Ashley Madison hack an ‘inside job’

By on August 18, 2015 in Blog, General, Internet, Security, Web privacy

An insider could have been behind the huge hack on infidelity dating site Ashley Madison.

News broke last month of a hack that saw customer data stolen from Ashley Madison – a hugely controversial site that allows married individuals to organise affairs. Now, with the site still operational but many users fearing the leak of this information, it has been claimed that the hack most probably came from within the company and not a third party.

Cyber security lecturer Dr Daniel Dresner explained: “Doors are opened up from someone on the inside. This might just be an excuse, but so many of the actual attacks we see are opened up by somebody [inside].”

Despite the site’s controversial offering, it wasn’t the infidelity that drove hackers to steal user data but instead its suspect business practices.

The so-called ‘Impact Team’ hacking group specifically highlighted Ashley Madison’s practice of charging users to delete their accounts. Furthermore, users were told that paying for this service would see all of their information removed from Ashley Madison’s servers – something the Impact Team argues isn’t true. To prove their point, the hackers claim they even have personal information (such as names, addresses, credit card information and even secret fantasies) from those who had previously requested account deletion.

Account deletions – too little too late?

As a short-term solution, the site’s owners (tagline: ‘Life is short, have an affair’) offered free account cancellations. It’s not been revealed how many people took up this offer, but with the data having already been stolen it matters little should this information see the light of day.

Several weeks after the hack, both parties were still engaged in an ongoing standoff. The hackers said they would keep the data to themselves if Ashley Madison owners, Avid Dating Life, closed down the site. Ashley Madison, however, is still live and boasting having 38 million members. If the standoff continues it will work in Ashley Madison’s favour, as those who tried to access this hacked data have found it increasingly difficult – if not impossible – to find. Instead, they are being served ads and religious propaganda.

Make the most of Office 365

By on July 10, 2015 in Blog, Microsoft

If you see Office 365 as simply a way to get your entire workforce using Microsoft Office at a favourable price, the chances are you aren’t making the most of its full potential. Office 365 subscriptions come with several genuinely useful services, tools and applications that you may not be taking advantage of, even though you have already paid for them.

Secure online storage with OneDrive

As part of Office 365, you get secure online storage for all of your users. OneDrive lets users access their files from any device using their Office365 login, something that’s particularly useful if you don’t yet have a remote access feature on your own network. While you shouldn’t rely on OneDrive as your sole back-up tool, it can be used as an alternative storage option, freeing up valuable space on your local server. Unlike some online backup tools, Office365 gives you a whopping one terabyte of storage for every user, making it suitable even for multimedia files.

SharePoint for easier project collaboration

SharePoint has always been an application where the full potential has gone unrealised because of confusion over what it is and how it works. The easiest way to think of it is a central file repository that enables your staff to effortlessly work and collaborate from anywhere on any device. If you’ve ever tried to get staff working together over your network and thought “there must be an easier way to do this” then SharePoint may be that way. With Office 365 your organisation gets 20 GB SharePoint storage plus 500MB per subscription.  If you require further capacity each additional GB is just £0.13 per month offering flexibility and great value compared to alternative cloud storage providers.

Face to face messaging with Skype For Business

The dedicated Skype for Business application in Office365 brings several key benefits over the standard Skype setup or the original Microsoft Lync communication tool. For example, it makes it simple to split the screen so that you and a colleague can see each other and also view a document for real time collaboration. Skype for Business also includes enhanced conferencing management tools and lifts the maximum number of participants from 25 to 250, making it a viable company-wide presentation tool. What’s more Skype for Business is fully integrated with Microsoft Outlook, making it easy to schedule and host online meetings, even if the other party doesn’t have Skype for Business, in which case they can join the meeting via a web browser.

Delve, your intelligent assistant

The unsung hero of Office365, Delve is like having an ultra-intelligent assistant who works 24/7 without claiming overtime. It’s based around the idea that the sheer amount of data you can access in Office365, particularly if you’re in a manager role, can be overwhelming. Delve sifts through the information and brings you a summary of the latest updates and document edits that are most likely to be of immediate importance. The selection is based on numerous factors including how widely a document has been shared, your office and project hierarchy, and which related documents you have been viewing recently.

Office 365 Mobile App

When it comes to Office software, Microsoft’s mobile applications can be a confusing picture. You may have read that Microsoft made the Office 365 mobile apps free of charge for everybody in late 2014. This is true, but it only applies to the basic, consumer-oriented edition. With a business Office 365 plan you get access to a version of the app that allows premium features such as track changes in Word and Pivot Tables in Excel. The Office 365 mobile app displays a list of documents that you recently accessed, providing instant convenient access to your files while you are on the go.

Getting the most out of Office 365

At M2 Computing, we have extensive experience migrating small to medium sized organisations to Office 365. We understand the complexity of email and server infrastructures and have successfully delivered cloud migration projects in business critical environments for clients across London, Surrey and Sussex. As an accredited Microsoft Silver Partner, we can help you choose the right package to fit your business requirements and provide the necessary training and IT support to make the most of your Office 365 subscription.

How to avoid your hardware overheating in soaring temperatures

By on July 10, 2015 in Blog, Tips & tricks, Topical

July has certainly got off to a hot start and weather forecasters are predicting more soaring temperatures for the weeks ahead. So spare a thought for your computer systems, which are liable to overheat if certain basic precautions are not taken.

Open doors or windows and increase ventilation using desk fans and mobile air conditioning units wherever possible. Of course, these measures will make life more comfortable for your staff as well as your equipment! But here are 5 more tips, specifically aimed at your hardware.

Check system fans

Be aware of fans turning more than usual – especially server fans, as this may be an early sign that hardware is struggling in the heat. It is often recommended you keep a spare fan to avoid prolonged system downtime should the existing fan need to be replaced, advice which is particularly relevant to older or out-of-warranty servers.

Check air flow

Most hardware sucks cooling air in from the front and pushes it out through the back. Take a moment to understand the airflow of your computers and servers, moving these devices away from walls, desks and any other objects that might obstruct ventilation. Ensure there is adequate space in your comms room as placing servers too close together will not help.

Avoid direct sunlight

During hot conditions, your devices will already be struggling to cope with the heat created by their own power supplies and processors, so keep them away from direct sunlight. As well as servers and PCs, don’t forget about smartphones, tablets and peripherals such as Wi-Fi access points and routers that may be sitting on window sills, in cupboards or under piles of paperwork.

Switch it off

Remember to turn off any unused workstations, monitors and related equipment when these are not being used.

Air conditioning

Naturally, this is the preferred option. If you have it, take a moment to ensure your air con is working and that is keeping your equipment sufficiently cool. If you’re thinking of buying a system, make sure you know your BTU (British Thermal Units), since many businesses fail to take these into account. Each of your devices has a BTU output which can be found either on the case labelling or researched online.

Roaming charges to be abolished within the EU by 2017

Data roaming charges within the EU look set to become a thing of the past by June 2017, thanks to a new ruling by the European Commission.

The ruling stipulates that all data charges should be abolished over the next two years, so mobile users can call or text when abroad as they would at home, without fear of grossly inflated bills.

Furthermore, interim rules will come into force next year to limit surcharges by up to 75 per cent. From April next year, telecoms operators will only be able to add a surcharge of 3.5p extra per minute for calls and 1.4p for texts. Data, meanwhile, can only be charged at 3.5p extra per megabyte.

This scheme will run for 14 months, before roaming charges are abolished altogether.

Years of campaigning

The Commission’s announcement comes after years of campaigning, with mobile users not only calling for fewer charges but also a clear definition of how EU nations will regulate internet traffic, in light of the net-neutrality rules being adopted across the Atlantic.

On the subject of net-neutrality, the EC said it will prevent internet service providers (ISPs) from favouring certain traffic, the first time such measures have been enshrined in law across Europe.

Despite these apparently positive steps, the end of roaming charges isn’t entirely guaranteed yet. Before then it needs to be presented before the EU’s member states in the second half of this year for formal adoption.

It’s expected the ruling will be passed through, especially after an EU-wide alliance gave its backing, having previously claimed the EC was watering down its proposed roaming regulations.

Speaking in light of the latest announcement, president of the Alliance of Liberals and Democrats for Europe (ALDE), Guy Verhofstadt, told bbc.co.uk how the “great roaming rip-off” would soon be brought to an end. The only factor that delayed the roll out, his group argues, were member states getting in the way to protect the interests of their own national operators.

Why do smartphones slow down in the warm weather?

By on July 10, 2015 in Blog, Mobile devices, Topical

Smartphones slow down in hot weather because the processors that power them have been designed to do so. These processors are heat-sensitive, so will reduce power usage when it’s warm to stop themselves from overheating. Essentially, the slowing down of processes means the phone runs slower, but that’s to prevent them overheating – which could cause irrevocable damage.

Batteries drain more quickly too

Slower processors have a further knock-on effect, impacting the life of your battery. The slowing of processes means electricity is drawn out of the battery for much longer periods, running it down quicker than usual. On top of this, using the phone’s screen or GPS chip will generate additional heat, making it warmer still – slowing down processes yet again and impacting battery life further.

Heat doesn’t just run batteries down faster but also makes charging them a much longer process. Smartphone batteries are equipped with thermal control systems to stop them overheating and causing a meltdown. With warmer conditions bringing the standard temperature closer to this thermal ceiling (and the process of charging causing additional heat anyway), it will take longer than usual to reach full power.

Again, this is part of the design and, whilst a minor inconvenience for users wanting speed, it will keep the phone in better condition in the longer term. As temperatures of more than 30C can cause serious damage to the chemical components within batteries, users should be thankful there are measures in place to prevent this from happening.

Warm homes, gardens and workplaces are not the only worry, this summer as screens can also crack when left in hot cars. As tech journalist at theguardian.com Samuel Gibbs explains:

“The fine liquid layers of a screen can swell under high heat, which means pixels can blow and glass can crack. Leaving a phone within a hot glovebox on a sunny day is asking for trouble.”

To avoid the effects of the summer heat on your handset, we recommend that phones are kept out of the sun as much as possible to avoid any problems.

Security improvements lead the way in iOS 9

Our appetite for IT innovation seems insatiable and this is particularly true of smart phone technology. Just days after the rollout of iOS 8.4 at the end of June 2015, attention turned to the new features and specifications of Apple’s next big release: iOS 9.

Expected to be unveiled later this year (to coincide with the new iPhones, which are typically released in autumn), iOS 9 is set to include public transport information on Maps, improved card integration on Wallet, and CarPlay, for better wireless connections with in-car wireless systems. These features have already been released by Apple and are able to view on its site.

Among the most notable changes, though, are those related to security, which we thought were worthy of a mention this month. The first is the introduction of a six-digit simple passcode, to replace the current four-digit system.

Six-digit passcodes

Whilst users will still be able to use four-digit pass codes if they choose, Apple (along with countless security companies) strongly advises using six. This takes the number of possible combinations up from 10,000 to one million. Whilst it’s unlikely that someone would sit there manually entering 10,000 passcodes, the fact that they’re able to is enough of a risk. This became evident after it emerged that users could power down after inputting incorrect pass codes to reset the failed attempt count.

Two-factor authentication

The second security feature heading to iOS 9 is two-factor authentication. The system, which has long been in use on other devices, will see users asked for a security code whenever they sign in from a new browser or device. Such a move not only keeps out hackers but can also alert users to any fraudulent login attempts.

Apple has already dabbled with two-factor authentication, having rolled it out in March 2013 – albeit to a limited number of accounts. It was later integrated with iMessage, iCloud and FaceTime.

Exactly how it will work within iOS 9 has not yet been revealed, but its introduction is almost guaranteed, with Apple declaring in a statement: “A password alone is not always enough to keep your account secure. With two-factor authentication… you’re quickly signed in – and any unauthorised users are kept out.”

Watch this space.

Hacks could cost UK businesses £1.46 million

By on July 10, 2015 in Blog, General, Internet, Security, Web privacy

Security breaches can cost a business much more than its reputation, according to a new study, and the number of businesses affected by cyber-attacks is on the rise.

According to a government-commissioned report from consultancy firm PwC, British companies could see security breaches leave them out of pocket to the tune of almost £1.5 million – at least for larger organisations. It said that average ‘starting costs’ for major breaches at large firms had more than doubled in the past year alone, growing from £600,000 to £1.46 million.

Whilst the number isn’t quite so high for smaller firms, as a percentage of their turnover it’s still an eye-watering amount. Small businesses suffering with the most extreme security breaches could end up with a bill of £310,000 – significantly more than the £115,000 that a similar breach in 2014 would have cost.

Perhaps unsurprisingly, one in ten companies that had suffered a breach said they’d changed the nature of their business as a result.

90% of large firms and 74% of SMEs affected

PwC also reiterated that the old belief of “that won’t happen to me” is risky at best, and a recipe for total disaster at worst. It claimed that 90 per cent of large organisations had suffered some sort of cyber-attack over the past year, a nine per cent year-on-year increase. It was a similar story for smaller firms – with 74 per cent having fallen victim of an attack, growing from the 60 per cent total recorded in 2014.

Much of this could be attributed to the diversity of devices being used in today’s workplaces. Companies are investing in security for their desktop devices, but neglecting to roll out such measures for tablets and smartphones. There are also intangible risks much more difficult to protect against, like human error. Staff-related breaches have hit 75 per cent of large businesses, a figure that was nearer 60 per cent last year.

Commenting, PWC cyber security director Andrew Miller told telegraph.co.uk: “Breaches are becoming increasingly sophisticated, often involving internal staff to amplify their effect, and the impacts we are seeing are increasingly long-lasting and costly to deal with.”

We recommend working closely with your IT provider to minimise the risk of a cyber-security breach and being vigilant when opening emails and attachments. Give us a call on 01293 871971 to discuss your security options.

Microsoft announce the launch date for Windows 10, but what does it mean for SMEs?

By on June 15, 2015 in Blog, Microsoft, Product releases

Earlier this month, Microsoft unveiled the official launch date for the eagerly awaited Windows 10.  From 29th July 2015, the new operating system will be available in 190 markets around the world. Microsoft are offering Windows 10 as a free upgrade for Windows 7 and Windows 8.1 users for the first year. After this period ends, Microsoft will either introduce a new service subscription model or continue to charge a single one off payment.  This is yet to be officially clarified by Microsoft.

When Microsoft introduced Windows 8 back in October 2012, it faced widespread criticism for moving too far away from the familiar functionality highly valued by Windows 7 customers. As a result the market was slow adopt the new Windows 8 operating system and many either stayed with Windows 7 or waited until Windows 8.1, particularly business users. With the launch of Windows 10, Microsoft have brought back some of the favourite Windows 7 features such as the Start Menu bar, which were dropped from Windows 8. For simplicity, the new version offers a single platform across smartphone devices, pcs and tablets. Windows 10 also includes the digital personal assistant ‘Cortana’ in the desktop version and a new internet browser named ‘Edge’.

Last month, Microsoft CEO Satya Nadella spoke at a conference for IT professionals in Chicago, stating that the company is ‘making a profound change in how it approaches Windows’. He also speaks of ‘Windows as a service’ turning Windows 10 into far more than just an operating system. By this, Nadella means Windows 10 will be delivered as an application via the cloud rather than a system installed on a PC or laptop.

The free upgrade path also applies to businesses users. Clients using Windows 7 Pro or Windows 8.1 Pro can upgrade to Windows 10 Pro. As with any new operating system launch, the advice we offer for small to medium sized businesses is to sit tight with your current Windows version for now until the dust settles. New operating systems will always require software fixes shortly after launch and it makes sense to wait a couple of months until it is stable. We would also be happy to review your organisations current systems and applications to determine whether upgrading to Windows 10 this year is advisable for your business.

If you have any further questions about Windows 10 for your business, please contact us on 01293 871971 or enquiries@m2computing.co.uk

Recycled Apple computer fetches $200K at auction

By on June 15, 2015 in Apple, Blog, General

A massive cheque awaits one mystery woman in Silicon Valley after the old computer she dropped off at a recycling firm ended up selling at an auction for $200,000 (£131,000).

The computer in question is a rare Apple-1 – one of the first pre-assembled Apple computers built by co-founder Steve Wozniak in 1976. When the recycling company CleanBayArea’s vice president Victor Gichun first saw the machine he believed it to be fake, but after being confirmed as the real deal he sold the machine for a huge profit.

But CleanBayArea has a policy whereby it splits any proceeds gained by donated items with the person who brought the item in. As a result, there is now a $100,000 (£65,200) cheque – half of the price paid – waiting for the donator.

So who is the mystery woman? Nobody knows. According to Sky reports, she is believed to be in her 60s, and donated several electronic items in Milpitas, California in April 2015. Mr Gichun confirmed that she told CleanBayArea staff about how she had found the computer parts when cleaning out her garage after the sad news of her husband’s death.

She left no personal details, nor did she fill out a tax receipt for the donations.

Back in 1976 when it was originally released, the Apple-1 was on sale for $666.66 – which after being adjusted for inflation would be the equivalent of around $2,786 (£1,821) today.

It’s not the first Apple-1 in good condition that has been sold at auction. In October 2014 a near-mint condition Apple-1 sold for a whopping $905,000 (£564,000) at a New York auction. Then, in December 2014, another Apple-1 went straight from late Apple founder Steve Job’s garage onto the auction lot. It is the only machine to have been personally sold by Jobs, and went for $365,000 (£230,000).

The hunt continues to reward the mystery donor.

Increasing powers to monitor phone and internet use

By on June 15, 2015 in Blog, Security, Web privacy

New laws proposed in the Investigatory Powers Bill will allow spies and police to have greater power to monitor the public’s phone and internet use.

Civil liberties campaigners are against the new powers, as they believe that they would infringe the privacy rights of UK citizens. A similar bill, known as the ‘snooper’s charter’ was almost introduced in 2012 by Home Secretary Theresa May, but it was roundly blocked by the Liberal Democrats.

Filling gaps in intelligence gathering

Downing Street claims that the new bill will provide authorities with additional tools to keep the public safe. It will also allow them access to communications data which they say is putting lives at risk, whilst also enabling gaps in intelligence gathering to be filled. The bill will focus on monitoring the conversations between paedophiles, terrorists and other serious criminals.

Jim Killock, executive director of The Open Rights Group, stated that not only is data collection on this scale costly, it is possible the bill will result in an “attack” on encryption.

“The government is signalling that it wants to press ahead with increased powers of data collection and retention for the police and Government Communications Headquarters (GCHQ), spying on everyone, whether suspected of a crime or not,” he noted. “This is the return of the ‘snooper’s charter’, even as the ability to collect and retain data gets less and less workable.”

[themecolor]Recording our tweets, emails and online gaming[/themecolor]

Under the new bill, internet service providers and mobile operators could be asked to collect data on what people tweet, who they call, every email they send and even what games they play. However, the police say that the law needs to keep up with advances in technology and that it has long required the ability to better track suspects online.

The Investigatory Powers Bill was included in the recent Queen’s Speech, where 26 other laws were also proposed. Of course, increasing the monitoring powers of the state will always be a contentious issue and this bill still has a long way to go before it becomes law.

For UK businesses, there are clear parallels with the monitoring of internet abuse by staff in the workplace, although happily there are several tried, tested and legal solutions on hand to counter this particular threat.