2015 Technology Recap
Microsoft released its latest Operating System to consumers on July 29, 2015.
Microsoft described Windows 10 as an ‘operating system as a service’ that would receive ongoing updates to its features and functionality, augmented with the ability for enterprise environments to receive non-critical updates at a slower pace, or use long-term support milestones that will only receive critical updates, such as security patches, over their five-year lifespan of mainstream support.
Windows 10 received mostly positive reviews upon its original release in July 2015.
Microsoft Released Office 2016
The new office. Takes the work out of working together….. Microsoft released office 2016 on 22 September, 2015. It is the new version of Office, the first one that is designed and built from the ground-up for mobile and cloud. The user interface design of Office 2016 for Windows is relatively unchanged from its predecessor, Office 2013. It retains the flat design that was introduced along with Microsoft design language, albeit a few modifications to the layout are made, in order to conform with the design of Microsoft Office Mobile.
Why the post office emails scam still works….
Cyber criminals have been deceiving users for a few years by using the post office emails scam. People fall for it because the post office is one of the most familiar institutions for them and one which they trust. They often don’t give it a second thought before clicking on a link in that email without checking the sender’s email address. These are fundamental mistakes that cyber criminals are aware of and take advantage of consistently. Once you click on the link you have just become a victim of a Cryptoaware attack!
Cyber Insurance – do you need it? Our client Midland Insurance Brokers explains….
What security do you have for your Cyber (IT data) information if it is:-
- Breached by technology failure?
Data breaches affect hundred of millions of IT records a year with reports increasing at a dramatic rate!
This can cause (to name a few):
- Loss of funds as result of illegal transfer by fraudulent input of data
- Financial loss by threat of ransom
- Privacy notification expenses
- Vandalism caused by an employee
- Reputational harm to your business
Plus many other contingencies cause by Cyber attack.
The following claims were all covered under various Cyber policies- how would your business react if such an event occurred?
a) A business emailed, as part of their marketing strategy, promotional documents to their existing clients. However, in error, the company accidently attached a document that contained personal client data, including credit card numbers. Upon legal advice, it was recommended that all clients be notified of the breach, and should also be offered credit card monitoring services. Furthermore, several parties commenced legal action against the company in question. All costs incurred were covered under the policy.
b) An organisation’s database was hacked, and was subsequently encrypted by a disillusioned ex employee. The entire database was held at ransom for $1 million. The cyber policy reacted and paid the ransom fee. c) An employee of a financial institution accidently left his laptop in a public place. It contained highly sensitive data, which was subsequently compromised. Total defense costs totaled almost $1 million. The cyber policy covered this breach.
Do you want to know more?
Then please give a ring or email:
Peter Stanfield 03 9340 0103 0401 023 243 firstname.lastname@example.org Andrew Woff 03 9788 7513 0477 999 904 email@example.com