img not found!

MBM Ltd – Microsoft Silver Partners – Press Release

A Wombourne-based Business is celebrating achieving Microsoft Silver Partner Status. MBM Limited specialise in IT support and services for companies in the West Midlands area and offer complete Disaster Recovery and Cloud Computing Solutions.

 

IMG_0747The attainment of Silver Partner Status recognises partners and developers who integrate unique applications and solutions into various products across the Microsoft platform. It highlights companies with a high training ethic who work towards developing solutions to client problems using available technologies.

 

MBM Technical Director Jason Timmins commented ‘We’re delighted to have achieved this Silver Microsoft Competency which puts us in the top 5% of Microsoft partners worldwide and shows our ongoing commitment to high quality cloud services for business.

 

The use of cloud services continues to rise, whether in the smallest SME or the largest corporation you’ll find cloud services taking care of Email, CRM, data storage and computing resources. Our new accreditation confirms our commitment, experience and skill with Microsoft’s world-leading cloud services, Office 365 and Azure.

 

Thanks go to my team at MBM for their excellent customer service and product knowledge without which Microsoft would not have given us this recognition.’

 

MBM Limited are based on Windmill Bank in Wombourne and can be contacted on 01902 324494 or by visiting mbmltd.co.uk

Who can be trusted with your data?

Think about a day without computers or tablets, whether for personal or business use – could you cope – how would you feel?
So what do you do when your computer system fails? Who are you trusting at the moment with all the information on your computer?
logo_RGB_squareYou could Google your options and find there are thousands of choices, including real companies or web-based organisations.
This is when it could get tricky as many web-only computer repair concerns have very impressive websites and offer rock-bottom prices. The problem is, you have no way of knowing where these companies are operating, who the people are behind the scenes and what kind of things they may be doing to your systems in the background but the premier concern is can you trust them with your company’s data?
Most remote software allows the third party access to do things you cannot see. Some may advertise you can watch everything the technician is doing unfortunately this is not always the case – would you give complete strangers your passwords or your wallet?? . Although there will be companies that are legitimate, they often use remote technicians operating out of their home locally and this could be situated anywhere typically in a third-world country call centre.
What precautions should you take?
• Research the business. Take advice from satisfied clients. Whilst there are some repairs that can be done remotely, making location not as important as ratings, complaints and reviews. Search out testimonials on their website. If they’re all written in a similar style, it’s possible they’re not as genuine as they make out.
• Contact the business. Call the business to test how responsive they are. If the business does not answer the first time, do they call back within a reasonable amount of time? Are the calls or emails handled professionally? Avoid doing business with companies that don’t respond in a timely fashion; it could be a sign of how queries are handled as well. Good customer service is endemic in an organisation.
• Check the website. Does the company’s website represent its business well? If the website is poorly organized maybe even on a self-build platform, it may be a sign to take your business elsewhere.
• There is the old adage about paying peanuts don’t always go for the cheapest price. When it comes to computers, you want the job done correctly the first time. Businesses with more experience and expertise may charge more for their services, but it should ensure that you get quality service. Remember, if it sounds too good to be true, it usually is. NIgel_Mills_MBMCompanies that seem to offer the lowest price might not be the best deal for you.
Just one parting thought your computers and your systems in effect ARE your business. Look after them and you will never have to worry about not being able to access your data. Paying cheaply can lead to paying twice. Never has there been a better example of getting what you pay for.

Put your IT in the cloud – not your head!

There are great advantages to cloud computing services and no wonder it is becoming an easy choice for businesses: the minimal upfront costs, pay-as-you-go cost structure, flexible access to software and data, and the fact that the expensive and awkward parts of the IT setup are someone else’s burden!
Cloud services can make applications that were once the preserve of only the largest organisations, like CRM, sales management, contact centre software, call recording – available to any company, from a two-person business to a £20 million turnover organisation.
officeOne of the biggest benefits of Microsoft Office 365 is that it gives you virtually anywhere access to the Microsoft Office tools you know and rely on – your complete office in the cloud.
Some businesses are concerned about exactly how to choose the right cloud applications, how to get the best use from them, and if their data will be secure when it’s up there. To help dispel these doubts, here are the key questions you should ask a cloud service provider before committing.
logo_RGB_squareSo do you know what the cloud is? Simply put, cloud computing is computing on the internet. Rather than installing programs on a computer, for example, people can run applications directly from a website. This principle also applies to storage of data; rather than keeping folders full of important work on your own PC, it can be stored remotely online this gives you data you can access from any computer regardless of where you are
And the reason why you should be using it ?Cloud computing and storage has a huge number of benefits for small businesses – as well as being more efficient, it also gives you a little protection if the worst happens and you lose access to the files on your computer – no real need for an IT disaster recovery plan !
Cloud computing allows you to store as much or as little data as you need to, usually charging on a pay-as-you-go basis. SOSThis means that you don’t need to upgrade your own hardware, and allows you to keep saving and working without worrying about limitations. The vast number of servers involved in a cloud system also means that bandwidth requirements can be increased on demand, so you don’t have to wait around to gain more space.
Would you like to discuss Cloud Computing for your Business? Give MBM a call.

Are you letting Business Walk out of your Door?

How often now do you check if a venue has in-house wi-fi ? From fast food outlets, Pubs, takeaways, shops and even church halls have their own in house platforms for you to login to.

Offering Wi-fi to customers of your business is highly beneficial more so in a retail or leisure/entertainment environment. Businesses can also offer guest wireless access from a private office which is ideal for contractors, visitors or associates working on-site.

wifi Coffee CupIt’s important that your business WiFi is kept separate from guest and visitor WiFi and encrypted to ensure they don’t access your wireless traffic.

Offering Free WiFi will encourage users to take your offering in exchange for their contact details.

MBM can offer you a package solution and are happy to help you implement a solution which will be a perfect fit all around.

Talk to MBM today and join thousands of businesses benefiting from this provision.

Why is Malware written?

Carrying on from last weeks Blog the answer to the “what is malware?” question cannot be complete without exploring the ‘why’ of its creation. By now, you should have a pretty clear idea of what type of damage can be done as a result of malware, but you might be wondering – why do programmers create malware in the first place?
Student Hackers and Cyber-crooks

MBM_42Emails_Blog_smallIn the early days of software, programmers wrote malware mostly to prank one another, or to show off their technical skills. These programmers, who were usually students had a great sense of humour but did not have much business sense. These students eventually graduated and got jobs. Their new motivation was now money, and how to make more of it using their skills. Some of these programmers learned that they can make thousands a day if they successfully exploit malware to their advantage.

These people went on to become cyber-crooks, defrauding individuals and organizations for financial gain. These criminals steal personal banking information to transfer money out of users’ bank accounts and into their own. They also launch distributed denial of service attacks against corporations and ask for money in exchange for an end to the attack.

Worms, zombies and distributed denial of service attacks are a good way to inflict mass damage on a global scale and are therefore very appealing to cyber-activists. These people want to get a message across and are ready to do so by utilizing any means necessary and this includes writing malware that causes damage, gets them noticed, and enables them to announce their messages and beliefs to a large audience.

Governments are also part of the game. A cyber-war between countries is raging. Some countries such as China, Syria, and America are rumoured to be state-sponsoring cyber-gangs whose only purpose is to research and develop new malware techniques capable of infiltrating government agencies and infrastructures. Malware has recently been spotted in the wild that was designed to infect SCADA systems with the scope of shutting down nuclear reactors. Some reports suggest that this worm, which might have been created by the Americans, was successful in shutting down several Iranian nuclear power plant coolers.

The malware problem is huge and is growing fast. By the end of 2010 the counter for unique malware programs stood at 14 million, with a staggering 60,000 pieces of new malicious code detected every day. Recently a worm called Koobface — which targeted people on social networks — netted its creators over 2 million dollars in just 12 months. Another worm, the Mariposa is said to have created the biggest network of zombie machines in the world. Experts could never determine its exact size, but estimated that over 12 million computers were infected. This worm dropped spyware capable of stealing sensitive information from victims, such as bank account numbers and credit card details. All this was created by a single hacker in Spain who fortunately made a mistake which exposed him and got him arrested.

The industry is fighting back. Numerous security solutions are available from many vendors that help stop malware infections. The threat however is a moving target. Hackers keep finding new ways to write bigger and better malware, the incentives are all there and the waging war is showing no signs of slowing down.

Worried that you might be exposed ? Speak to MBM

How does your computer become infected ?

There are literally dozens of different ways a computer can become infected with spyware, viruses, and other malware. Below is a list of the most common ways a computer can contract these infections listed in the order we believe are most commonly done.

Please be aware –  everyone  who uses the computer should be aware of how to properly use it  and protect it from malicious software.

NIgel_Mills_MBMAccepting without reading

By far one of the most common ways a computer becomes infected is the user accepts what he or she sees on the screen without reading the prompt or understand what it’s asking.

Some common examples:

  1. Whilst browsing the Internet, an Internet advertisement or window appears that says your computer is infected or that a unique plug-in is required. Without fully understanding what it is you’re getting, you accept the prompt.
  2. When installing or updating a program, you’re prompted (often checkboxes already checked) if it’s ok to install additional programs that you may not want or are designed to monitor your usage of the program.

Opening e-mail attachments

Another very common way people become infected with viruses and other spyware is by opening e-mail attachments, even when from a colleague, friend, or family member. E-mail addresses can be made up and even when genuine your acquaintance may unsuspectingly be forwarding you an infected file.

When receiving an e-mail with an attachment, if the e-mail was not expected or from someone you don’t know delete it. If the e-mail is from someone you know still be cautious when opening the attachment.

Not running the latest updates

Many of the updates, especially those associated with Microsoft Windows and other operating systems and programs, are security updates. Running a program or operating system that is not up-to-date with the latest updates can be a big security risk and can be a way your computer becomes infected.

In addition to running operating system updates, the plugins associated with your browser can often contain security vulnerabilities. Make sure you have the latest versions of plugins. Contact MBM for details of the latest updates.

Pirating software, music, or movies

If you or someone on your computer is participating in underground places on the Internet where you’re downloading copyrighted music, movies, software, etc. for free, often many of the files can contain viruses, spyware or malicious software. This is a highly dangerous practice and you should have procedures in place to stop users doing this.

No antivirus spyware scanner

If you’re running a computer with Microsoft Windows it’s highly recommended you have some form of antivirus and spyware protection on that computer to help clean it from any infections currently on the computer and to help prevent any future infections.

Downloading infected software

Finally, downloading any other software from the Internet can also contain viruses and other malware. When downloading any software (programs, utilities, games, updates, demos, etc.), make sure you’re downloading the software from a reliable source and while installing it you’re reading all prompts about what the program is putting on your computer.

Where can I find out more?

We are happy to advise on your business protection at MBM. We are your IT department at the end of a phone – keeping your business – in business.

What are Trojans ?

Looking at common terms within the IT world we look today at Trojans.

Trojans are malicious programs that perform actions that have not been authorised by the user. These actions can include:

Blocking data deleting data modifying data copying data disrupting the performance of computers or computer networks

Unlike computer viruses and worms, Trojans are not able to self-replicate.

How Trojans can impact you

Trojans are classified according to the type of actions that they can perform on your computer:

  • Backdoor
    A backdoor Trojan gives malicious users remote control over the infected computer. They enable the author to do anything they wish on the infected computer – including sending, receiving, launching and deleting files, displaying data and rebooting the computer. Backdoor Trojans are often used to unite a group of victim computers to form a botnet or zombie network that can be used for criminal purposes.
  • Exploit
    Exploits are programs that contain data or code that takes advantage of a vulnerability within application software that’s running on your computer.
  • Rootkit
    Rootkits are designed to conceal certain objects or activities in your system. Often their main purpose is to prevent malicious programs being detected – in order to extend the period in which programs can run on an infected computer.
  • Trojan-Banker
    Trojan-Banker programs are designed to steal your account data for online banking systems, e-payment systems and credit or debit cards.
  • Trojan-DDoS
    These programs conduct DoS (Denial of Service) attacks against a targeted web address. By sending multiple requests – from your computer and several other infected computers – the attack can overwhelm the target address… leading to a denial of service.
  • Trojan-Downloader
    Trojan-Downloaders can download and install new versions of malicious programs onto your computer – including Trojans and adware.
  • Trojan-Dropper
    These programs are used by hackers in order to install Trojans and / or viruses – or to prevent the detection of malicious programs. Not all antivirus programs are capable of scanning all of the components inside this type of Trojan.
  • Trojan-FakeAV
    Trojan-FakeAV programs simulate the activity of antivirus software. They are designed to extort money from you – in return for the detection and removal of threats… even though the threats that they report are actually non-existent.
  • Trojan-GameThief
    This type of program steals user account information from online gamers.
  • Trojan-IM
    Trojan-IM programs steal your logins and passwords for instant messaging programs – such as ICQ, MSN Messenger, AOL Instant Messenger, Yahoo Pager, Skype and many more.
  • Trojan-Ransom
    This type of Trojan can modify data on your computer – so that your computer doesn’t run correctly or you can no longer use specific data. The criminal will only restore your computer’s performance or unblock your data, after you have paid them the ransom money that they demand.
  • Trojan-SMS
    These programs can cost you money – by sending text messages from your mobile device to premium rate phone numbers.
  • Trojan-Spy
    Trojan-Spy programs can spy on how you’re using your computer – for example, by tracking the data you enter via your keyboard, taking screen shots or getting a list of running applications.
  • Trojan-Mailfinder
    These programs can harvest email addresses from your computer.
  • Other types of Trojans include:
    • Trojan-ArcBomb
    • Trojan-Clicker
    • Trojan-Notifier
    • Trojan-Proxy
    • Trojan-PSW

How to protect yourself against Trojans

SOSBy installing effective anti-malware software, you can defend your devices – including PCs, laptops, Macs, tablets and smartphones – against Trojans. A rigorous anti-malware solution will detect and prevent Trojan attacks on your PC anti-malware products that defend the following devices against Trojans:

  • Windows PCs
  • Linux computers
  • Apple Macs
  • Smartphones
  • Tablets

We can advise on and install anti-malware products at MBM

New labelling System helps IT Support Customers

MBM is rolling out a new system for managing customers’ devices which are included in their IT Support contract with MBM. The new labels, which are easily identifiable, will be placed on all equipment covered by MBM.

MBM

 

 

 

 

 

 

The labels include a unique QR Code which provides MBM with all the information we need about the hardware including: device type, age, owner, location and support history.

Jason Timmins, technical director at MBM, explains: “It’s important for both our customers and our support team that we can easily identify a device when there is a problem. The new asset labels will help to provide us with a more streamlined process for repair, maintenance and inventory.”

The new labels will be rolled out during planned site visits. For more information contact jason@mbmltd.co.uk

Are you just putting up with a slow broadband connection ?

If you’ve ever experienced a slow internet connection or the loss of your connection for an hour or two, you’ll understand just how frustrating it can be.

MBM_42Emails_Blog_smallWe use the Internet so frequently during our working day to send and receive emails, for research and information, to access documents or software within the Cloud and so on; that we forget what it would be like to work if we didn’t have it at all.

So why do so many businesses whose core activity is so dependent on a good internet connection, put up with a slow one that can’t cope with their business’s usage or one that’s intermittently up and down?

MBM’s Business Broadband Service

MBM’s Business Broadband service is supplied using four of the best broadband networks in the UK: BT, TalkTalk, Cable & Wireless an Opal Telecom. Using four networks means that we can offer our customers the best broadband service that is available in their location.

If reliability is key, we offer a pair of broadband services supplied over different networks so if one service goes down, the second service steps in thereby minimising disruption to your business.

And if you have a problem, you don’t wait in a call queue – you simply ring MBM.

Want to talk through the options available to you and your business? Call us on 01902 32 44 94

Do you know what a gateway is ?

A gateway is a node that allows you to gain entrance into a network and vice versa. On the Internet the node which is the stopping point can be a gateway or a host node. A computer that controls the traffic your network or your ISP (Internet Service Provider) receives is a node. In most homes a gateway is the device provided by the Internet Service Provider that connects users to the internet.

disksWhen a computer server serves as a Gateway node, the gateway node also operates as a firewall and a proxy server. A firewall is a system created to prevent unauthorized admission into a private network. A proxy server is located right between a client application such as a web browser and the real server. The proxy server sees if the client applications requests can be carried out by the real server.

Usually a gateway is associated with a router. A router is a device or sometimes computer software that lets you know the next network data should be sent to next. A router can be connected to two or more networks at a time, it decides the next destination of the data based on it’s comprehension of the condition of the networks. A gateway is associated with a router because a router which uses headers and forwarding tables to figure out where packets or data is sent provides the path through which information is sent in and out a gateway.

So a gateway is one of the many ways we can communicate over the World Wide Web. The gateway allows us to enter different networks on the internet so we can transmit data back and forth. There’s also software available where you can be able to run several networks on a computer. As you have come to see by now having a gateway on your computer has it’s many benefits.

You can get a little smarter by installing different gateways within your business – speak to MBM on how we can help you with this.

Our Office Hours

contact

Do you have any questions?