Last month, Microsoft announced that there was a "significant" step for the update that will allow you to collaborate with your co-workers on Excel, in real-time.
For every operating system there comes a time in its life where Microsoft deems it too old for continued support. This is called "End Of Life" (EOL) for an operating system. Operating systems often last a very long time, compared to the average computer and so you may find that even after a new OS has been released you still prefer your older one. This is perfectly fine but after two or three operating systems have been released since the release of your currently used one, then it may be nearing its EOL.
There has been a new update released for OneDrive and SharePoint Online. It may leave many of you wondering why you still can't Sync with your team's sites. It also doesn't help that Microsoft took a few days to release a changelog explain the update. The update finalised and added the Next Generation Sync Client into the main OneDrive software.
Outlook Customer Manager is being released worldwide in the coming months, or sooner for Office 365 Premium users who opted into it. Free for Office 365 Premium users, this new addition to Outlook makes it easier to manage the relationships you have with your customers. Outlook Customer Manager shows you all your business dealings, meetings, e-mails and conversations organised by contact. This addition to Office 365 comes in the form as an addition to Outlook, therefore only needing an update, not an install of additional software. This will allow you to quickly pick up the addition to Outlook and work with it without having to learn any new tools.
Payment Card Industry Security is an essential for any online business that uses any kind of debit or credit card to make transactions. The PCI Data Security Standard (or PCI DSS) is a standard for companies that handle customer credit card details and bank details. In this blog we will explain the benefits of PCI DSS and how you and your company can reach the standard.
The Cyber Essentials scheme was set up by the government and a group of cyber security experts to help many small to medium sized companies become digitally secure against 80% of known cyber threats. In this blog we will explore how Cyber Essentials could help your business, point you to several ways of implementing it, and suggest other things you can do to make your network secure.
Voice over IP (VoIP) telephony has been gaining traction for some years now, but many businesses have yet to take advantage of SIP trunking, a technology essential for the full realisation of the benefits of VoIP and other tools.
SIP (Session Initiation Protocol) is a communications protocol designed specifically for multimedia communications running over Internet Protocol (IP) networks, such as the typical company network, and the Internet itself. It is most commonly used to underpin VoIP, video call and instant messaging applications.
With the end of the final TV debate of the 2016 US election, what is left that could change the results of the November vote? Analysts claim that Facebook’s "I Voted" button could have a potential influence over voter turnout. The so-called "Voter Megaphone" allows you to show that you have voted and see if your friends on Facebook have also voted. But by how much could it change the Presidential race in the US and its polls?
Millions of people have recently found out that they not only have a Yahoo account but also that it has been hacked. Many large companies such as BT use Yahoo to base e-mail accounts for their customers. Anyone with an email address ending with "@btinternet.com", "@btopenworld.com" or "@talk21.com" could have been indirectly hacked and their details leaked.
"6 months ago a contractor who worked at my family business attempted to steal it from me. By the time we caught him out and involved the police he had stolen our domain name, goode review account authority, controlled a website in my business name and was passing himself off online as the business owner. This had a devastating effect on my customer retention and the ability for prospective customers to even find my phone mumber.
Without the superb help I recieved from Justin and Andrew at Bongoit, I would not have been able to regain ownership of my businesses online presence. At every stage they were key in providing the help and support I needed. No matter how busy they were, what time of day or how little notice they recieved, they were there, on the phone and ready to talk my solicitors through aburdly complicated internet/legal jargon and provide expert testimony that without doubt was the deciding factor ond turned the tide.
5 stars is not enough.
Use BongoIT if you need help.
Thank you Bongo!"
Enjoy the blog post? Then you would love our newsletter! Sign up here Signup and get a free Office 365 pitfall PDF guide
Call us on: 01865 988 217
In recent reports it has been found that the Chinese tech company Lenovo has made their most recent batch of laptops locked into Windows 10. Many have suspected that they had a deal with Microsoft but Lenovo has denied this. This, however, is not the first time Lenovo has tried to constrict what user are able to do on their hardware.
In the aftermath of Cryptolocker and Gameover Zeus, is the threat of ransomware still significant? How does ransomware work? How can ransomware be prevented or even removed form the internet completely?
The fight against ransomware and all viruses in general is always an uphill struggle. Your typical anti-virus programs can only prevent attacks from viruses and malware from programs it recognises as threats such as the famous Crytolocker.
In June last year the network provider and multi-million dollar company Ubiquiti was scammed out of $46.7 million and has since been only able to recover $8.1 million with prospects of another potentual $6.8 million. This one blunder will set them back at least $31.8 million. These crimes have inspried other CEOs and executives to fight back against the criminal hackers.
The new cloud regions in the UK become part of one the world’s largest online storage infrastructures, supported by more than 100 data centres globally. Several large organisations have already signed a new contract with Microsoft to use these new data centres including the Ministry of Defence.
At the G20 summit in China yesterday, President Obama stated that: “We have had problems with cyber intrusions from Russia in the past, from other countries in the past.” and that now “we are moving into a new area where a number of countries have significant capacities. And frankly we have more capacity than any other country, both offensively and defensively.”.
Readers be advised, idetity theft is on the rise. In the UK alone there were 148,000 victims during 2015 according to the fraud prevention service Cifas. This is up by 57% from previous years. And as if we were not worried enough by Ransomware and Brexit!
The ability so keep a record of emails being sent and who sent them when using a shared mailbox. This feature is especially useful when using a shared mailbox which could have several users, and is essential for some businesses.