18 Dec 2024
 
If you've installed version 24H2 of Windows 11 for your business, you might have noticed an annoying glitch in File Explorer. 
 
File Explorer is that familiar window you use to browse your files and folders. Normally, it’s straightforward – but some people are running into issues with the “See more” menu after downloading this update.
 
The menu, which is marked by three little dots, usually pops up below your mouse cursor, giving you options like “Select All” or “View Properties”. 
 
But thanks to a recent bug, the “See more” menu is flying up to the top of the screen, often disappearing out of sight. And if you’re using File Explorer in full-screen mode, some menu options might not even be visible. 
 
Frustrating, to say the least.
 
Luckily, there’s a simple workaround: Just make sure you’re running File Explorer in windowed mode where it shares the screen with other applications. To do this, click the square icon in the top-right corner (next to the “X” you’d click to close it). 
 
You can then resize the File Explorer window, allowing you to use the “See more” menu, even if it’s still misbehaving.
 
The good news is that Microsoft are aware of the problem. They’re working on a fix. 
 
Little glitches like this can be a nuisance when you and your team are trying to get things done. 
 
Can we help you squeeze more productivity out of your applications? Get in touch.
 
18 Dec 2024
"
 
If you get a call claiming to be from Microsoft Teams support, think twice before doing what they ask. 
 
There’s a new trend for scammers to pose as “help desk” staff, with the aim of tricking employees into letting them take over their devices. 
 
This is part of a larger ransomware attack, where you’ll be denied access to your business data unless you make a hefty payment to get it back.
 
Recently, a notorious cyber crime group has taken this scam to a new level. 
 
First, they’ll flood an employee’s inbox with so much spam that it becomes unusable. Then they swoop in with a phone call, pretending to be from IT support, offering to “fix” the problem.
 
They may ask your employee to install remote desktop software like AnyDesk or use built-in tools like Windows Quick Assist. Once they have access, they can move around your network, collect sensitive data, and launch ransomware on your devices.
 
Be warned – they don’t only reach out over the phone. They’ve also started setting up Teams accounts to make employees think they’re part of IT support. 
 
They do this by choosing usernames like “Help Desk” and using fake Microsoft tenant domains such as “securityadminhelper.onmicrosoft .com”. Then they send one-to-one messages to employees, saying they need access to their device.
 
Ransomware attacks are serious business. Along with locking you out of your data, they can also shut down your operations, disrupt customer service, and potentially leak confidential information. 
 
Recovering from a ransomware attack can be expensive, both in terms of paying the ransom and dealing with the aftermath. It can cause loss of revenue, damage your reputation, and it could even have legal consequences.
 
Make your team aware of this scam and encourage everyone to be cautious with any unsolicited support calls or Teams chats. And make sure everyone knows to check with your actual IT department first, if someone is asking to install software or gain access. 
 
Also, if you use Microsoft Teams in your business, make sure it’s set up securely. Only allow external chats from trusted domains, and make sure chat logging is enabled. 
 
If you want extra help safeguarding your setup, we can do that. Get in touch.
 
18 Dec 2024
 
Email has become an essential tool for any successful business, but as the saying goes, "with great power comes great responsibility". 
 
As a business owner, it’s your responsibility to make sure your emails are secure. It’s one of the key ways to stop your business data falling into the wrong hands. 
 
Business Email Compromise (or BEC) is a growing threat. And if you become a target, it could cost you – big time. 
 
So, what exactly is a BEC attack? 
 
In simple terms, it’s where scammers pose as people high up in the business, like CEOs, executives, and IT staff. The goal is to trick your employees into sharing sensitive information or sending money. Research shows that nearly 90% of BEC attacks are set up this way. 
 
It’s easy to see how someone might quickly respond without a second thought, especially when they trust the sender. 
 
BEC attacks have spiked dramatically this year, especially over the third quarter. Researchers have analysed 1.8 billion emails worldwide, discovering a shocking 208 million malicious emails among them. And of these malicious emails, more than half (58%) were BEC attempts. 
 
The figures make it clear: BEC scams are now the biggest email threat to businesses.
 
Another thing worth noting? Most BEC scams target employees lower in the business, who might be less likely to question authority or be less aware of cyber threats.
 
Although BEC attacks are common, it’s also important to remember that scammers still use other methods too. This includes commercial spam and phishing attacks, which are designed to trick people into sharing personal information, like login details. 
 
In fact, the combined effect of these types of scams now overshadows traditional ransomware and malware attacks.
 
Luckily, it isn’t complicated or expensive to protect your business. 
 
Simply make sure that all members of your team are trained to think twice about every email they receive. 
 
If an email asks for sensitive information or a financial transaction – especially if it feels urgent – your employees should know to stop and check with someone before they action anything.
 
If you need help making sure your business is secure, get in touch.
Back to top