver Partner Status. MBM Limited specialise in IT support and services for companies in the West Midlands area and offer complete Disaster Recovery and Cloud Computing Solutions.

 

IMG_0747The attainment of Silver Partner Status recognises partners and developers who integrate unique applications and solutions into various products across the Microsoft platform. It highlights companies with a high training ethic who work towards developing solutions to client problems using available technologies.

 

MBM Technical Director Jason Timmins commented ‘We’re delighted to have achieved this Silver Microsoft Competency which puts us in the top 5% of Microsoft partners worldwide and shows our ongoing commitment to high quality cloud services for business.

 

The use of cloud services continues to rise, whether in the smallest SME or the largest corporation you’ll find cloud services taking care of Email, CRM, data storage and computing resources. Our new accreditation confirms our commitment, experience and skill with Microsoft’s world-leading cloud services, Office 365 and Azure.

 

Thanks go to my team at MBM for their excellent customer service and product knowledge without which Microsoft would not have given us this recognition.’

 

MBM Limited are based on Windmill Bank in Wombourne and can be contacted on 01902 324494 or by visiting www.mbmltd.co.uk

Posted in: Testimonial
tagged with: ,

What might be included in the next Microsoft Exchange Server?

Posted by: Mark Northall | | No Comments »

For the Technology minded amongst you we have been looking at what might be included in Microsoft Exchange server 2016.

According to technology website InfoWorld ‘ We don’t know much about what will be in Exchange Server 2016 — Microsoft has provided very few details. It has said that the new features in the on-premises Exchange were “birthed” in Exchange Online, so Exchange Server 2016 will be a subset of the service.

NIgel_Mills_MBMMicrosoft did say back-end improvements to “Exchange architecture, high availability, and storage” are part of the Exchange Server 2016 mix. So too is enhanced document collaboration (perhaps involving SharePoint 2016 or OneDrive for Business) with a “new approach to document collaboration that makes it easy to send links and collaborate without versioning issues of attachments.”

Personally, I can’t get the hang of Microsoft’s current document collaboration approach when working in Office 365 or OWA, so I usually send the full attachment instead of a link to my OneDrive document.

Tony Redmond, an Exchange MVP, suspects the new document collaboration approach might still feel unnatural: “This is a laudable goal, but one that might run into the fact that it is terribly hard for users to break the habit of a lifetime and stop including full attachments with messages.” I’m one of those users, apparently.

Microsoft also promises search-related improvements in Exchange Server 2016, such as for e-discovery search performance and reliability. It appears they’ll be based on the improvements already made for search in Office 365 or the search improvements promised for Outlook 2016 based on the integration of the Fast search technology Microsoft acquired some years ago and already uses in Exchange and SharePoint.

Second guessing Microsoft can be interesting – feel free to add your thoughts.

Posted in: Tip
tagged with: , , , ,

Wi-fi In-flight a threat warns report

Posted by: Mark Northall | | No Comments »

Technology News – The Guardian warns of possible security breech with the introduction of in-flight internet

Hackers on commercial flights could now bring down the plane they are on by using the on board Wi-Fi, a US government watchdog has warned.

wifi Coffee CupThe US Government Accountability Office (GAO) does not suggest it would be easy to do but it points out that as airlines and the Federal Aviation Administration attempt to modernise planes and flight tracking with internet-based technology, attackers have a new vulnerability they could exploit.

The GAO says: “Modern aircraft are increasingly connected to the internet. This interconnectedness can potentially provide unauthorized remote access to aircraft avionics systems.”

The report highlights the fact that cockpit electronics are indirectly connected to the passenger cabin through shared IP networks. The connection between passenger-accessible systems and the avionics of the plane is heavily moderated by firewalls, but information security experts have pointed out that firewalls, like all software, can never be assumed to be totally infallible.

“Four cybersecurity experts with whom we spoke discussed firewall vulnerabilities, and all four said that because firewalls are software components, they could be hacked like any other software and circumvented,” explains the office.

“According to cybersecurity experts we interviewed, internet connectivity in the cabin should be considered a direct link between the aircraft and the outside world, which includes potential malicious actors,” the report adds.

The Federal Aviation Administration does not currently verify the cybersecurity of a new airliner before certifying it for scope, although it “currently issues rules with limited scope, called Special Conditions, to aircraft manufacturers when aircraft employ new technologies where IP interconnectivity could present cybersecurity risks”.
Advertisement

The report praises the FAA for the steps it has taken to get its cybersecurity policies in order, but says that “opportunity exists for further action”, and particularly highlights as a cause for concern the fact that cybersecurity responsibility is split over multiple FAA offices.

A worst case scenario is that a terrorist with a laptop would sit among the passengers and take control of the airplane using its passenger Wi-Fi, said Rep. Peter DeFazio, an Oregon Democrat on the House Transportation and Infrastructure Committee who requested the investigation.

“That’s a serious vulnerability, and FAA should work quickly” to fix the problem, DeFazio said.

slidethreeThe GAO released a separate report last March that determined the FAA’s system for guiding planes and other aircraft also was at “increased and unnecessary risk” of being hacked.

One area of weakness is the ability to prevent and detect unauthorised access to the vast network of computer and communications systems the FAA uses to process and track flights around the world, the report said. The FAA relies on more than 100 of these air traffic systems to direct planes.

In January 2015, the GAO praised the FAA for taking steps to protect air-traffic controllers, but warned that “significant security control weaknesses remain that threaten the [FAA’s] ability to ensure the safe and uninterrupted operation of the national airspace system”.

Posted in: Cloud
tagged with: , , , , , ,

Who can be trusted with your data?

Posted by: Mark Northall | | No Comments »

Think about a day without computers or tablets, whether for personal or business use – could you cope – how would you feel?
So what do you do when your computer system fails? Who are you trusting at the moment with all the information on your computer?
logo_RGB_squareYou could Google your options and find there are thousands of choices, including real companies or web-based organisations.
This is when it could get tricky as many web-only computer repair concerns have very impressive websites and offer rock-bottom prices. The problem is, you have no way of knowing where these companies are operating, who the people are behind the scenes and what kind of things they may be doing to your systems in the background but the premier concern is can you trust them with your company’s data?
Most remote software allows the third party access to do things you cannot see. Some may advertise you can watch everything the technician is doing unfortunately this is not always the case – would you give complete strangers your passwords or your wallet?? . Although there will be companies that are legitimate, they often use remote technicians operating out of their home locally and this could be situated anywhere typically in a third-world country call centre.
What precautions should you take?
• Research the business. Take advice from satisfied clients. Whilst there are some repairs that can be done remotely, making location not as important as ratings, complaints and reviews. Search out testimonials on their website. If they’re all written in a similar style, it’s possible they’re not as genuine as they make out.
• Contact the business. Call the business to test how responsive they are. If the business does not answer the first time, do they call back within a reasonable amount of time? Are the calls or emails handled professionally? Avoid doing business with companies that don’t respond in a timely fashion; it could be a sign of how queries are handled as well. Good customer service is endemic in an organisation.
• Check the website. Does the company’s website represent its business well? If the website is poorly organized maybe even on a self-build platform, it may be a sign to take your business elsewhere.
• There is the old adage about paying peanuts don’t always go for the cheapest price. When it comes to computers, you want the job done correctly the first time. Businesses with more experience and expertise may charge more for their services, but it should ensure that you get quality service. Remember, if it sounds too good to be true, it usually is. NIgel_Mills_MBMCompanies that seem to offer the lowest price might not be the best deal for you.
Just one parting thought your computers and your systems in effect ARE your business. Look after them and you will never have to worry about not being able to access your data. Paying cheaply can lead to paying twice. Never has there been a better example of getting what you pay for.

Posted in: Cloud, Office, Online Backup
tagged with: , , , , , ,

Uk SMEs facing an unprecedented level of attempted online fraud

Posted by: Mark Northall | | No Comments »

According to experts at smallbusiness.co.uk the Uk is experiencing an unprecedented level of attempted online fraud this month – the reason is a simple one as the article explains
slidetwoData from payment processing company Worldpay suggests instances of fraud could rocket by as much as 80 per cent in February as hackers start to capitalise on customer data harvested during a hectic Christmas shopping period.
Tim Lansdale, head of payment security at Worldpay says, ‘We see a dip in fraud around Christmas as hackers go on the hunt for information, using the online sales rush to stockpile thousands of customer card details.
‘It isn’t until February that they start cashing in on all the data they’ve collected. Other breaches can last much longer; attackers might decide to keep returning to their targets, sometimes for years.’
During 2011-2014, the average data breach exposed 284 days of card payments. Worldpay’s analysis shows breaches lasting from 11 days at the lowest end of the scale, to 1,723 days at the other extreme.
The company says small businesses are by far the biggest target for hackers, accounting for 85.7 per cent of UK data breaches. Virtually all data breaches (99.3 per cent) happened online, rather than at the point of sale, as the UK’s e-commerce market continues to boom.
SOSIn 2014, businesses in the entertainment, hobby and leisure industries accounted for 23.3 per cent of all card data breaches, followed by clothing and footwear stores (16.3 per cent) and jewellery, beauty and gifts (11.6 per cent).
Businesses in the entertainment industry, particularly online ticket booking systems, tend to make easy prey for hackers due to the high number of credit and debit card transactions they process online each day.
The clean-up costs of being targeted can run to tens of thousands of pounds, with a standard investigation costing £11,250 on average, and attracting at least a £8,000 penalty, not including the costs of lost goods and damage to reputation.
Lansdale says, ‘Data breaches can be ruinous, so its vital small business owners know the risks and take the necessary measures to protect themselves and their customers and employees.
‘You wouldn’t leave your store unlocked overnight, yet so few businesses are doing enough to protect their online shop fronts and keep hackers at bay.’
Worldpay advises taking measures such as changing all your default passwords, having a third party host your payment page, and testing your firewalls at least every three months,
NIgel_Mills_MBMSecurely destroying all card data records when no longer needed, and avoiding storing the three digits ‘CVC’ number on the back of the card, are also measures that should be observed.
At MBM we can help Small Business combat this fraud. We would love to speak to you about protecting your data.

Posted in: Tip
tagged with: , , , , , , ,

Put your IT in the cloud – not your head!

Posted by: Mark Northall | | No Comments »

There are great advantages to cloud computing services and no wonder it is becoming an easy choice for businesses: the minimal upfront costs, pay-as-you-go cost structure, flexible access to software and data, and the fact that the expensive and awkward parts of the IT setup are someone else’s burden!
Cloud services can make applications that were once the preserve of only the largest organisations, like CRM, sales management, contact centre software, call recording – available to any company, from a two-person business to a £20 million turnover organisation.
officeOne of the biggest benefits of Microsoft Office 365 is that it gives you virtually anywhere access to the Microsoft Office tools you know and rely on – your complete office in the cloud.
Some businesses are concerned about exactly how to choose the right cloud applications, how to get the best use from them, and if their data will be secure when it’s up there. To help dispel these doubts, here are the key questions you should ask a cloud service provider before committing.
logo_RGB_squareSo do you know what the cloud is? Simply put, cloud computing is computing on the internet. Rather than installing programs on a computer, for example, people can run applications directly from a website. This principle also applies to storage of data; rather than keeping folders full of important work on your own PC, it can be stored remotely online this gives you data you can access from any computer regardless of where you are
And the reason why you should be using it ?Cloud computing and storage has a huge number of benefits for small businesses – as well as being more efficient, it also gives you a little protection if the worst happens and you lose access to the files on your computer – no real need for an IT disaster recovery plan !
Cloud computing allows you to store as much or as little data as you need to, usually charging on a pay-as-you-go basis. SOSThis means that you don’t need to upgrade your own hardware, and allows you to keep saving and working without worrying about limitations. The vast number of servers involved in a cloud system also means that bandwidth requirements can be increased on demand, so you don’t have to wait around to gain more space.
Would you like to discuss Cloud Computing for your Business? Give MBM a call.

Posted in: Cloud, Office, Tip
tagged with: , , , , , , , ,

Build your List – A direct side-effect of house Wifi

Posted by: Mark Northall | | No Comments »

We’ve all been in coffee shops, pubs, restaurants, fitness clubs and other public places and tried to log on to a guest wi-fi. Do you take notice of what information you have been asked for ? Date of Birth ? Email address ? Physical address ? – all these items enable the receiving establishment to build a picture of you. The next time you login you may be asked for another piece of information – for instance anniversary or maybe occupation. The time after a different piece of information.

wifi Coffee CupAll this information can be used to build a picture of your visitors and better than that the information can enable some targeted marketing to be formulated – for instance special occasion discounts or offers for certain age groups.

By giving something (information) in exchange for something free (Wi-fi) visitors will tell you so much more than you could gain for traditional methods such as surveys or paper based application forms.

At MBM we are experts in information gathering and can manage this operation for you. Interested in finding out more ? Contact us and we will be happy to put you in contact with an Engineer – not a salesman!slidethree

Posted in: Office, Tip
tagged with: , , , , ,

The Invisible destroyer

Posted by: Mark Northall | | No Comments »

How protected do you feel in your Business ? Is everything you do being watched? How common are viruses in today’s workplace? Look at any computer in your office. You can’t see the security threats, but they’re swirling round it like a malicious cloud. They’re multiplying and getting more sophisticated all the time. If one of them gets in, it could do untold damage to your business. And the hard truth is that anti-virus software simply isn’t enough any more.

slidetwo

Many business owners assume their systems and networks are protected. But what happens when people take their work laptops out of the office? What if they open a zip file that’s pretending to be from an online marketplace ?

What if they click on a website picture that has malicious code embedded in it?

The worst viruses and malware will immobilize a computer. If it’s on your network, the problem will spread through your business. Every computer will probably need completely wiping. While that’s being done, everything grinds to a halt costing you precious man-hours.

Here at MBM we take these threats very seriously we pride ourselves on our security record and endeavour to make sure all your data is protected from attack or theft.

We can provide solutions to protect your network from unwanted threats. These solutions can be installed on local PCs and servers to monitor threat activity and quickly deal with it. The software has the ability to update itself silently over the Internet and provide a centralized server-based management console to monitor threats and provide reports. We can also provide our own mail scanning solution called InterLinx Filtered Email to filter and clean Emails before they even arrive at your desk, this is done by routing your inbound and outbound mail through our secure scanning servers on the Internet; this ensures that both you and your mail recipients are protected.MBM_42Emails_Blog_small

If you would like to find out more about what we do, then please call us to arrange a meeting. You’ll meet a network engineer, not a salesman! Call 01902 324494 or email sales@mbmltd.co.uk

Posted in: Online Backup, Tip
tagged with: , , , , , , ,

Your Clients expect WiFi

Posted by: Mark Northall | | No Comments »

We have all been to venues where there are ‘follow-us’ signs for the latest Social Media platform or offers to win the latest i-pad in exchange for your contact details. The fact is increasingly people are expecting to be able to access the internet from all kinds of places from Coffee shops to supermarkets and if you are in the entertainment business (pubs clubs hotels etc) its quite frankly a must have.

So why would you give away free WiFi ? Lots of reasons but we thought we would pull a few together in our latest blog. slidethreeWiFi allows businesses such as cafes, pubs and restaurants to attract customers which they would not have attracted in the past. From experience we all know that sitting alone in a café or bar is an awkward experience and discourages us from  sitting alone on a regular basis.In a recent poll 53% of people surveyed would be happy to sit alone in a cafe if WiFi was available. Free WiFi access helps people connect with friends online and removes the stigma of sitting alone. Using social platforms like Foursquare or Swarm may even bring their friends and connections to your venue.

WiFi networks require a registration process for new users. This process requires new users to supply basic details in order to create an account, this could include name, age, gender and email address. You could even request additional details as people login for a second time thus building a profile of your users that will allow you to better target their needs next time they attend – Birthdays are an easy one – an offer to bring 10 friends in exchange for a welcome drink or maybe a Birthday cake is good business!

wifi Coffee CupPeople base their decisions on which venue to chose on many criteria. Free WiFi is one of those criteria having the service will help differentiate your business from your competitors

Installing a WiFi Hotspot does not involve the costs that some businesses would imagine for example a business will spend a huge amount on a television subscription to play the latest football matches to attract customers yet many companies (including MBM) will supply the WiFi dish for FREE (with a small installation cost). Managing the collected  data collected can also be a daunting prospect but here at MBM for a monthly management fee of around 50p per day we will work with you to collate your data for you to use in future targeted campaigns.

logo_RGB_squareInterested ? Speak to Nigel at MBM today. You need customer WiFi and our solution doesn’t cost the earth.

 

Posted in: Cloud, Tip
tagged with: , , , , , ,