Your Security is our primary focus

17 Canon Harnett Court

Milton Keynes, MK12 5NF

MON - FRI: 8:30 - 18:00

Helpdesk Opening Hours

+44 (0) 1908 410261

Customer Support

Wouldn’t it be great if you could answer that call right from your Mac?

Have you found yourself in the middle of something important on your Mac and your iPhone starts ringing across the room? Wouldn’t it be great if you could answer that call right from your Mac? Thanks to Apple’s interconnected ecosystem, you can.

First things first, you need an iPhone with iOS 8.1 or later and a Mac with OS X Yosemite or later. Check your devices; chances are they’re already compatible.

Before you start dialling, there’s a bit of setup to do.

Both devices need to be on the same network and use the same Apple ID.

On your iPhone, go to Settings > Cellular or Phone > Calls on Other Devices.

Turn on ‘Allow Calls on Other Devices’ and select your Mac.

On your Mac, open the FaceTime app, click on FaceTime in the dropdown menu and click on Settings. Check ‘Calls From iPhone’.

Now, you’re all set! You can make a call through the FaceTime app or Contacts. Just select a contact or enter a number, and hit call. It’s as simple as that.

Need more time saving advice? We can help with that, get in touch.

#Mac #iPhone #HowTo

Ever wished for a helping hand while navigating your desktop folders? Microsoft is on it.

Ever wished for a helping hand while navigating your desktop folders? Microsoft is on it.

Imagine you’re looking at your files in the File Explorer and you right-click on one. Suddenly, there’s a new option – ‘Send to Copilot’.

You click it and like magic, the AI assistant pops up offering further options such as summarising the document for you. How cool is that?

This isn’t some far-fetched dream. It’s a possibility hinted at by a line of code found by a leaker on X (aka Twitter). The code, ‘CopilotFEContextMenu’, suggests a context menu option related to Copilot in your folders. Though it doesn’t do anything yet, it could be a sign of things to come.

Microsoft has been very focused on pushing AI across all its products. They even introduced a dedicated key for Copilot on the keyboard, just like the Windows key itself.

It’s still speculation right now, but wouldn’t it be amazing to have AI assistance right where you need it, when you need it? And for those not too keen on AI, hopefully, there should be an easy way to turn off Copilot if needed.

What do you think? A helpful move or AI overload?

#Windows11 #Copilot #FileExplorer

On the 19th of January 1999, Research In Motion (RIM) introduced the BlackBerry, a game-changer for business communication.

Today’s a big day for tech history. On the 19th of January 1999, Research In Motion (RIM) introduced the BlackBerry, a game-changer for business communication.

Did you own one?

Back then, the original BlackBerries looked more like oversized pagers than the sleek devices we’re familiar with today.

Fun fact: Did you know that the name ‘BlackBerry’ was inspired by the buttons on the device resembling blackberry fruit? Those Canadians sure had a creative touch.

In 2001, the BlackBerry production facility in Waterloo, Ontario, Canada, was a lot smaller than you might think. Yet, it played a pivotal role in revolutionising mobile communication.

Join us in celebrating this milestone and give a nod to the BlackBerry for paving the way for real-time email on the go.

#BlackBerry #Anniversary #TechHistory

The Xbox Series S toaster is here and it’s not just a meme anymore.

Know a gaming fanatic? Maybe you are one? This news might interest you… The Xbox Series S toaster is here and it’s not just a meme anymore.

Remember those images that started circulating nearly a year ago? Well, Microsoft has made dreams come true and is now selling this quirky toaster in the US.

And let me tell you, this isn’t your average toaster. It looks like an Xbox Series S, complete with the iconic black air vent, and it’s packed with features that make toasting a breeze. Six levels of browning, a removable crumb tray, an LED countdown, and a defrost button.

But the pièce de résistance? It toasts the Xbox logo right onto your bread. Now that’s what I call a breakfast of champions!

This isn’t the first time gaming and toast have collided. Razer made an April Fool’s Day joke toaster that never came to fruition. Microsoft has actually delivered with this one.

The Xbox Series S toaster joins the Xbox Series X mini fridge, born from memes mocking the console’s fridge-like appearance. Imagine a full range of Xbox home appliances. An Xbox microwave, kettle, or even a washing machine? Who wouldn’t want their food imprinted with the Xbox logo and their clothes dyed Xbox green? Talk about brand loyalty.

Is this one you’d have in your kitchen?

#Xbox #TechToast #ItsReal

Big changes are coming to Microsoft Windows. Gone are the days of multiple small updates throughout the year.

Big changes are coming to Microsoft Windows. Gone are the days of multiple small updates throughout the year. The Windows team is going back to the good old annual release cycle. Just one major update a year – simple, right?

But what’s on the horizon for 2024?

Well, they’re working on a major new release, code-named Hudson Valley, based on the Germanium platform. This isn’t just any update. We’re talking about an AI-powered Windows Shell, advanced Copilot that works tirelessly in the background, and groundbreaking search features. Can’t remember where that document is? Just ask in natural language and Windows will do the rest.

And for all creatives, Microsoft is adding a dedicated ‘creator’ area, making it easier than ever to access your projects. Plus, expect major power-saving improvements – we’re talking up to 50% longer battery life.

All that’s left to be revealed is whether this new update will be Windows 12, or a new version of Windows 11.

Are you excited for the future of Windows?

#Windows11 #Microsoft #AnnualUpdates

Have you heard of Gemini? It’s Google’s latest generative AI platform.

Have you heard of Gemini? It’s Google’s latest generative AI platform.

What makes Gemini special is that it’s ‘natively multimodal’. Here’s what that means… it doesn’t just deal with text; it can handle audio, images, videos, code, and different languages. That’s a big deal, setting it apart from other models that only understand and generate text.

There’s been a little confusion: Gemini is not Bard. Bard is like an app for certain Gemini models. Gemini, on the other hand, is the family of models powering it. To put it in OpenAI terms, Bard is like ChatGPT, and Gemini is like the powerhouse language model (GPT-3.5 or 4).

Gemini has loads of uses, from transcribing speech to captioning images and videos, and even generating artwork. But not all these features are fully baked yet. Google’s promising a lot, but it’s still a work in progress.

Google claims that Gemini outshines the competition in benchmarks, beating GPT-4 in 30 out of 32 widely used academic benchmarks. However, it’s not all sunshine and rainbows. Early impressions suggest Gemini Pro struggles with some tasks and makes factual errors. So, we’ll have to wait and see.

For now, Gemini Pro is free in Bard, AI Studio, and Vertex AI (during the preview phase). But once it exits preview in Vertex AI, it’ll cost £0.0025 per character for input and £0.0005 per character for output. That means a 500-word article might cost you around £5 to summarise and just £0.1 to generate.

It’s only answering text-based queries in English in the U.S. right now but stay tuned for more updates. Are you keen to try it out?

#Google #Gemini #AI

There’s some scary new malware targeting Windows devices.

There’s some scary new malware targeting Windows devices.

It’s a fresh variant of a remote access trojan called Bandook which first made its debut back in 2007. It was basically the ‘Swiss Army Knife’ of malware, with a ton of features to wreak havoc. Its main goal? Giving the bad guys remote access to your devices.

This new version targets Windows devices, making its way into systems via phishing emails carrying malicious PDF files.

Once you fall for it and click on the PDF, it extracts the malware and injects its payload into a seemingly innocent program called msinfo32.exe. This is supposed to diagnose your computer issues, but Bandook turns it into a cyber criminal’s playground.

The nasty part doesn’t stop there. Bandook goes on to connect to a command-and-control server to receive further sinister instructions. These instructions can include all sorts of actions like stealing info, manipulating files, and even gaining full control over your computer.

Terrifying.

What can you do to protect your business from this?

– Keep an eye out for the latest cyber security threats. Knowledge is your best defence.

– Train your team how to spot phishing emails. Always assume the worst with unexpected attachments or suspicious links.

– Ensure your Windows devices are running the latest updates and security patches.

– Invest in reliable antivirus software to detect and neutralise threats like Bandook.

– Educate your employees about cyber security best practices and the dangers of opening unknown files or links.

– And, implement strong network security measures and firewall configurations to stop any suspicious activity.

If you need a hand with any of this, get in touch.

#CyberSecurity #Windows #malware

Windows 11 offers multiple ways to capture the perfect shot with its built-in tools.

Screenshots are useful for communication, documentation, and more. But sometimes it’s easier said than done, right?

Windows 11 offers multiple ways to capture the perfect shot with its built-in tools. Here are your options:

Capture to clipboard:
To capture your entire desktop, press ‘PrtScrn’ or ‘Ctrl + PrtScrn.’ Then, paste the image into any application.
For capturing the active window, use ‘Alt + PrtScrn.’ Paste it just like before.

(If these shortcuts open the Snipping Tool, turn off ‘Use the Print screen key to open screen capture’ in Settings > Keyboard.)

To save the screenshot to a file, press ‘Windows key + PrtScrn.’ It’s stored in the ‘Screenshots’ folder in ‘Pictures.’

Use the Snipping Tool:
Search for the Snipping Tool in the Start menu and choose your capture mode: Rectangle, Window, Full screen, or Freeform.
Adjust the capture delay if needed.
Hit ‘New’ and create your screenshot.
Annotate and save in the editor for easy sharing.

Keyboard shortcut:
For a speedy screenshot experience, press ‘Windows key + Shift + S.’
Select your capture mode: Rectangle, Window, Full screen, or Freeform.
The screenshot opens in the Snipping Tool editor, equipped with various editing tools.

Microsoft Edge:
Open the web page, right-click, and choose ‘Web capture’ or use ‘Ctrl + Shift + S.’
Click ‘Capture’ or ‘Capture full page.’
Annotate your shot as needed and hit ‘Save.’

Now you can screenshot without having to Google how to do it… another little time saver for you.

#Screenshot #HowTo #Windows11

Another day, another phishing scam… and this one could catch anyone off guard.

Another day, another phishing scam… and this one could catch anyone off guard.

Have you ever scanned a QR code with your phone? It’s become such a convenient way to access information instantly. But did you know that there’s a new form of phishing out there that’s using QR codes to hide harmful links? It’s called ‘quishing”.

What’s the deal?

QR codes are everywhere nowadays, and we often scan them without thinking twice. They’re on parking meters, in text messages, emails, and even on product packaging. We’ve all just accepted QR codes as harmless tools to access information quickly. But cyber criminals are counting on this trust we have in them.

In a quishing attack, scammers create fake QR codes that look innocent, yet they’re anything but. They can trick you into scanning these codes for various reasons – maybe they claim it’s to reschedule a parcel delivery, confirm account information, or address suspicious activity. The key here is urgency; they want you to act fast without thinking.

Imagine scanning a QR code on a parking meter, thinking it’s just for payment, but instead, it leads you to a malicious site. Scary, right?

So, why is this a big problem? Well, for one, mobile devices are particularly vulnerable to these attacks. Unlike most desktop operating systems, phones often lack built-in phishing protection. And that’s what makes them an easy target for cyber criminals.

How can you protect yourself and your business from this type of attack?

First, avoid scanning QR codes from unknown sources. If you spot a QR code in an unexpected place, take a moment to inspect the URL it leads to. Look for misspellings or odd characters in the URL – these are telltale signs of a scam.

If you receive an unexpected email or text with a QR code urging you to act immediately, don’t scan it. Instead, verify the legitimacy of the sender using a confirmed phone number or website. Legitimate companies will provide clear instructions without asking you to scan a QR code for verification.

And if you receive an email claiming to be from a company but the sender’s email is from Gmail or some random, unknown domain, be suspicious. It could very well be an attack.

Lastly, strengthen your phone and online account security. Keep your phone’s operating system up to date, use strong passwords, and enable multi-factor authentication wherever possible. These simple steps can go a long way in keeping your sensitive business data safe from quishing attacks.

Remember, it’s not just about protecting yourself – it’s also crucial to inform your employees about scams like quishing. Awareness and vigilance are our best defences against these digital tricksters.

#CyberSecurity #Quishing #StaySafeOnline

Google is a trusty digital companion, always ready to help us find answers to life’s burning questions.

Google is a trusty digital companion, always ready to help us find answers to life’s burning questions. And every year, they give us a sneak peek into the most trending searches across various categories.

From movies to games, news to music, and even some quirky trends, Google’s Year in Search has it all covered. So, what were our most searched highlights from 2023?

The Women’s World Cup came in second place as the most-searched sporting event, right after the Rugby World Cup and ahead of the Ashes. And when it came to athletes, Tommy Fury took the top spot, leaving England men’s football captain Harry Kane in second place. And according to Google, the most searched ‘how to’ query was ‘how to watch the Champions League Final.’ When it comes to sports, we’re all in.

‘Oppenheimer’ claimed its well-deserved spot among the top movie searches, but we couldn’t get enough of royal happenings and TV dramas either. Questions like ‘when is the Coronation?’ and ‘when does Love Island start?’ had us all reaching out to Google for answers. In the realm of TV shows, ‘Happy Valley’ was the top search, ahead of ‘The Last Of Us.’

Artificial intelligence (AI) was a hot topic, especially after the launch of ChatGPT. Many of us wanted to know ‘What is generative AI?’

Sam Smith took the crown as the most Googled musician, followed by Arctic Monkeys and Lil Tay. And let’s not forget Times Person Of the Year, Taylor Swift, who made it to the top ten list, of course.

Remember, these aren’t just the top searches; they’re the top trending searches, reflecting the buzz and excitement of the year. Who knows what 2024 has in store for us?

What were your favourite Google searches from 2023, and what do you predict we’ll be searching for in the year ahead?

#GoogleSearch #YearInSearch #TrendingTopics

it sECURITY & sUPPORT pACKAGES

Standard Package

Entry level IT Support and Security Package

Premium Package

Premium comes packed with essential security and data backup

Elite Package

For the more securty concious business owner.

Ultimate Package

For a total security and centrally managed it environment.

Services

3CX Hosted Phone Systems

3CX hosted phone systems are cloud-based communication platforms that enhance business connectivity through unified voice, video, and messaging tools.

Application Hosting & Management

Application hosting and management involves deploying and maintaining software applications in the cloud to ensure their reliable and secure operation.

Centralised Professional Email Signature

Centrally managed email signatures. Set sleek unified signatures for the whole company.

Dark Web Monitoring

Monitor the Dark Web for compromised domain/emails from your company to limit a cyber attack.

Device Protection (Endpoint Detect & Respond – EDR)

Fully managed and monitored device protection 24/7, human led SOC, who detect and investigate, triage, and action remediation.

DNS Security and Configuration

Email security is paramount to protecting your business and brand. Configuration of a domain for email is the first step.

Domain Registration & DNS Management

Domain registration secures your web address, while DNS management ensures that people can find your website using that address.

Email Filtering, Protection & Security

Total email security that filters spam, viruses, phishing attacks and more.

Full Fibre 900mbps Business Internet

Full Fibre 900Mbps Business Internet delivers lightning-fast, symmetrical speeds to supercharge business productivity.

Google Workspace Subscription, Management & Security

Google Workspace smoothly integrates the business solutions that your team needs in one place.

Internet Filtering & Protection

Our DNS filtering solution has been ranked #1. Internet and Content Filtering at its best.

Managed Backup for Microsoft 365 & Google Workspace

Our backup solution is built in the cloud for the cloud, making it one of the fastest and most reliable cloud backups.

Microsoft 365 Security Monitoring

24/7/365 monitoring of your Microsoft 365 account to spot any configurations issues and fix them.

Microsoft 365 Subscription, Management & Security

Microsoft 365 subscriptions include familiar Office apps, intelligent cloud services, and world-class security in one place.

Network Discovery

Network Discovery provides complete security scans of your network in real time.

Password Manager

Protect your organisation against cyber threats with zero-trust enterprise password management.

Penetration & Vulnerability Testing

Automated full-scale penetration and vulnerability testing as a service.

Phishing Simulation & Security Awareness Training

Auotmate your Cyber Security Awareness & Phishing Training with YCW.

Server Support

24/7/365 Server monitoing in real time. We fully maintain, patch monitor your servers.

Support, Monitoring & Maintenance

Our IT Helpdesk is available from 8:30am to 6:00pm Monday to Friday to answer and resolve any question you may have.

Windows 365 Cloud PC

Windows 365 Cloud PC allows you to securely stream your Windows experience, including your personalised apps, content, and settings, directly from the Microsoft Cloud to any device.

WordPress Hosting

WordPress Hosting is a hosting service optimized for WordPress websites, providing easy setup, enhanced security, and performance tuning for a seamless WordPress experience.

Zoho CRM Subscriptions

Zoho CRM is a cloud-based customer relationship management platform designed to help businesses streamline their sales, marketing, and customer support processes

Learning Centre

Tech Guides

Technical Guides from Your Cloud Works

Blog

Your Cloud Works Tech Blog

Books

Published Books by Your Cloud Works

Newsletters

Tech Insider Newsletters

News

Latest News from Your Cloud Works

Frequently Asked Questions

Frequently Asked Questions by Clients

Tech Tip Videos

Technical Tip Videos from Your Cloud Works