Beware these free tools – they may be hiding ransomware

Beware these free tools – they may be hiding ransomware

Ever needed to quickly convert a file, say, from a Word doc to a PDF? And found yourself Googling for a free tool to do it?

It seems harmless enough, right?

A quick download, a fast conversion, job done.

But what if I told you that one small click could secretly open the door to ransomware or data theft?

That’s exactly what the FBI is warning about right now. Yes, the FBI.

A file converter does exactly what it says. It takes a file in one format and turns it into another. Maybe you’ve got a PowerPoint that needs to be turned into a PDF for a client. Or you’ve got a bunch of images you want to bundle into a single document.

These tools are often free, and they work. But that’s where the danger lies. Because some of them come with strings attached.

Cyber criminals are using some of these free converters as a cover for more sinister activity. While the tool does what it promises, behind the scenes, it may also be installing something nasty on your system. Such as malware or even ransomware.

What does that mean?

Malware is malicious software. It’s designed to do something harmful without your permission. It might steal your data, spy on your activity, or mess with your files.

Ransomware is one of the worst types of malware. It locks your files so you can’t access them, then demands a payment (usually in cryptocurrency) to unlock them. It’s like someone sneaking into your office overnight, putting all your important documents in a safe, and then charging you to get the key.

Worse still, these tools can also scan the files you upload and scrape them for sensitive information. That could be things like your passwords, banking details, or even personal data. If you’ve ever uploaded something with a customer list, an invoice, or employee details, that’s the kind of gold cyber criminals are after.

The problem is these tools often look perfectly legitimate. And they do what they say on the tin, which makes them hard to spot. That’s why it’s so important to be cautious.

If your business needs quick file conversions, it’s far safer to use trusted, professional tools. The kind that come from known software providers, not random websites you find in a pinch.

Knowing how these scams work is your first line of defence. So, if you or your team ever use online tools like this, it’s worth reviewing where they come from… and whether they’re putting your business at risk.

Need help setting up safe, secure software alternatives for your team? We can do that – get in touch.

This tiny tweak to Teams will make meetings smoother

This tiny tweak to Teams will make meetings smoother

Have you ever sat in a Teams meeting and found yourself gritting your teeth every time someone said, “next slide, please”?

Me too.

And if your business runs a lot of online meetings or webinars, you’ll know the frustration of clunky handovers and awkward pauses when switching between presenters.

Well, there’s good news. And it’s about time.

Microsoft is rolling out a small but mighty update to Teams that’s going to make a surprisingly big difference to how your meetings run.

First, if you’re not too familiar with Teams, let’s quickly cover the basics. It’s Microsoft’s all-in-one communication platform. Video calls, chat, file sharing, and collaboration tools are all combined in one place.

Whether your team is remote, hybrid, or all under one roof, it helps everyone stay connected and productive without needing to jump between lots of different apps.

Back to the update. Microsoft’s introducing a feature that will let multiple people control the presentation slides during a Teams meeting or webinar.

Right now, if you’ve ever tried to co-present in Teams, you’ll know that only one person has control of the slides. Everyone else is stuck asking the presenter to move things along. That’s not only frustrating, but it also breaks the flow of the meeting.

This new feature will let the meeting host hand over slide control to more than one person.

That means if you’ve got a few people presenting different parts of a deck, each of them can take control of the slides when it’s their turn, without stopping the meeting or awkwardly calling out instructions. It sounds like a small thing, but in practice, it’ll make meetings feel much more natural and professional.

This feature has started to roll out already, beginning with the Windows desktop version of Teams. It’ll likely involve the host selecting co-presenters when setting up the meeting. Hopefully, the setup will be as smooth as the presentations will be.

To me, this is one of those updates that should have been added years ago. But hey, better late than never, right?

Alongside other recent improvements like real-time text messaging during calls (great for those who prefer typing over talking), it’s clear Microsoft’s working hard to make Teams more flexible and intuitive.

Need help getting the most out of Microsoft Teams or other tools in Microsoft 365? That’s what my team and I are here for. Get in touch.

Overconfident employees: Your hidden cyber security threat?

Overconfident employees: Your hidden cyber security threat?

You trust your team, right?

They’re smart, capable, and they know better than to click on suspicious links or open unexpected attachments.

They already know that phishing emails look trustworthy on purpose. To trick them into giving away sensitive data or downloading malicious software.

So, they’re not the type to fall for it.

At least, that’s what they think…

Here’s the problem: Just because someone’s confident they could spot a phishing attack, it doesn’t mean they can. It’s a false sense of security – and it’s exactly what cyber criminals count on.

New research has found that a huge 86% of employees believe they can confidently identify phishing emails… yet over half of them have fallen for some form of scam in the past.

Think about that for a second.

These are people who knew about phishing, felt sure they wouldn’t be tricked, and yet still got caught out. That’s because cyber criminals aren’t just sending out the obvious “foreign prince” emails anymore. They’re using sophisticated tactics like:

  • Emails that look like they’re from your bank or suppliers.
  • Fake invoices that appear totally legitimate.
  • Messages that seem to come from your own colleagues.

Because phishing scams have evolved, they’re much harder to spot. And when someone thinks they’re too smart to fall for one, that’s when they’re most at risk.

Overconfidence in cyber security is a classic case of the Dunning-Kruger effect – a psychological phenomenon where people tend to think they know more than they do.

What’s the problem with being too confident?

Well, when people believe they’re invincible to scams, they don’t take the necessary precautions. Instead of double-checking links or questioning unexpected emails, they just assume “I’d never fall for a scam” and carry on clicking. This is how cyber criminals end up accessing business systems and data.

So, what’s the good news?

You can lower the risk of getting hit by a phishing attack. But it starts with a shift in mindset. Instead of assuming your people know what they’re doing, make sure they’re properly informed. Regular phishing awareness training can make a massive difference, helping your staff to recognise newer and more subtle scams before it’s too late.

Training alone isn’t enough, though. Your employees also need to feel comfortable reporting anything suspicious, or they might stay quiet about a potential scam. And that gives cyber criminals the upper hand. Creating a workplace culture where security concerns are welcomed (not criticised) is just as important as education.

Cyber security isn’t about intelligence; it’s about vigilance. Even the most tech-savvy employee can be caught off guard by a well-crafted scam. The key is to assume a threat is real, remain cautious, and never rely on confidence alone. 

The moment someone thinks “I’d never fall for that” is often the moment they do.

Could automation save you from spreadsheet headaches?

Could automation save you from spreadsheet headaches?

Spreadsheets have been a go-to business tool for decades now. They’re familiar and easy to use (and if we’re being honest, we can all feel like a bit of a genius when we get that one formula to work, right?).

The problem is, 90% of businesses are still relying on outdated spreadsheets to manage important data, even though they’re slowing things down and increasing the risk of errors.

Think about it: How often do you get stuck manually entering data, fixing mistakes, or trying to figure out if you’re looking at the latest version of that important spreadsheet? It’s so frustrating – and you’re not alone.

Research shows that although 82% of businesses have automation on their roadmap, only 43% plan to implement it in the next year. This means that many businesses are still dealing with the same spreadsheet-related headaches, when they could be working much more efficiently.

So, how could automation help your business?

Instead of spending hours plugging in numbers and double-checking calculations, automation tools can handle data collection, processing, and reporting for you. That means fewer mistakes, less time wasted, and real-time updates that keep everything running smoothly.

Automation tools also come with built-in security features, so you don’t have to worry about who has access to what.

Despite all these benefits, a lot of businesses are hesitant to make the switch. Spreadsheets feel safe and familiar, and change can be intimidating. But sticking with outdated tools is holding you back.

The good news is you don’t have to overhaul everything overnight. Start small. Look at the areas where automation could save you the most time and hassle, like payment tracking, customer data, or reporting.

Once you see how much easier things get, you’ll wonder why you didn’t switch sooner.

If you’re ready to see how automating some of your business processes could improve productivity, we can help. Get in touch.

Did you notice Incognito mode’s improved privacy?

Did you notice Incognito mode’s improved privacy?

If you’ve ever used Incognito mode in Chrome, you probably know the basics: It lets you browse without saving your history, cookies, or other temporary data.

But was it ever truly private?

Not entirely…

Until recently, if you copied something from an Incognito tab, like text, an image, or a web address, Windows could still save it in your clipboard history and even sync it to other devices.

Not exactly what you might want from a “private” browsing session, right? 

Microsoft has quietly stepped in to fix that loophole, making Incognito mode even more private.

When you open an Incognito tab in Chrome (or InPrivate mode in Edge), your browser stops saving: 

  • Your browsing history (so nobody else using your device can see what websites you’ve visited) 
  • Cookies and site data (so websites won’t remember you after you close the tab) 
  • Form data (so your browser won’t autofill your details next time) 

This can be handy for things like: 

  • Checking flight costs or hotel bookings without tracking cookies causing price hikes 
  • Logging in to multiple accounts without having to sign out 
  • Using a shared computer without leaving a trail 

Let’s say you’re copying confidential business information or a personal message while in Incognito mode. Before this update, Windows would have saved that copied text in your clipboard history, meaning anyone who pressed Windows Key + V later could see it. 

Even worse? If you had Cloud Clipboard enabled (which syncs clipboard data between Windows devices), your copied content could end up on another device entirely.

Microsoft spotted this issue and patched it, making sure that when you copy something in Incognito mode, Windows won’t save it to your clipboard history or sync it to the cloud.

So, now your activity truly disappears when you close the tab (Google has since picked up this change and rolled it into Chrome updates for everyone.) 

Meanwhile, Microsoft has made another small but useful privacy improvement: Media previews are now hidden when using Incognito mode. 

Normally, when you play a YouTube video (or any media) in Chrome, Windows shows a preview of what’s playing whenever you adjust the volume or check the media panel. If you’re on the lock screen, it even shows details like the video title and artwork. 

Watching something in Incognito? Thanks to the update, now it just says, “A site is playing media”. No titles, no thumbnails, no details. 

This means that if you’re watching a sensitive video (business-related or otherwise), there’s no accidental exposure if someone else glances at your screen. 

If you use Incognito mode for private browsing, you’re now getting better protection than before, even if you didn’t realise there was a problem in the first place.

But remember: Incognito mode still doesn’t hide your activity from your internet provider, work network, or the websites you visit. It’s great for local privacy on your device, but it won’t make you completely anonymous online. 

If you need help making sure your sensitive business data stays private, get in touch.

Copilot could soon auto-open in Microsoft Edge

Copilot could soon auto-open in Microsoft Edge

Microsoft is really leaning into AI lately. And its latest idea is to make Copilot open automatically when you launch Microsoft Edge. Right now, if you want to use Copilot in Edge, you must click the little icon in the sidebar. No big deal.

But the auto-open feature would mean Copilot is there, ready and waiting in the sidebar, as soon as you open your browser or start a new tab.

Some people would love this, and some people won’t. But either way, it’s looking more and more like Microsoft wants Copilot to be an everyday part of using Edge. 

Another feature being tested is an “Ask Copilot” button in the Settings menu. This would mean if you ever got stuck trying to change a browser setting, for example, you could just ask Copilot for help instead of digging through all the options. If it works well, it could become a great time-saving feature for businesses.

If your team uses Edge, here’s how you could benefit: 

  • Faster troubleshooting: Something in Edge not working? Instead of searching Google (or calling IT), you could just ask Copilot for help. 
  • AI on standby: Whether you need help summarising a long article, brainstorming an email, or even writing a quick message, Copilot would always be open and ready. 
  • Better security: Microsoft is also testing “Scareware Blocker”, an AI-powered feature that helps detect and block scam websites in real time. 

It’s hard to say when these updates could roll out, if they roll out at all. Microsoft loves to test features in Edge Canary (its experimental version of Edge), but not everything makes the final cut. 

That said, Microsoft has been pushing AI hard, so there’s a good chance this will stick. 

Auto-open for Copilot could be helpful if you like AI and want a built-in assistant that’s always ready to go. But if you prefer your browser to be just a browser, then this update might be annoying.

And of course, there’s the question of privacy. Microsoft hasn’t said how this will work yet, but if Copilot is always open, some people might feel a little uncomfortable with that. 

If this rolls out, Copilot could become a permanent fixture in Edge, helping you work smarter, troubleshoot issues, and stay safe from scams. If Microsoft considers privacy concerns and gives you the option to turn it off (which is possible), it could be a great new addition.

Need a hand getting started with Copilot? We can help – get in touch.

How concerned should you be about cyber attacks?

How concerned should you be about cyber attacks?

Do you feel like you’re constantly hearing about cyber attacks lately?

You’re not imagining things.

Cyber attacks are on the rise. And they’ve overtaken other risks as the number one concern for many businesses worldwide. From ransomware and data breaches to IT disruptions that bring operations to a standstill, cyber threats are keeping business owners up at night – and for good reason.

Imagine losing access to your customer database, having sensitive information leaked, or being locked out of your systems until you pay a large ransom. These aren’t just hypothetical scenarios… this is the nightmare faced by businesses of all sizes every day.

If your business becomes a victim of a cyber attack, the impact could be devastating. It can lead to everything from financial loss to a damaged reputation, not to mention the cost of downtime while your business recovers.

Advancements in technology – especially artificial intelligence (AI) – have given cyber criminals access to more sophisticated tools, making it easier for them to launch attacks.

Cyber incidents are one of the main reasons for business interruption, which is where operations grind to a halt due to unexpected events (like glitches and cyber attacks). As our dependence on digital tools grows, so does the need to protect them.

We bring good news. While cyber threats are evolving, so are the tools designed to combat them. AI-powered technologies can provide better insights, help detect threats earlier and allow for faster responses.

But even with advanced tools, the human element remains crucial. Your employees need to understand the risks and be trained to recognise potential threats, whether it’s a suspicious email or unusual activity in your systems.

So, how concerned should you be about cyber attacks?

Very.

We see that as a good thing. The more aware you are about how serious these threats are, the better you can protect your business. The key is to be proactive. Stay informed, invest in strong security measures, and make your team one of your greatest defences.

If that sounds overwhelming, don’t worry; we can help prepare your employees and make your systems safer. Get in touch.

How to create secure passwords

How to create secure passwords

Weak passwords are one of the biggest security risks to your business.

Why?

Because cyber criminals are getting smarter than ever before. If they manage to crack just one password, they could gain access to your sensitive business data, financial information, or even gain control of your entire system.

Cyber criminals use automated tools to guess passwords, allowing them to try out millions of combinations in seconds. So, if you’re using something like “Password123” or “CompanyName2025”, you’re practically handing them the keys to your business.

A compromised password can lead to big issues, such as:

  • Data breaches
  • Financial losses
  • Identity theft
  • Reputation damage

But how do you create strong passwords without driving yourself (and your team) mad?

Think of your password like a secret recipe, where only you should know the ingredients. It should:

  • Be at least 14 characters long (the longer, the better)
  • Include a mix of uppercase and lowercase letters
  • Contain a few numbers and symbols (like @, $, %, or &)
  • Not contain any common words or easily guessable information (like birthdays, names, or the word “password”)

Instead of using a single word, you could try a passphrase – a short, random sentence that only you would understand. For example, instead of “Sailing2025”, try something like “Coffee&CloudsAreGreat9!”. This is much harder to crack, yet still easy to remember.

You should also steer clear of these common mistakes:

  • Using personal info (your name, birthday, business name, etc.)
  • Reusing the same passwords across multiple accounts
  • Using simple sequences (“123456” or “abcdef”)
  • Storing passwords in an easily accessible place (like a sticky note on your desk)

If remembering unique passwords for every account sounds impossible, there is another option: Password managers. These generate strong passwords, store them securely and autofill them for you.

With a password manager, you only need to remember one strong master password for the manager app itself. The rest are encrypted and stored safely, reducing the risk of data breaches.

Even the strongest password isn’t foolproof, which is why multi-factor authentication (MFA) is also important. MFA requires a second form of verification, like a one-time code sent to your phone or generated from an authentication app.

If you have employees accessing your business systems, it’s a good idea to have a password policy in place to explain your rules and why they’re important. This should include:

  • Unique passwords for each system and account
  • Regular security training on password best practices
  • Business-wide use of MFA for critical systems
  • Scanning for compromised passwords regularly

By making password security a priority, you can reduce the chances of a cyber attack creating a nightmare for your business.

And if you need help making your business more secure, get in touch.

Beware these common ‘malvertising’ attacks

Beware these common ‘malvertising’ attacks

Think about the last online ad you clicked…

Did you just assume it was genuine?

If you said yes, you’re not alone – and this is exactly what scammers are counting on.

“Malvertising”, or malicious advertising, is where scammers use online ads to trick you into downloading malware (malicious software), sharing sensitive information like passwords, or even handing over money.

These attacks are becoming more sophisticated, and they’re a growing threat to businesses of all sizes. Worse yet, you don’t even need to click on these ads to become a victim; just loading the ad in an out of date browser can be enough to compromise your device.

The three most common malvertising techniques are known as scam malvertising, fake installer malvertising, and drive-by download malvertising. Here’s a little more about them:

  • Scam malvertising is where an ad claims that your computer is infected and urges you to call for support. Once you do, the scammers convince you to install software that gives them control over your system. Then they charge you to “fix” the fake issue.
  • Fake installer malvertising often uses ads that lead you to cloned websites of brands you trust. You download software, thinking it’s legit… but, instead, you’re downloading malware onto your device.
  • Drive-by download malvertising is where ads infect your computer without you even clicking on anything. This type of malvertising exploits outdated browsers and installs malicious files or extensions automatically.

Recognising these scams is the first step to keeping your business safe. If you see an ad claiming you’ve been hacked or urgently need to act, stop and think: How would this company even know anything about your computer?

Also, make sure you double-check links before you click. If the link isn’t sending you to a legitimate domain, steer clear. And most importantly, make sure you’re running the latest version of your browser, as updates patch vulnerabilities that malvertising often exploits.

Don’t forget to share this knowledge with your employees, too. They’re your first line of defence – and training them to spot suspicious ads can save your business from serious trouble.

Scammers want you to trust without thinking. But a healthy dose of scepticism can make all the difference. Next time you see an ad that feels wrong, trust your gut… and ask yourself if it’s safe before you click.

Want to train your team to protect your business from malvertising and other online scams? We can help, get in touch.

How to Effectively Manage Your (new) Remote Workforce

Common Challenges

Fortunately, working remotely isn’t a new thing. There are millions of people across various industries that have been managing to work from home successfully for years, from freelance web designers all the way to billionaire CEOs. That means we’re not starting from scratch, we have actionable data, tips, tricks and insights from remote-work veterans. One of the best ways to start is by looking at the most common challenges that newly remote staff face, and address the concerns of employers.

Managers, directors and employees often express concerns over the lack of face to face interaction. Supervisors worry that employees will take the opportunity to slack off or be otherwise inefficient and fail to produce optimal results (research proves that these stigmas have no factual basis for over 78% of home-based workers).

On the other hand, some employees (under 9%) feel that they lack managerial access and support. Some studies have shown that remote workers feel their out-of-reach managers aren’t in-touch with their actual needs and therefore aren’t equipped to offer the support their teams require.

Lack of accessible information is another common challenge your newly remote workforce can be faced with. Even getting answers to simple questions from colleagues can prove a difficult task. We find that having company-wide intranets or basic internal wiki pages can ease the vast majority of information-related issues. Text based instant messaging between your employees through an internal system like Microsoft Teams helps to alleviate wait times between emails for time-sensitive feedback and communication.

Then there’s the big “what if”, the unknown. Trust plays a large part of managing a remote team. When you think “remote work” or “work from home” you’re programmed to believe it’s unproductive. Why? For years, we’ve been bombarded with articles, tv shows and movies that depict it as an ‘easy’ alternative to ‘real work’, a way for slackers to get by. Then there’s all the photos of mothers laying on the sofa with one hand on their laptop and the other wrapped around their new-born baby. None of this could be further from the truth.

Virtual work isn’t easy, it’s not only for stay-at-home parents, and the vast majority of the world’s remote workforce simply aren’t sitting on the sofa perusing Facebook or reading Martha Stewarts latest fat-free cheesecake recipes. It’s hard work, that does of course come with the benefits of providing a great work/life balance. Once you’ve mastered the art of remote work, you’ll become a happier, more efficient and productive employee. You might even be able to find a couple of minutes to get some laundry done or fill the dishwasher.

Establish Daily Check-ins

The workplace daily check-in was largely popularized by North American fur traders in the late 1500’s. Originally used as a way to easily communicate when the remotely located Native Indian tribes had fur shipments ready to be collected for transport. It was effective then, and it’s equally as effective now. It’s not recommended to travel on horse-back to deliver handwritten scraps of paper of course, we’ve since modernised and become accustom to video calls and mobile phones.

Establishing daily check-ins with teams or individuals helps everybody get on the same page, where the team is up to and how the day’s tasks are laid out. Make sure to leave some time for a non-evasive personal note, ask somebody how their weekend was, if they’ve been watching a particular series on TV. You’ll be surprised how much your staff’s morale can be affected, and how the little things boost motivation.

Establish a Variety of Communication Options

We live in a connected world, with a society that thrives on social interaction. It’s true that not all humans get their social needs dealt with through the same ways. For example, some people won’t hesitate to pick up a phone and make a call to a friend or family member.

Not too far from those people, are those who crave face to face social connection – In cafes or going out on a Friday night for example. Then on the other end of the spectrum, there’s the stereotypical gamer, getting their social fill through talking to people they’ve never met, whilst digital bullets fly across sci-fi themed landscapes.

With all this in mind, huge, international companies have devised a wide range of different work-related communication options, instant messaging, emailing, video calling, cloud-based phone systems, the list goes on.

The most successful remote companies have implemented a multitude of different options for both their staff, and their clients. It’s good to tick a few boxes, and there’s a huge choice of technologies to help you achieve them.

  1. Internal Info Hub – Microsoft Teams, SharePoint, Facebook Workplace, Google Plus.
  2. Instant Messaging – Microsoft Teams, Slack, Facebook Messenger, Google Hangout.
  3. Video Calls & Conferencing – Microsoft Teams, Zoom, Google Duo.
  4. Cloud Phone System – BlueBox Hosted, PBX, 3CX, Panasonic, Spek.

Opportunity for Remote Social Interaction

In situations where you’re forced to work from home, it’s a good idea to stimulate social interaction between your staff and different teams. Different businesses do it in different ways, we’ll look at some of our personal favourites from small and large companies alike.

Lunch Dates

Encourage teams to organise video-based lunch dates, even if it’s just a brief get-together between 2 or 3 people. How does it work? It’s a really simple one – jump on a video call and have lunch like you were in the office kitchen area.

Poker Breaks

Although not such a popular ‘sport’ in the UK as it is in the US, Poker and other card games are highly effective at engaging people and provide much needed downtime and a solid social aspect. How can you play inter-team card games like Poker?

There’s plenty of options, you can try out an online browser-based card game that supports multiplayer like PokerStars, GGPoker or any of the multiplayer Miniclip games. You can also try video poker, where a member of the team acts as a dealer, with their camera facing top-down on the cards that are played on the table.

Pizza Party

One of the popular ideas from Google’s globally distributed remote teams is to have organized pizza parties. Usually taking place on a Friday, the employer or team leader will arrange for pizzas to be delivered at the same time to each of the staff, who will then open their pizzas during a video call – much like the lunch date option, but more rewarding since it’s a free pizza!