Search for anything.

Your search for: "" revealed the following:

Search...

Consider IT
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us

Consider IT
0131 510 0110Contact Us For A Free Quote
[email protected]Consider IT Limited, Waterview House, Edinburgh, EH6 6QU
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us
Consider IT
Consider IT
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us

Your search for: "" revealed the following:

Search...

Posted by stuart.gilbertson

HomeArticles Posted by stuart.gilbertsonPage 3
Recent Posts
  • Cyber Risks for Charities: How to Safeguard Your Organisation
    Oct 24 2024
  • Upcoming Cyber Essentials Changes in April 2025
    Sep 27 2024
  • Consider IT is now a certified B Corp Text on Blue and Orange background
    Celebrating a New Milestone: Consider IT Becomes a Certified B-Corp
    Jun 04 2024
  • Consider IT blog title: Over 19000 sensitive documents stolen in Volkswagen breach overlayed on orange and blue gradient background
    Volkswagen Group has over 19,000 sensitive documents stolen in Cyber Attack
    Apr 24 2024
  • Blog Title 7 strategies to combat malware and ransomware on a blue and orange gradient background
    Staying Ahead of the Game: 7 Strategies to Combat Malware and Ransomware
    Apr 19 2024
  • Blog title The cost of a cyber attack on a blue and orange gradient background
    Counting the Costs: Understanding the Financial Impact of Cyber Attacks on Businesses
    Mar 19 2024
  • Blog title The Importance of Cyber Security Awareness training on a blue and orange gradient background
    The Importance of Cyber Security Awareness Training
    Feb 28 2024
  • Blog title Why choosing and independent IT support provider trumps big corporations on a blue and orange gradient background
    The Personal Touch: Why Choosing a Local, Independently Owned IT Support Provider Trumps Big Corporations
    Jan 10 2024
March 28, 2018

New Privacy Settings Announced by Facebook

Facebook has claimed that an overhaul of its privacy tools is the answer to the problems faced by people trying to understand what personal data Facebook has on them, and how it uses that data. In a blog post which announces the changes,  Erin Egan, VP and Chief Privacy Officer, Policy and Ashlie Beringer, VP and Deputy General Counsel announce the changes Facebook will make to make things “easier to find”.

No mention is made to what they do with the data in the post, only that the policies, terms and conditions, and usability will all be changed in light of the recent public backlash and bad publicity Facebook have faced last week.

Facebook says the revamp was already planned ahead of the recent scandal in order to comply with new EU (GDPR) rules.

The post highlights changes such as how to:

  • Make your account more secure;
  • Control your personal information;
  • Control the ads you see;
  • Manage who sees your posts and profile information.

The blog post comes just days after CEO Mark Zuckerberg decides not to appear before an MP summons on data misuse at the business.

stuart.gilbertson
March 28, 2018
0
Share:
March 27, 2018

Facebook boss, Zuckerberg, refuses MP summons on data misuse

The UK Digital, Culture, Media and Sport Committee wrote to CEO Mark Zuckerberg on 20th March 2018 to summon him to explain how social media data is being used (or misused) for political advert targetting.

A Facebook spokesperson has said they will be sending its CTO or Chief Product Officer to answer questions instead.

“We have responded to Mr Collins and the DCMS and offered for two senior company representatives from our management team to meet with the Committee depending on timings most convenient for them.”

On 17th March, reports in the Observer of London and the New York Times claimed Cambridge Analytica, a UK political agency, was able to purchase data about 50 million Facebook users in 2015 to use for targeted political advertising.

stuart.gilbertson
March 27, 2018
0
Share:
March 20, 2018

50 Million Facebook Profiles Harvested

The data analytics firm that worked with Donald Trump’s election team and the winning Brexit campaign harvested millions of Facebook profiles of US voters, in one of the tech giant’s biggest ever data breaches, and used them to build a powerful software program to predict and influence choices at the ballot box.

On Monday, Channel 4 News broadcast hidden camera footage in which Cambridge Analytica chief executive Alexander Nix appears to suggest tactics his company could use to discredit politicians online.

In the footage, asked what “deep digging” could be done, Mr Nix told an undercover reporter: “Oh, we do a lot more than that.”

The UK’s Information Commissioner is to apply to court for a warrant to search the offices of London-based political consulting firm, Cambridge Analytica.

The company denies any wrongdoing.

stuart.gilbertson
March 20, 2018
0
Share:

Come and control our Christmas Lights!

logo

We’re at it again! This year is even bigger and better with more lights to choose from. Come annoy the team with the new rendition of Jingle Bells that plays in the office!

Click here: http://christmas.considerit.com

stuart.gilbertson
December 20, 2017
0
Share:

Global Wi-Fi Vulnerability

What’s happened

A researcher has found a way to compromise the most common Wi-Fi security standard which allows an attacker to look at traffic on the network, and in some cases, manipulate the data.

 

What’s affected

Android, Linux, Apple, Windows, OpenBSD, MediaTek, Linksys, and others, are all affected by some variant of the attacks

The weaknesses are in the Wi-Fi standard itself, and not in individual products or implementations. Therefore, any correct implementation of WPA2 is likely affected. To prevent the attack, users must update affected products as soon as security updates become available.

In general, any data or information that the victim transmits over Wi-Fi can be decrypted.

 

What are we going to do

Resolving the security problem is likely to involve applying security update to routers. Consider IT will actively manage and maintain the security of your network as and when a patch becomes available.

In the meantime, it comes down to risk management. Do you want us to disable Wi-Fi company-wide? Do you want to continue using Wi-Fi for the foreseeable.

On the basis that users on Wi-Fi stay vigilant for websites that should be over HTTPS (the green padlock), our risk analysis shows that this is a moderate to severe risk. The likelihood of being attacked is low.

Our recommendation is to stay alert to your browsing habits. Make sure that where possible the device has Wi-Fi disabled and is cabled in. Should a website you expect to operate over a secure connection (HTTPS green padlock) fails to load or doesn’t establish that secure connection, the user raises it as a priority.


More Details

Computer security expert from the University of Surrey Prof Alan Woodward said: “This is a flaw in the standard, so potentially there is a high risk to every single wi-fi connection out there, corporate and domestic.

“The risk will depend on a number of factors including the time it takes to launch an attack and whether you need to be connected to the network to launch one, but the paper suggests that an attack is relatively easy to launch.

“It will leave the majority of wi-fi connections at risk until vendors of routers can issue patches.”

Dr Steven Murdoch from University College, London said there were two mitigating factors to what he agreed was a “huge vulnerability”.
“The attacker has to be physically nearby and if there is encryption on the web browser, it is harder to exploit.”

stuart.gilbertson
October 16, 2017
0
Share:

Dell ditch their printer line

Dell confirmed to Consider IT today that they have stopped selling their popular printer hardware. After quizzing a third-party wholesale supplier, the Dell online chat service, and our Dell Direct Account Manager, we can today confirm that Dell has made the decision to stop selling printers as part of their hardware offering (in the UK at least).

This morning we checked the Dell website and confirmed that all printers had been removed from the Dell UK section, with the exception of their large workhorse C7765dn model.

Speculation could lead us to believe this is the direct result of some sort of fall-out from the recent Dell EMC merger.  We found an interesting article from late 2015 on the merger that says:

It makes you wonder how Dell’s acquisition of EMC will affect its printer business. We don’t know how much revenue or profit the printer business generates for Dell since it is a private company (and even when Dell was public, this information was hard to ferret out), but printer sales will be a tiny portion of the combined business. And factoring in the cost of the acquisition—Meg Whitman, CEO of HP, claims Dell will pay $2.5 billion a year in interest alone—the pressure will be on at Dell to improve or cut underperforming lines.

http://www.action-intell.com/2015/10/14/what-dells-acquisition-of-emc-says-about-the-printer-industry/

The ditching of the printer line from Dell is a blow to small businesses that rely on high quality, affordable, and reliable printer solutions. It also means that the fantastic warranty upgrades that were available on the product line (next business day support for example) are now no longer obtainable.

Looking at a sample of Dell printers we currently support, it looks like they are in fact just re-branded Xerox or Samsung printers, or even Zebra ID card printers. This change from Dell could also be as a result of HP buying Samsung’s printer business: http://www.bbc.co.uk/news/business-37337989

We have also been able to obtain an official statement from Dell which can be seen here: Update on Dell’s Imaging Business Letter

stuart.gilbertson
September 19, 2016
0
Share:

Dell ditch their printer line

Dell today confirmed to us that they have stopped selling their popular printer hardware. After quizzing a third-party wholesale supplier, the Dell online chat service, and our Dell Direct Account Manager, we can today confirm that Dell has made the decision to stop selling printers as part of their hardware offering (in the UK at least).

This morning we checked the Dell website and confirmed that all printers had been removed from the Dell UK section, with the exception of their large workhorse C7765dn model.

Speculation could lead us to believe this is the direct result of some sort of fall-out from the recent Dell EMC merger.  We found an interesting article from late 2015 on the merger that says:

It makes you wonder how Dell’s acquisition of EMC will affect its printer business. We don’t know how much revenue or profit the printer business generates for Dell since it is a private company (and even when Dell was public, this information was hard to ferret out), but printer sales will be a tiny portion of the combined business. And factoring in the cost of the acquisition—Meg Whitman, CEO of HP, claims Dell will pay $2.5 billion a year in interest alone—the pressure will be on at Dell to improve or cut underperforming lines.

http://www.action-intell.com/2015/10/14/what-dells-acquisition-of-emc-says-about-the-printer-industry/

The ditching of the printer line from Dell is a blow to small businesses that rely on high quality, affordable, and reliable printer solutions. It also means that the fantastic warranty upgrades that were available on the product line (next business day support for example) are now no longer obtainable.

Looking at a sample of Dell printers we currently support, it looks like they are in fact just re-branded Xerox or Samsung printers, or even Zebra ID card printers. This change from Dell could also be as a result of HP buying Samsung’s printer business: http://www.bbc.co.uk/news/business-37337989

We have also been able to obtain an official statement from Dell which can be seen here: Update on Dell’s Imaging Business Letter

stuart.gilbertson
September 19, 2016
0
Share:

Our response to the BBC snom VoIP Phone Article

There’s an article on the BBC news website that popped up yesterday that took our interest. It states that a “hack” lets phones “eavesdrop and make premium calls”. This was obviously a great concern for us, as it named our primary vendor, snom, as the manufacturer whose phones were used in the research.

The article can be seen on the BBC website here: http://www.bbc.co.uk/news/technology-35579273

What we can’t understand is why the BBC chose to publish such a non-story. What this “security hack” boils down to is not changing the administration page password from the default. Yes, you heard right. The only security flaw is not setting an admin password for managing the settings on the phone.

In fact, if you ignore the fact they used old firmware to carry out their tests and you perform that exact same test on firmware that isn’t old (and was only a beta release) the phone itself prompts you on the screen at every opportunity to set an Admin password.

So really, if you’ve configured your VoIP phone for making and receiving calls and you haven’t bothered to set an admin password, more fool you.

Thankfully, all of the snom phones we provision for our clients have a secure password set on them prior to delivery on site. You can tell this is the case because if you take a quick glancing look at your screen it isn’t going crazy that a password isn’t set.

So for this “hack” to work:

  1. You need to be running old firmware (by the way, when going to download it from the snom site, says “8.7.5.13 is a deprecated / unsupported versoin! Use at your own risk…”)
  2. You then need to provision your phone to make calls on a VoIP platform whilst neglecting to set an admin password
  3. You then need someone on your local network interested enough to take advantage of the fact you’ve done steps A and B and also wants to eavesdrop on you or make premium rate calls

VoIP is still an emerging technology and it’s such a shame that a business that’s meant to be on the forefront of technology has chosen to report on such a non-issue as this one. Compare it to setting up a new router for your internet connection without changing the default web admin password. It really is no different.

Lastly, just to touch on the Premium Calls part of their article where they suggest there could be toll fraud carried out (which is true), this isn’t the case on our Hosted VoIP Platform. Why? We block all premium rate numbers! 🙂

stuart.gilbertson
February 16, 2016
0
Share:

FTTC: Openreach modem removed from the equation

As of 1st April 2016, there will no longer be an Openreach modem installed for new FTTC connections. This means that when the Openreach engineer visits to switch you on with our service they will only do the jumpering activity at the local street cabinet and then close the job. This means you wont have to wait in on the engineer coming to your premise to install any equipment.

If you’ve decided to purchase your router and equipment through Consider IT, we’ll have it all preconfigured for you. If you’ve chosen for a site install, one of our technicians will still turn up on site at the pre-agreed time to get you online.

Openreach are running this as a pilot and will be holding regular review sessions to understand the highlights and lowlights of these kinds of installs. We’re confident that this makes more sense in the long run as we offer a combined modem and router in one box as standard.

stuart.gilbertson
January 18, 2016
0
Share:

Email Virus: CWIH8974 PAYMENT RECEIVED from Avril Sparrowhawk

We are currently aware of a lot of malicious spam emails currently doing the rounds. As of posting this, few anti-viruses pick up the virus attachments.

The fake email pretends to come from e-mail address [email protected], but is actually a simple forgery and does not in fact come from Les Caves.

The contents of the e-mail message are as follows:

From:    Avril Sparrowhawk [[email protected]]
Date:    22 December 2015 at 11:14
Subject:    CWIH8974 PAYMENT RECEIVED

Good afternoon

Thanks very much for your payment we recently from you, however there was a missed invoice.  Can you just confirm this will be included in the next payment run, or whether there were any queries with this particular invoice?

I have attached the invoice for your reference.

Kind regards

Avril

If you receive this e-mail, delete it immediately and contact your IT Support company. Do not open the attachment(s).

The attached file is a malicious document “CWIH8974.doc” which has a low detection rate. There are likely other variants of this virus going around but in the cases we’ve seen it downloads a malicious executable file from.

If you have already opened the attachment, contact your IT Support company after shutting down your computer. They will want to completely wipe it with a fresh reinstall.

The virus itself allows the hacker to compromise the web browser so that when the user tries to log in to their Internet Banking, the details are leaked to the hacker who attempts to withdraw funds from the user’s bank account.

stuart.gilbertson
January 6, 2016
0
Share:
1 2 3 4 … 14
CONSIDER IT FACEBOOK CONSIDER IT Twitter CONSIDER IT Linkedin

Contact Us

0131 510 0110
[email protected]
Find Us

Customer Service

Contact Us
Our Locations
Case Studies

Information

About Consider IT
Domains
Privacy Policy
Terms & Conditions
Press Enquiries

© 2025 Consider IT Limited – All Rights Reserved
Registered office: Waterview House, 37 Shore, Edinburgh, EH6 6QU. Company Number: SC320341 | VAT number: GB 930 1862 42
Consider IT is a trading name of Consider IT Limited