Are you tired of wasting precious time in meetings, only to leave feeling confused and disorganized?
Do you struggle to keep track of all the action items and follow-up tasks that come out of these meetings?
Microsoft Teams has launched a new feature which could solve your problems and boost productivity.
Meeting Recap is an AI-based intelligent meeting recap feature, available exclusively to Teams Premium subscribers. This innovative feature harnesses the latest in artificial intelligence technology to generate comprehensive summaries of your meetings.
That means no more tedious recaps… but hello to accurate and efficient summaries that capture all the key points from your meetings.
The Meeting Recap feature doesn't stop there. It automatically identifies action items and follow-up tasks, assigns them to team members, and even sets deadlines for completion. This means that everyone involved in the meeting knows exactly what they need to do and when it needs to be done. A great way to improve communication and collaboration within your team.
But it's not just about efficiency. The meeting recap feature also offers customizable options to tailor the feature to your specific needs. Choose what information is included in the summary to ensure that you receive the most relevant and useful information possible.
If you’re not a Teams Premium subscriber, are there benefits of investing in this new feature?
Yes! For starters, it streamlines your workflow, saving you both time and money.
You don’t have to waste hours trying to decipher meeting notes and action items. Instead, you'll have access to a clear and concise summary that you can refer back to any time.
Additionally, it improves organization and accountability within your team. With assigned action items and deadlines, everyone knows exactly what is expected of them.
Don't underestimate the power of this new Meeting Recap – it's a game-changer for businesses that want to increase productivity.
Don’t wait. If you need help upgrading to Teams Premium, we’re here for you. Get in touch
When you replace old computers or external drives, do you delete data and then just… get rid of them?
You could be putting your sensitive data at risk.
A new study by a data recovery specialist shows that millions of deleted files can be recovered from improperly wiped hard drives that are sold online.
It’s not just buyers who can access your old files. Cyber criminals often buy used hard drives and attempt to recover data from them. This could include anything from confidential business information to client details.
It’s easy to forget about old data when you’re excited about shiny new technology. However, it’s important to consider what’s on that old drive before selling it or disposing of it.
Even if the drive is encrypted, it’s still possible for data to be recovered. And if the drive is damaged, there’s a chance that some of the data is still salvageable. It’s better to be safe than sorry when it comes to sensitive information.
Think about it this way: Would you leave important documents lying around for anyone to see? Of course not! Your digital information deserves the same level of protection.
So what can you do to protect yourself?
Don’t let your old hard drives become a liability. Take the time to have them properly wiped or destroyed before disposal. If you’re upgrading hardware, consider hiring a professional to handle the data transfer and ensure that your old devices are wiped clean.
This isn’t just about protecting yourself. It’s about protecting your employees, clients, and anyone else whose personal information you may have stored on that old drive.
It’s a small investment to make for the peace of mind that comes with knowing your data is safe from prying eyes.
Don’t take chances with your data – take action to protect it:
· Properly wipe or destroy old hard drives · Bring in a professional for your hardware upgrades · Upgrade your overall security practices
Have you ever felt frustrated by the flood of notifications from your multi-factor authentication (MFA) app?
Well, cyber criminals have too. And they're taking advantage of “MFA fatigue" to try to gain access to your sensitive business data.
MFA is essential for keeping your data secure. It adds an extra layer of security to your apps and accounts by asking you to verify your identity in two or more ways, such as a password and a code sent to your phone.
The constant alerts can be overwhelming though.
Attackers know this and will bombard employees – sometimes in the middle of the night – with a constant stream of MFA notifications. Which makes it more likely someone will authenticate a login attempt through frustration, tiredness, or just to get the notifications to stop.
But now there's a new weapon in the fight against MFA fatigue.
Microsoft Authenticator has introduced number matching as a way of making sure your MFA notification is from the correct login attempt, preventing cyber criminals from taking advantage of notification fatigue.
How does number matching work?
When you receive an MFA notification, the app will display a randomly generated number. You then need to input this number to authenticate the login attempt and prove you're not a cyber criminal trying to access your business data.
That's not all. Microsoft Authenticator also allows for biometric authentication, which means
you can use your face, fingerprint, or other unique physical features to prove your identity and combat the threat of MFA fatigue attacks.
With these security measures in place, your business can stay ahead of cyber criminals and keep your sensitive data better protected.
If you already use Microsoft Authenticator, number matching is ready to use. Simply make sure your app is up-to-date, and you'll be protected.
If you use another MFA system and want to look at how to make your security better or easier, we can help. Get in touch.
Microsoft has announced that the current version of Windows 10, released in 2022, will be its final release.
If you're currently using Windows 10, you might wonder what this means for your day-to-day operations.
The good news is that your computers won’t suddenly stop working. The current updates and security patches for Windows 10 won’t disappear anytime soon either.
However, you may want to consider upgrading to Windows 11 sooner rather than later. Microsoft has made it clear that it will be devoting all its attention to the new operating system from now on, so future developments and innovation will be focused on Windows 11.
Upgrading can be a daunting task, but moving to Windows 11 has so many benefits:
Windows 11 has been designed to maximize efficiency and performance across all types of devices, making it a no-brainer for businesses looking for faster and more efficient technology.
Improved user experience
The interface has been updated with a more modern look, making it easier to navigate and customize.
Windows 11 comes with Microsoft's most advanced security features, making it harder for cyber criminals to breach your system.
Better integration with cloud services
Windows 11 gives you access to a range of cloud-based services, making it easier to collaborate with other team members and enhance your business' productivity.
If you're still hesitant about upgrading, keep in mind that Microsoft will eventually stop releasing security updates for Windows 10. We’re expecting it to be in late 2025. This means staying with Windows 10 for too long could put your business at risk of security threats.
The sooner you upgrade, the better your protection against these threats, and the more significant the benefits you'll be able to reap from Windows 11.
Like any big project, making the move to Windows 11 needs to be planned and implemented properly. Your hardware needs to meet certain requirements and, of course, you’ll need to make sure it’s done without affecting day to day operations.
If you’d like help making the transition with as little disruption as possible, get in touch.
Microsoft has just announced an option for people to trial new features before their general release in Windows 11.
This isn’t about fixes to security flaws – everyone gets those at the same time.
This is an opportunity for businesses to jump the queue to receive new features and updates first.
Worth the risk?
Patience is a virtue!
Sure, it may be tempting to give in to the tantalizing prospect of new features… nobody ever wants to wait. But jumping aboard any trial phase comes with risks.
Bugs, errors, and other stumbling blocks could have a significant impact on your operations, potentially causing chaos in your daily workflow.
Waiting until features have completed a thorough trial process gives you the advantage of other people’s experience. They’ve already dealt with the complexities so, by the time you get the new features, they’ll be polished and dependable. And isn’t that more important for the smooth running of your business?
Trust us, the safe road is the smart road, especially when your business systems are involved. The benefits of being an early adopter may seem enticing, but you don't want to end up being the guinea pig.
Remember the old adage… good things come to those who wait!
We’re all for keeping up with the latest technology and software updates, but there is a time to exercise caution, and this is one of those times. Don't be tempted by the shiny new features.
And ensure that when the time comes, you're getting something that’s proven to work
Microsoft already has a lot of (tested and approved) features that can boost productivity and make your work processes smoother. We spend a lot of time helping businesses find the right ones for them. If we can do the same for you, get in touch.
Cloud computing has quickly become a popular option for businesses that want to streamline their operations, reduce costs, and become more flexible.
But are you swayed by the idea that cloud services are automatically better for the environment? Could the need to do your bit ‘cloud’ your decision-making?
Sorry. Bad pun.
It’s true that cloud services have environmental benefits compared to using your own servers. These include reduced energy consumption and a smaller carbon footprint.
Yet you shouldn’t view the cloud as a “green solution” without fully understanding the environmental impact.
One consideration of using cloud services is the location of the data centers where servers are housed. Some providers have made commitments to use renewable energy, but it’s not a guarantee. It is essential to do your research and choose a provider that sources renewable energy and uses energy storage where possible.
When thinking about switching to the cloud, there are other benefits besides environmental sustainability. They include improved data security, ease of collaboration, and scalability as your business grows.
Another key advantage of cloud computing is data backup and recovery.
With all your data stored in the cloud, the risk of data loss due to equipment failure, damage, or theft is virtually eliminated. It means that in the event of an unforeseen disaster, like a fire or natural disaster, you can rest assured your data is safe and can be quickly recovered.
Cloud computing also enables better collaboration and communication, helping your team to work together more easily and efficiently, no matter where they’re working from. This can increase productivity and reduce your costs in comparison to maintaining traditional on-site systems.
Finally, cloud services provide better scalability as you grow, with the ability to increase storage and processing power as needed.
Can you see the benefits of cloud computing are huge? It’s why so many businesses have already ditched their servers.
If you’re considering migrating, get in touch – we can talk you through the process and what happens when.
Airports, hotels, cafés, even shopping malls, offer public charging points where you can boost your phone or laptop battery on the go.
They’ve been in the news after the FBI recently tweeted advice to stop using them. Crooks have figured out how to hijack USB ports to install malware and monitoring software onto devices as they charge.
The security risk of “juice jacking” was long thought to be more theoretical than real, but the tech needed to carry out an attack has gotten smaller and cheaper and easier to use. This means less sophisticated criminals are now turning their hand to it.
So how does it work?
The most common charging cables – USB-C and lightning – are dual-purpose. They have pins for charging and pins for data.
When you charge your device, you only use the charging pins. But a compromised charging port – or a cable that someone has left behind – could use both charging pins and data pins without you knowing.
When they use the data pins, criminals can install malware onto your device that gives them access to your credentials and other data. It’s a little like plugging your phone into someone else’s laptop.
To avoid the risk, the best solution is to always carry your own charger and cable, and plug it into a power outlet. If you have no choice but to use a public USB port, invest in something called a USB data blocker. This prevents data being transferred, but the device will still charge.
We help businesses stay secure and productive at the same time. If we can help you, get in touch.
LinkedIn is introducing new verification features over the coming months to help tackle fake accounts.
The business-focused social platform is a fantastic place to connect with like-minded businesspeople, and to find new employees, jobs and opportunities.
But thanks to this popularity, we’re seeing an increase in fake profiles, created by scammers for more sinister purposes.
Bot-like accounts have been cropping up all over the platform. They’ve been spamming people, tricking genuine profiles into downloading malware, and scamming them into giving away personal data.
LinkedIn holds a huge amount of information on each of its members, including their job history, contact details, professional interests and places of work – all valuable data that a determined criminal could put to use.
These fake accounts can be hard to spot. They look like real people (sometimes they’re AI-generated deepfake images), they seem to work for legitimate businesses, and the profiles have been carefully curated to look like the real deal.
LinkedIn is making changes over the coming months to help tackle these fake accounts, by way of an improved account authentication process.
Microsoft, which owns LinkedIn, is partnering with secure identity platform Clear to help verify accounts using work email addresses, government-issued ID, and a phone number.
It’s initially only being tested in the US, but if it’s a success, we expect we’ll see a wider rollout over the coming months.
Once the relevant information has been provided, accounts will receive a verification mark, like the ones introduced by Twitter. However, unlike Twitter, LinkedIn will be offering verification free of charge.
We’ll keep you updated when we know more, but in the meantime, if you need help keeping all your accounts secure, get in touch.
Windows 11 still feels like a new toy, yet we’ve already heard (reliable) speculation about Windows 12 arriving as soon as next year.And now it’s all we can think about!
What will it look like?
What improvements will we see?
Will there be new features?
We can’t answer these questions with certainty just yet, but there are whispers of new features that could be big news for businesses.
Three in particular havegot us excited.
First (and probably most obvious) is the inclusion of more AI functionality. From automation to chatbots, AI has exploded in recent months. It just makes sense that Microsoft will harness this power to bring us a more impressive operating system.
We’re likely to see better AI analysis of our content, andprompts to help us begin projects or choose apps to help get things done. It will also help us speed up what we’re doing with improved intuition for what we’ll do next.
We do know that Microsoft wants to bring us faster updates and better security.
It’s likely things will be split into different sections rather than having the entire OS as a single entity as it stands today. That means updates to different elements will be able to run in the background while you continue to work, and different people may be granted access to each partition for improved security.
Microsoft also intends to make the Windows 12 experience more modular. The benefit of creating different components in this way is that higher-powered devices will get the maximum Windows experience, while lower-powered devices will still be able to do everything they need, running the Edge browser, Office tools, or web apps, for instance.
Some of these features may be reliant on dedicated hardware and upgraded equipment and we’re waiting for more announcements on that. As soon as we hear, you’ll be the first to know!
If you haven’t yet made the move to Windows 11, now’s a good time. Get in touch if you need any help or advice.
One of the many cool things about the new wave of Artificial Intelligence tools is their ability to sound convincingly human.
AI chatbotscan be prompted to generate text that you’d never know was written by a robot. And they can keep producing it – quickly, and with minimal human intervention.
So it’s no surprise that cyber criminals have been usingAI chatbotsto try to make their own lives easier.
Police have identifiedthe three main ways crooks have found to use the chatbot for malicious reasons.
1. Better phishing emailsUntil now, terrible spelling and grammar have made it easy to spot many phishing emails. These are intended to trick you into clicking a link to download malware or steal information.AI-written text is way harder to spot, simply because it isn’t riddled with mistakes.
Worse, criminals can make every phishing email they send unique, making it harder for spam filters to spot potentially dangerous content.
2. Spreading misinformation “Write me ten social media posts that accuse the CEO of the Acme Corporation of having an affair. Mention the following news outlets”. Spreading misinformation and disinformation may not seem like an immediate threat to you, but it could lead to your employees falling for scams, clicking malware links, or even damage the reputation of your business or members of your team.
3. Creating malicious code AI can already write pretty good computer code and is getting better all the time. Criminals could use it to create malware.
It’s not the software’s fault – it’s just doing what it’s told – but until there’s a reliable way for the AI creators to safeguard against this, it remains a potential threat.
The creators of AI tools are not the ones responsible forcriminals taking advantage of their powerful software. ChatGPTcreator OpenAI, for example, is working to prevent its tools from being used maliciously.
What this does show is the need to stay one step ahead of the cyber crooks in everything we do. That’s why we work so hard with our clients to keep them protected from criminal threats, and informed about what’s coming next.
If you’re concerned about your people falling for increasingly sophisticated scams, be sure to keep them updated about how the scams work and what to look out for.
If you need help with that, get in touch. Published with permission from Your Tech Updates.