img not found!

Are you letting Business Walk out of your Door?

How often now do you check if a venue has in-house wi-fi ? From fast food outlets, Pubs, takeaways, shops and even church halls have their own in house platforms for you to login to.

Offering Wi-fi to customers of your business is highly beneficial more so in a retail or leisure/entertainment environment. Businesses can also offer guest wireless access from a private office which is ideal for contractors, visitors or associates working on-site.

wifi Coffee CupIt’s important that your business WiFi is kept separate from guest and visitor WiFi and encrypted to ensure they don’t access your wireless traffic.

Offering Free WiFi will encourage users to take your offering in exchange for their contact details.

MBM can offer you a package solution and are happy to help you implement a solution which will be a perfect fit all around.

Talk to MBM today and join thousands of businesses benefiting from this provision.

Don’t get caught out like celebrities

You’ll no doubt have seen the recent press coverage about personal photos of celebrities being accessed from their cloud storage. Whilst we hope that there aren’t any nude photos of you or your staff in the Cloud, how can you be sure that your cloud data is secure?

TabletCloud services, like so many other online services, are protected by nothing more than an email address and password. Mobile phones are inextricably linked to the Cloud services run by their manufacturers: Apple devices copy data across to iCloud, Windows devices copy to Microsoft OneDrive and so on. This data includes photos, videos, texts, address books, app data and settings. Clearly, this is very useful, but if someone guesses your password, they can have access to all of this from anywhere!

It is thought that a hacker gained access to one celebrity’s Cloud service and downloaded their address book. This then gave them the email addresses of several more high profile celebrities. Once you know a person’s email address, all you need to do is then guess their password.

How can you improve your security?

You can change the settings on your Smartphone so it does not back up to the Cloud. But as it’s a really useful feature, especially if you lose or break your phone, would you really want to disable that functionality?

You can enable a ‘two-factor authentication’ on your cloud services. This means that you need two pieces of information before you can sign in. The first is your regular password and the second is often a code that gets texted to you when you attempt to sign-in. Without both the password and the code from the text message, you can’t again access. Once authenticated, this will keep you connected for a day or so. Apple, Google and Microsoft support two-factor authentication for their Cloud services.

Want to find out more?

Call us on 01902 32 44 94 for a chat about Cloud or visit https://www.mbmltd.co.uk/Cloud-Services-Overview.asp

Making the most of WiFi wherever you are

Free WiFi is used by all kinds of businesses to help attract visitors and improve their experience when they are with you. But do you use it to its full potential?

wifi Coffee CupWhilst the focus is often on providing WiFi for visitors and customers, have you thought about how staff can use it?

Staff WiFi

These days staff expect to be able to use their laptop or tablet device from anywhere in your building. Have you got full coverage in the right locations and is it managed? MBM’s Managed WiFi for your Business delivers WiFi access points to cover a single office or your entire site.

Bring Your Own Device (BOYD)

Some companies allow staff to use their own devices on company networks and use your Internet Connection. Allowing unmanaged devices to connect to your business network can be risky as you don’t know if they are infected and pose a danger to your network. So separate them from your business network by using the MBM Managed WiFi Visitor Service so they won’t impact on your critical business connection.

Customer WiFi

Turn anonymous users of your WiFi into known potential customers.

By simple use of registration forms, you can capture email addresses and add them to your mailing list.

Want to find out more?

Call us on 01902 32 44 94 for a chat about WiFi or visit https://www.mbmltd.co.uk/ManagedWiFi.aspx

Why you should choose Office 365

If you’re looking to upgrade, you have to decide whether the traditional desktop version of Office is the way to go, or if Office 365 is a better fit for your needs.

officeThere are a few compelling arguments in favour of Office 365. Let’s take a look at three reasons Office 365 might be the right choice:

1. Cost

Office 365 plans start on per month basis. Small businesses can get access to Exchange, SharePoint, and Lync in addition to the core Office productivity applications for only a little more per month. Larger businesses that want to take advantage of Active Directory integration can do so again for a small additional cost per user per month.

Breaking those down, it takes more than three years to reach the levels of a traditional off the shelf desktop version.

2. Updates and Maintenance

What else do you get with your Office 365 subscription? An IT department. Sure, you can set up your own Exchange Server, SharePoint Server, and Lync infrastructure. You can manage and maintain the desktop Microsoft Office software, and install the patches and updates every month yourself. How much will that cost?

Consider that implementing the same capabilities in-house requires servers, and network infrastructure, and IT personnel to install, manage, update, and maintain it all. Plus, you still have to buy and maintain the Office software itself.

With Office 365, Microsoft takes care of all the dirty work so you don’t have to. Updates, patches, and upgrades just happen in the background without you needing to worry about it. When the server crashes, its Microsoft’s problem. When a hard drive needs to be replaced, Microsoft will handle it. You get the benefits of using Office without any of the headaches of updating and maintaining it all.

NIgel_Mills_MBM3. Accessibility

Office 365 lives in the cloud. That means you have access to Word, Excel, Outlook, and other Microsoft Office tools from anywhere you can get a Web connection, and from virtually any device–Windows or Mac desktops and laptops, Android devices, iPhones, iPads, and other smartphones and tablets. Office Web Apps provide basic features and functions for free.

This isn’t quite the selling point it once was for a couple reasons. First, even with the desktop Office 2013 suite Microsoft is pushing users to save files to the cloud-based SkyDrive, or to a SharePoint server by default. So, there’s no reason the data can’t be accessible regardless of whether you choose Office 2013 or Office 365.

The second reason it may not be all that compelling is that Office Web Apps are already available for free from the SkyDrive site. So, even without Office 365 users can create, view, and edit Word, Excel, PowerPoint, and OneNote files from the Web.

For businesses, though, SharePoint, Active Directory, and other elements of Office 365 that go beyond simply creating and editing Office documents still make Office 365 a better value.

Your mileage will vary of course. There are a number of factors involved in calculating the cost of purchasing, installing, configuring, updating, and maintaining Microsoft Office and the accompanying back-end services versus the ongoing subscription costs associated with Office 365. Office 365 is a solid service providing tremendous bang for the buck, though, so it won’t be easy to beat the value it brings to the table.

Need help with Office 365? Choose MBM.

Do you know what Malware is ?

So what is Malware? Short for malicious software, malware is as old as software itself, and  programmers have been authoring it for as long as they have been authoring legitimate software. There are many reasons why a programmer might create malware. These reasons vary from simple pranks and experiments to serious organized Internet crime. Malware exists in many forms, most of which you’ve probably already heard of. The most common types of malware are viruses, trojans, worms, spyware and zombies.

SOSThis article will cover the inner workings of the most common types of malware, and will also explain why malware is created and the kind of damage that it can inflict on individuals, corporations and governments.

Virus

Malware manifests itself in different forms; the most well-known is the virus.

Computer viruses are similar to their biological counterparts because they are capable of self-replication. The prime motivation of a virus is not to cause damage, but to clone itself onto another host so that it can spread further. If a virus causes damage it is more likely to be detected, and for this reason virus authors employ stealth techniques to keep it unnoticed. A good virus has a very small footprint and can remain undetected for a very long time.

Damage is not always a side-effect of infection. Sometimes damage has been purposely built-in by the programmer. Some viruses are time activated; they silently spread for a number of days, months or years and will suddenly activate and do damage on one particular date. Other viruses are event driven. They will activate when something particular happens on a host, or when a command is sent to them via a covert Internet channel.

Worms

Worms are very similar to viruses in many ways. The biggest difference between a worm and a virus is that worms are network-aware. A virus finds it very easy to replicate itself amongst files on the same computer, however it has a hard time jumping from one computer to another. A worm overcomes this computer-to-computer hurdle by seeking new hosts on the network and attempting to infect them.

This is an important difference: in the past viruses could take years before moving from one corporation to another, or from one country to another. Worms are capable of going global in a matter of seconds. This makes it very hard for them to be controlled and stopped.

Spyware

The primary function of spyware is to snoop on a user’s activity and send back the information it gathers to a hacker. Spyware does not have any infection mechanisms. It is usually dropped by trojans (and also by viruses and worms). Once dropped, it installs itself on the victim’s computer and sits there silently to avoid detection.

Once spyware is successfully installed it will begin collecting information. It is very common for spyware to log all the keys that the user types. This type of spyware is called a keylogger and can capture interesting information such as user names, passwords, credit card numbers and email addresses. Keyloggers capture every key stroke, so entire emails, documents and chats can be read by the malicious hacker.

There are more sophisticated forms of spyware that hook themselves to the network interface and siphon off all network data that enters or leaves the infected computer. This allows the hacker to capture entire network sessions giving them access to files, digital certificates, encryption keys and other sensitive information.

If you would like to know more from guys who don’t speak Geek – call MBM

Microsoft action interupts innocent users

Microsoft has obtained a court order to halt traffic to servers in order to halt the Cyber-criminal activity of some users. This has had the effect of interupting millions of innocent users. The giant has been accused of being’heavy-handed as in stopping the criminals it also interupted data to legitimate sites.

In a blogpost, Microsoft lawyer Richard Boscovich said it had taken the action against domain administration firm No-IP.com for its “roles in creating, controlling, and assisting in infecting millions of computers with malicious software”.

He said No-IP’s infrastructure had been used to spread the Bladabindi and Jenxcus family of malicious programs in 93% of the cases it had seen. Over the past 12 months, he said, Microsoft had detected variants of the two viruses more than 7.4 million times.

The thieves behind the malware could steal data from infected machines, record keystrokes and listen to any sounds taking place around a computer, he said.

officeMicrosoft had taken the legal step of making itself the controller of the 23 domains because No-IP had not done enough to police them, wrote Mr Boscovich. A federal court in Nevada granted Microsoft the right to take over the No-IP domains.

Once it had had control of the suspect domains, he said, Microsoft had applied filters so only “clean” data had got through and that helping the malware spread had been caught and discarded.

In response, No-IP said Microsoft’s action had been “draconian” and had wrongly “affected millions of innocent internet users”.

No-IP speculated that Microsoft had underestimated the amount of data traffic flowing towards the domains it was now administering, which had caused service disruptions for many legitimate customers.

“Millions of innocent users are experiencing outages to their services because of Microsoft’s attempt to remediate hostnames associated with a few bad actors,” wrote No-IP in a statement posted on its site.

Having problems – Call us at MBM and we will be happy to take a look

New labelling System helps IT Support Customers

MBM is rolling out a new system for managing customers’ devices which are included in their IT Support contract with MBM. The new labels, which are easily identifiable, will be placed on all equipment covered by MBM.

MBM

 

 

 

 

 

 

The labels include a unique QR Code which provides MBM with all the information we need about the hardware including: device type, age, owner, location and support history.

Jason Timmins, technical director at MBM, explains: “It’s important for both our customers and our support team that we can easily identify a device when there is a problem. The new asset labels will help to provide us with a more streamlined process for repair, maintenance and inventory.”

The new labels will be rolled out during planned site visits. For more information contact jason@mbmltd.co.uk

Free guest wifi is more important than Coffee!

So says one of our Facebook Fans – so think about the total service that you offer visitors to your premises.

Offering your customers the ability to connect their mobile devices to your wireless internet can be highly beneficial, especially if you work in a retail or leisure environment.

Businesses can also offer guest wireless access from a private office which is ideal for contractors or associates working on-site.

NIgel_Mills_MBMNigel Mills, managing director of MBM, advises businesses to keep their business WiFi separate from guest and visitor WiFi and encrypt it to ensure customers don’t inadvertently access your wireless traffic. He suggests businesses might also want to consider guest users accepting Terms of Service before allowing access to the Internet or impose time limits or bandwidth limits. The guest gateway can also be used to capture useful information such as name and Email address which can be used for marketing purposes at a later date.

Need reliable WiFi for your business?

Want secure WiFi for guests & visitors?

Unsure how to set it up & manage it?

MBM can guide you through the WiFi maze and ensure your business is set up securely and has the right hardware for your needs and provide ongoing support. Call us on 01902 32 44 94

Are you just putting up with a slow broadband connection ?

If you’ve ever experienced a slow internet connection or the loss of your connection for an hour or two, you’ll understand just how frustrating it can be.

MBM_42Emails_Blog_smallWe use the Internet so frequently during our working day to send and receive emails, for research and information, to access documents or software within the Cloud and so on; that we forget what it would be like to work if we didn’t have it at all.

So why do so many businesses whose core activity is so dependent on a good internet connection, put up with a slow one that can’t cope with their business’s usage or one that’s intermittently up and down?

MBM’s Business Broadband Service

MBM’s Business Broadband service is supplied using four of the best broadband networks in the UK: BT, TalkTalk, Cable & Wireless an Opal Telecom. Using four networks means that we can offer our customers the best broadband service that is available in their location.

If reliability is key, we offer a pair of broadband services supplied over different networks so if one service goes down, the second service steps in thereby minimising disruption to your business.

And if you have a problem, you don’t wait in a call queue – you simply ring MBM.

Want to talk through the options available to you and your business? Call us on 01902 32 44 94

Do you know what a gateway is ?

A gateway is a node that allows you to gain entrance into a network and vice versa. On the Internet the node which is the stopping point can be a gateway or a host node. A computer that controls the traffic your network or your ISP (Internet Service Provider) receives is a node. In most homes a gateway is the device provided by the Internet Service Provider that connects users to the internet.

disksWhen a computer server serves as a Gateway node, the gateway node also operates as a firewall and a proxy server. A firewall is a system created to prevent unauthorized admission into a private network. A proxy server is located right between a client application such as a web browser and the real server. The proxy server sees if the client applications requests can be carried out by the real server.

Usually a gateway is associated with a router. A router is a device or sometimes computer software that lets you know the next network data should be sent to next. A router can be connected to two or more networks at a time, it decides the next destination of the data based on it’s comprehension of the condition of the networks. A gateway is associated with a router because a router which uses headers and forwarding tables to figure out where packets or data is sent provides the path through which information is sent in and out a gateway.

So a gateway is one of the many ways we can communicate over the World Wide Web. The gateway allows us to enter different networks on the internet so we can transmit data back and forth. There’s also software available where you can be able to run several networks on a computer. As you have come to see by now having a gateway on your computer has it’s many benefits.

You can get a little smarter by installing different gateways within your business – speak to MBM on how we can help you with this.

Our Office Hours

contact

Do you have any questions?