Aabyss Blog Heading Background

News & Opinion

Gain the edge on the world of business technology and cyber security

Seasonal malware that you didn’t order.

on 13-Dec-2016 10:46:05 By | Troy Midwood | 0 Comments | Cybersecurity IT News Security
It’s that time of year when a deluge of new malware attacks try to lure you in with infected email attachments in messages which purport to be from legitimate companies – the types of companies you would expect to be emailing you at this time of year. Amazon appears to be the worst culprit right now – or rather emails containing intriguing subject lines such as ‘Your Amazon Order Details’. Of course, it’s not really Amazon sending these bogus messages. Instead they originate from cyber criminals hoping you will open the attached file and thereby unleash havoc on your own PC. What a lazy (but effective) way to propagate malicious code! Naturally, the malware you might inadvertently install by opening an infected file threatens to compromise the performance of your machine or, worse still, the security of your personal data. Besides fake order updates from Amazon, other variations are also doing the rounds – ‘important notifications’ from HMRC containing PDF attachments and, of course, the traditional bogus documentation from all the major banks: Barclays, RBS, HSBC and Lloyds to name but a few. What can you do to protect yourself? So if your inbox is full of messages that you were not expecting on subjects you do not recognise, what can you do to avoid falling foul of the hackers? Here is some simple advice that may prevent you compromising your security. Know your sender – our simple message to you is this – do not open email attachments from unknown senders. Beware malicious files – invoices and delivery notes from Amazon and other suppliers are designed to tempt you to click. However, most online retailers do not send file attachments with their order updates and Amazon for one have made a statement to this effect in the past month. Be careful what you download! There is no such thing as a free lunch and ‘freeware’ as well as P2P programs are amongst the biggest culprits. These software applications are frequently bundled with copious amounts of bundled spyware. Phishing and ID theft. Be especially wary of hyperlinks contained in messages that appear to originate from your bank, building society, telecoms provider, PayPal account etc. A useful tip is to hover your mouse over any such link to reveal whether the URL actually does originates from the website in question. Update your antivirus – your antivirus software should be set to update at regular intervals and manual checks are advisable too. If you have any questions regarding your own internet security software, please contact us to discuss this matter as a matter of urgency.
Read More

A perfect time for ‘Digital Detox’ this Christmas?

on 06-Dec-2016 12:27:33 By | Andrew Allen | 0 Comments | IT News Tips & Tricks
Fifteen million UK internet users have undertaken a ‘digital detox’ in a bid to strike a healthier balance between technology and life beyond the screen, according to major new Ofcom research. The majority of internet users say they’re ‘hooked’, spending a day a week online and the Ofcom study revealed some of the effects of excessive internet use on sleep, school, family and relationships.
Read More

How to Use Excel Sparklines

on 05-Dec-2016 13:54:08 By | Andrew Allen | 0 Comments | Tips & Tricks
Excel Sparklines were introduced in Excel 2010 version. It is small line chart that could be easily embedded with the text and gives a great presentable output for easier depiction when aligned next to the tabular data. They are supported in Excel 2010 and above version only. Although sparkline’s design is not limited to lines they can also be represented as columns or win loss. The below example depicts how sparklines look: When to Use: Excel Sparklines can be useful if you have your data in a tabular format. You can place the sparklines next to each row to give a clear graphical presentation of the data selected in that particular row. How to Use: Below listed steps give a clear understanding on how to use excel sparklines: Click on the cell where you want to insert the “Sparkline(s)”. Go the “Insert” tab on the top ribbon. Select the Type of “Sparkline” (Line, Column, Win/ Loss), in this case we will take “Line Sparkline” as example. Line Type of Sparklines So, this was all about how to use excel sparklines. You can also do formatting, add markers, axis, etc to enhance the sparklines. Below section suggests on type of sparklines and their formatting. Type of Excel Sparklines: Line – These sparklines are displayed in the format of simple lines. You could change the style of line, sparkline color and marker color. Column – These sparklines are displayed in the format of bars. If the data is of positive value then the column would be lying on the upper axis. For negative data value the column would be below the axis. Likewise for zero value the column would not be displayed and an empty space would be left at that data point. In these sparklines too, you can change the style of column, sparkline color and marker color. Win / Loss – These sparklines are displayed in the format of bars like “Column” sparklines although these only represent profit or loss. If the data is showing profit (positive data points) then bars would be above the axis and if the data is showing loss (negative data points) then the bars would be inverted and will be below the axis. If the data is of zero value then the column would not be displayed and an empty space would be left at that data point, as shown in above figure as well. In these sparklines as well, you can change the style of column, sparkline color and marker color. You can change the type of sparklines for the whole group or for single row by un-grouping the sparklines first. Thus each row can have a different type of sparkline.
Read More

UK must be capable of retaliating against cyber attacks

on 02-Dec-2016 11:38:39 By | Andrew Allen | 0 Comments | Cybersecurity IT News Security
When it comes to cyber security, Chancellor of the Exchequer, Philip Hammond MP has recommended fighting fire with fire (or maybe firewalls with firewalls).
Read More

Microsoft adds integrated chat app to Office 365

on 30-Nov-2016 11:48:40 By | Andrew Allen | 0 Comments | IT News Productivity
Microsoft has announced that a new chat application, called Teams, has been created for Office 365.
Read More

A short guide to DDoS attacks

on 22-Nov-2016 11:22:05 By | Andrew Allen | 0 Comments | Cybersecurity Security
Widespread distributed denial of service (DDoS) attacks were recently responsible for bringing down a large proportion of the internet, including Twitter, Spotify and the PlayStation network, but how was it carried out? Let’s take a look at what DDoS attacks are and the risk they pose.
Read More

Competitive edge with a virtual CIO?

on 15-Jun-2016 10:30:17 By | Andrew Allen | 0 Comments | Managed Service Security Productivity
In the past IT service was a matter of infrastructure: networks, devices, servers and so on. The internet was slow, the applications were often clumsy and sometimes unusable, and these systems were not interconnected. That was the first wave of IT. The good news is the free market has driven solutions to those challenges - and we’re all glad it did.
Read More

Why decent guest WiFi is a necessity

on 08-Jun-2016 15:20:04 By | Greg Jones | 0 Comments | Hospitality Managed Service WiFi
As a hotelier, you've probably noticed that what hotel guests expect when traveling away from home has changed considerably over recent years. Whereas an en suite bathroom, for example, was once considered a luxurious ‘extra’, most hotels now provide this facility as standard. By the same token, Wi-Fi is now an expected feature of a hotel stay and most guests would be surprised (and more than a little annoyed) if an efficient guest Wi-Fi service was not provided.
Read More

Aabyss Computers Becomes a Microsoft Authorised Education Partner

on 12-Oct-2015 10:08:10 By | Andrew Allen | 0 Comments | Aabyss News
Read More

Just Because You’re Not a Big Target, Doesn’t Mean You’re Safe

on 09-Jul-2015 20:35:49 By | Andrew Allen | 0 Comments | Security
Just Because You’re Not a Big Target, Doesn’t Mean You’re Safe Not too long ago, the New York Times’ website experienced a well-publicized attack, which raises the question – how can this happen to such a world-renowned corporation? If this can happen to the New York Times, what does this bode for the security of a small company’s website? What’s to stop someone from sending visitors of your site to an adult site or something equally offensive?
Read More