What are you using your work laptop for?

What are you using your work laptop for?

Let’s be honest, most of us have used our work laptops for personal stuff now and then. Whether it’s checking your personal email, browsing social media, or streaming a video, it seems harmless… right?

Well, according to recent research, it could be a big risk for your business.

A new study found that 90% of workers use their company laptops for personal activities. And many are doing risky things like accessing unsecured websites, streaming illegal content and even visiting the dark web. These activities can expose your company’s sensitive data to malware, phishing attacks and other cyber security threats.

With more employees working remotely or hybrid, it’s harder for you to monitor what’s happening on company devices. People are connecting to public Wi-Fi, using personal USBs, and generally mixing their work and personal lives in ways that can lead to trouble. Younger workers are more likely to take these risks.

What’s even more worrying is that 18% of employees don’t have any cyber security software on their work devices and 7% aren’t even sure if they’re protected. Without solid security in place, your business is left wide open to attacks.

On top of all that, using a work laptop for personal stuff can create privacy concerns. A third of workers said they’d feel like their privacy was being violated if their boss could see their personal activity on a company laptop.

So… what can you do?

It’s time to rethink how you and your team use work devices. Put stronger security measures in place and make sure employees understand what’s OK and what’s not on a company laptop.

Remote management tools can also help keep everything secure. And of course, seeking expert help from an IT partner like us will make this a simpler job all round.

If you’d like help managing your business devices, get in touch.

 

Did you know? - ActiveX controls are being switched off in Office 2024

ActiveX lets you use interactive elements in your documents, such as buttons and forms. It’s been on by default since being released in 1996 (!), but with Office 2024 it will be switched off.

Why? Because it’s caused security issues, with cyber criminals leveraging it to install malware. If you’re a fan, you can enable it again by changing your Trust Centre settings, but we’d suggest keeping it disabled. 

 

Finally, you can declutter Microsoft Edge

Microsoft Edge has started to look cluttered with its toolbar, sidebar, and context menu, and that can be distracting.

A new pop-up lets you clean it by hiding the apps you use less regularly. It even gives you a helpful list, complete with tickboxes, to select which ones you want to hide and which you’d like to keep in view.

 

Tech facts

1.       The original Apple logo from 1976 featured Sir Isaac Newton sitting beneath a tree, with an apple about to fall on his head. It included a quote from a poem: “Newton…a mind forever voyaging through strange seas of thought…alone.” Catchy!

2.      In 2004, the @ symbol was added to Morse code making it possible to communicate email addresses. The character is called a “Commat” and consists of the signals for A and C.

3.      Hal, the computer in ‘2001: A Space Odyssey’, got its name by taking the letters IBM, and selecting the preceding letter for each one.

 

Technology update - Microsoft is rethinking Windows security after the CrowdStrike outage

Earlier this year, a problematic update from CrowdStrike took down Windows systems all over the world.

To avoid a repeat, Microsoft is working with major security companies (including CrowdStrike) to develop a new platform that meets security needs without compromising system performance – or threatening future outages.


Inspirational quote of the month

“Culture isn’t just one aspect of the game; it is the game. In the end, an organisation is nothing more than the collective capacity of its people to create value.” Louis V. Gerstner, Jr., Former CEO of IBM.


Cloud Telephony vs. VoIP – which is best for your business?

Is it time to upgrade your phone system?

These days there are two main technologies to choose from. Let us explain them so you can pick the right one for your business.

The first is VoIP, an acronym for Voice over Internet Protocol.

It’s a reliable technology. You make phone calls using data sent over the internet. You can use a desk phone for this, or your computer or mobile.

Cloud Telephony takes things a step further. It uses VoIP technology but operates entirely in the cloud.

Everything is managed remotely. No hardware to maintain and no complicated setups, just a flexible system that grows with you.

Need more lines or features? That’s easy, it’s all done online in seconds.

Both are solid choices for growing businesses.

Want us to look at how you use your phones and suggest which system is best for you? Get in touch.


Q&A

How do I dispose of old PCs?

First make sure they’re completely wiped so your data can’t fall into the wrong hands. Then you could sell them, recycle them or donate them. Get in touch for help.

Should we trial new software features before general release?

No! Patience is a virtue. If you try early release beta features, you can be hit by bugs and glitches. Let others find these and wait for the stable general release.

Is WhatsApp a good business tool?

We don’t recommend WhatsApp for business communications. Instead use a business-specific communication tool, like Microsoft Teams. This gives you maximum security and control.

 

Business gadget of the month - Creative Pebble V3 Desktop Speakers

Whether you’re joining video calls, editing audio or video, or simply listening to music while you work, you want good quality speakers that don’t distract you.

The Creative Pebble V3 desktop speakers are affordable, but offer crisp sound, appealing design and they have a good selection of connectivity options. They’re also compact enough that they don’t take over your desk.

£29.99 from Amazon.

 

To view or add a comment, sign in

Explore topics