Beware that corrupted email attachment: It could be a scam

You’re scanning your inbox and spot an important email with a Word document attached. Maybe it’s an invoice, a message from a supplier, or even a request from a colleague. You open it without thinking twice… and just like that, you’ve been scammed.

This scenario is exactly what cyber criminals are counting on. Now they’ve come up with another new way to get past even the most advanced email security filters – this time, using corrupted Microsoft Word files.

It’s a clever and dangerous tactic.

Phishing (pronounced “fishing”) is where scammers try to trick you into giving away sensitive information, like passwords or bank details. They “bait” you with an email that looks legitimate, maybe from your bank, a coworker, or a company you trust.

These emails often include attachments or links. When you open the attachment or click the link, you could be downloading malicious software (malware) or visiting a fake website designed to steal your details.

Phishing attacks are constantly evolving, and they’re now one of the most common ways scammers break into businesses. Email security filters are usually pretty good at scanning attachments. But since corrupted files can’t be analyzed properly, the Word file is able to sneak into your inbox.

When you open one of these corrupted files, Microsoft Word will “repair” it and show you what looks like a normal attachment. But the document will contain a malicious QR code or link that sends you to a phishing site (often a fake Microsoft 365 login page). If you enter your details, scammers could have access to your account – and potentially your entire business.

Stealing just one employee’s login details can be enough. With access to your cloud systems, scammers could get hold of sensitive customer data, lock your team out of essential files, or even send phishing emails from your account to trick your contacts.

If this happens to you, it could be catastrophic. Your business could face financial losses, legal consequences, and a damaged reputation that could take a long time to rebuild.

Cyber attacks are getting more complicated. But you don’t need a degree in cyber security to help keep your business safe.

The best protection is awareness and caution.

Here are some steps you can take:

  • Slow down and think twice before opening attachments or clicking on links
  • If an email seems urgent, beware – scammers like to rush you, so you’ll act without thinking
  • If you’re not sure an email is legit, check with the person or company that the email seems to be from
  • Never trust an attachment or link just because it looks professional

Most importantly, make sure you educate yourself and your team about what phishing is, why it’s dangerous, and how to recognize the warning signs.

We help businesses like yours with this every day. If you’d like us to help you too, get in touch.

Are your employees your security’s weakest link?

Let me ask you something: Do you lock your front door when you leave the house?

Of course you do.

But what if you get home and find that someone left a window open? You may as well have left the door unlocked, right?

Now think about your business.

You’ve probably invested in good cyber security to protect it, using strong passwords, firewalls, and the latest software updates. But if your employees accidentally leave the “windows” open, all that security goes to waste.

It’s not about blame – it’s about awareness. The truth is that your employees might be your biggest security risk, without them even realizing it.

More people are working remotely, and research shows that four out of five employees use their personal phones, tablets, or laptops for work. It makes sense. Why not use the devices they already own?

Here’s the problem: Your employees’ personal devices probably aren’t set up with the same security measures you’d use in the office. Their phones and laptops might use weak passwords, outdated software, or even be connected to unprotected Wi-Fi networks. All of this is a dream scenario for hackers.

And here’s where it gets scary…

Two out of five employees admit to downloading customer data onto their own devices. That’s sensitive data leaving the safety of your business, now at risk of falling into the wrong hands.

If that’s not enough to worry you, here’s another shocker: More than 65% of employees admit they only follow cyber security rules “sometimes” or even “never”. This includes forwarding work emails to their personal accounts, using their phones as Wi-Fi hotspots, or ignoring guidelines about handling data when using AI tools.

Passwords are another issue, with nearly half of employees using the same passwords across different work accounts. Even worse, over a third of employees use the same passwords for both their work AND personal accounts.

Imagine a hacker getting into your employee’s social media account and using the same password to get into your business systems? It’s a disaster waiting to happen.

So, what can you do?

The key is education.

Start by helping your team understand why cyber security is so important. Most people don’t break the rules on purpose – they just don’t realize the risks. Explain that those little habits that seem harmless (like reusing passwords or doing work on public Wi-Fi) can cause serious damage.

Create security rules that are clear, simple, and easy to follow. For example, you can tell your team to:

  • Use a password manager to create a strong, random and unique password for each of their work accounts
  • Only access work systems on secure, approved devices
  • Never forward work emails to their personal accounts

Also, make sure your employees are getting regular training sessions to keep cyber security at the front of their minds, and don’t forget to celebrate good habits. If someone flags a suspicious email or comes up with a clever way to keep sensitive data safe, be sure to let everyone else on your team know.

Cyber security is everyone’s responsibility.

By giving your employees the right tools and training, you can turn them into your first line of defence instead of your weakest link.

If you’d like help keeping your team up to date on the latest security threats, get in touch.

The two big threats of doing business on public Wi-Fi

Public Wi-Fi is everywhere these days – coffee shops, airports, hotels, trains. It’s super convenient, especially for business travelers or anyone working remotely.

But what if I told you that hopping on that free Wi-Fi could expose your business data to cyber criminals? That’s the reality of using unsecured public networks.

When you connect to public Wi-Fi, you’re opening the door to scammers who know exactly how to exploit these networks. The two biggest threats you need to know about are called Man-in-the-Middle (MITM) attacks and Evil Twin attacks.

Yes, they sound like something out of a spy movie… but they’re very real and can have serious consequences for your business.

Let’s start with Man-in-the-Middle (MITM) attacks. You’re sitting in a coffee shop, sending an email or logging in to your business bank account. You think your device is communicating directly with the Wi-Fi network, but in reality, a cyber criminal has inserted themself between you and the network.

This “man in the middle” can see everything you’re doing – your passwords, your emails, even your credit card details. And the worst part? You probably won’t even notice it’s happening.

Criminals use this stolen information in all sorts of ways. They might sell it to advertisers, use it to impersonate you in phishing scams (where they trick people into sharing sensitive information, like passwords or credit card details). Or even steal money from your accounts. For businesses, this could mean sensitive financial information or customer data ending up in the wrong hands.

Now let’s talk about Evil Twin attacks. Imagine you’re in an airport and see two Wi-Fi networks: One called “Airport Free Wi-Fi” and another called “Airport Wi-Fi Secure”. They both sound legit, but one of them could be a fake network set up by cyber criminals.

When you connect to the fake network, scammers can monitor everything you do online, just like in a MITM attack – but they can go even further. They can steal your cookies (little bits of data that websites use to remember you) and gain access to things like your login details or personal information.

In some cases, they can even install malware (malicious software) on your device without you clicking a single thing. Scary, right? All it takes is connecting to the wrong Wi-Fi network, then your data – and your business’s security – could be compromised.

Using public Wi-Fi doesn’t have to be a security nightmare, but you do need to be cautious. Here are some steps you can take to help keep your business protected:

· Avoid accessing sensitive information while connected to public Wi-Fi. This includes anything involving passwords, personal data, or financial accounts. If you wouldn’t want a stranger looking over your shoulder, it’s best to save it for when you’re on a secure network.

· Stick to websites that use HTTPS, which encrypts your data. You’ll know a site is secure if you see a padlock icon in the address bar or “https://” at the beginning of the web address. Most websites use this today.

· Consider using trusted browser extensions designed to boost your online safety. Many can block cookies, ads, and even malicious websites, reducing the risk of your information being exposed.

· Turn off auto-join on your business devices. This stops your work phone, tablet, or laptop from automatically connecting to any available network, including potentially dangerous ones.

· Be wary of suspicious pop-ups. Scammers often use these to trick you into clicking something malicious. If a pop-up feels wrong, don’t interact with it – just close the window.

· Enable two-factor authentication (2FA) on your business accounts whenever possible. This requires a second form of identification (like a code sent to your phone) to log you in, which makes it harder for anyone to break in even if they get hold of your password.

· Finally, keep your software up to date. Updates often include security patches that protect your device from the latest threats. Ignoring them could leave your business devices vulnerable.

A little caution goes a long way when it comes to keeping your business protected online. Ask yourself: Is the convenience of free Wi-Fi worth the risk of exposing my data?

If you’d like help keeping your business data protected no matter where you are, get in touch.

FOMO is driving businesses to spend more on IT

Ever feel like you’re racing to keep up with all the new tech out there? You’re not the only one. Businesses are spending more on software than ever before… and it’s in no small part due to “FOMO” – fear of missing out.

In fact, a recent report shows that 76% of businesses are bumping up their software budgets for next year, with many planning to increase their spend by 5 to 15%.

Why?

It’s simple: No business owner wants to feel like they’re falling behind while their competitors are jumping on the next big thing. So, businesses are investing in tools that they think will make them better, faster, and more secure.

Artificial intelligence (AI) is at the top of the list when it comes to the tech businesses want to invest in. This is because AI is making it easier to get stuff done; whether that’s automating routine tasks, crunching numbers, or even improving customer service.

But on the flip side, AI is also putting new tricks up the sleeves of cyber criminals. Meaning that businesses are having to spend more on cyber security to keep their data safe.

The hardest part about buying software isn’t usually the actual purchase – it’s what comes after. Using new software takes planning, and everyone in the team needs to learn how to use it. If your team isn’t ready, even the best software won’t help you much.

This is why many businesses are also investing in training tools, such as learning management systems (LMS). This helps bring employees up to speed, so your new tech doesn’t just sit there collecting virtual dust.

It can be tempting to be one of the first to adopt all the latest tools. But moving too fast can lead to headaches. It takes time to figure out what software is right for your business and how to make it fit into your processes. Jumping in without a clear plan could leave you with a tool that’s more trouble than it’s worth.

The good news is that many businesses are getting smarter about how they choose software, using reviews, testimonials, and recommendations from experts (like us) to make informed decisions.

If you’re feeling the pressure to invest in new tools, take a breath. Think about what your business really needs:

· Do you want to improve efficiency?
· Keep your business data secure?
· Help your team work better?

Whatever the reason, make sure you choose tools that are in line with your goals and that your team is ready to use.

FOMO might be driving the trend, but that doesn’t mean you have to let it control your decisions.

We can help make sure the tech you invest in pays off for your business in the long run. Get in touch.

How many devices do you use every workday?

It feels like we have a gadget for everything these days, doesn’t it?

The average office worker now carries around three devices to get through the day. Think laptops, tablets, headphones… and even multiple phones.

Technology keeps teams connected and helps us work smarter – but there’s a downside: Managing so many devices can get a little overwhelming.

What happens every time we add a new device to our daily work routine? There’s something else to charge. Another thing to carry. One more item to keep track of.

In fact, carrying around all this tech adds up to an average 9lbs of extra weight. That’s like carrying an air fryer to work every day!

Another issue is the mental load. Many professionals say they feel bogged down by the notifications they get across all their devices. It’s common to get dozens of notifications every day, and the constant flow of alerts can be such a distraction.

One way to get around gadget overload is to try out devices that handle many functions, like foldable phones, or hybrid laptops. This way, one device could do the same thing two or three of your devices are doing.

Another great strategy is to upgrade to a smarter system, like Windows 11.

Windows 11 makes it easier to switch between tasks, reducing the need for extra devices. With a smoother, more integrated experience, your team might not feel they need as many gadgets to stay productive.

Need help streamlining your setup? We can help walk you through the options. Get in touch.

Here’s how to fix that Windows 11 File Explorer glitch

If you’ve installed version 24H2 of Windows 11 for your business, you might have noticed an annoying glitch in File Explorer.

File Explorer is that familiar window you use to browse your files and folders. Normally, it’s straightforward – but some people are running into issues with the “See more” menu after downloading this update.

The menu, which is marked by three little dots, usually pops up below your mouse cursor, giving you options like “Select All” or “View Properties”.

But thanks to a recent bug, the “See more” menu is flying up to the top of the screen, often disappearing out of sight. And if you’re using File Explorer in full-screen mode, some menu options might not even be visible.

Frustrating, to say the least.

Luckily, there’s a simple workaround: Just make sure you’re running File Explorer in windowed mode where it shares the screen with other applications. To do this, click the square icon in the top-right corner (next to the “X” you’d click to close it).

You can then resize the File Explorer window, allowing you to use the “See more” menu, even if it’s still misbehaving.

The good news is that Microsoft are aware of the problem. They’re working on a fix.

Little glitches like this can be a nuisance when you and your team are trying to get things done.

Can we help you squeeze more productivity out of your applications? Get in touch.

Beware that “support call” – it could be a ransomware scam

If you get a call claiming to be from Microsoft Teams support, think twice before doing what they ask.

There’s a new trend for scammers to pose as “help desk” staff, with the aim of tricking employees into letting them take over their devices.

This is part of a larger ransomware attack, where you’ll be denied access to your business data unless you make a hefty payment to get it back.

Recently, a notorious cyber crime group has taken this scam to a new level.

First, they’ll flood an employee’s inbox with so much spam that it becomes unusable. Then they swoop in with a phone call, pretending to be from IT support, offering to “fix” the problem.

They may ask your employee to install remote desktop software like AnyDesk or use built-in tools like Windows Quick Assist. Once they have access, they can move around your network, collect sensitive data, and launch ransomware on your devices.

Be warned – they don’t only reach out over the phone. They’ve also started setting up Teams accounts to make employees think they’re part of IT support.

They do this by choosing usernames like “Help Desk” and using fake Microsoft tenant domains such as “securityadminhelper.onmicrosoft .com”. Then they send one-to-one messages to employees, saying they need access to their device.

Ransomware attacks are serious business. Along with locking you out of your data, they can also shut down your operations, disrupt customer service, and potentially leak confidential information.

Recovering from a ransomware attack can be expensive, both in terms of paying the ransom and dealing with the aftermath. It can cause loss of revenue, damage your reputation, and it could even have legal consequences.

Make your team aware of this scam and encourage everyone to be cautious with any unsolicited support calls or Teams chats. And make sure everyone knows to check with your actual IT department first, if someone is asking to install software or gain access.

Also, if you use Microsoft Teams in your business, make sure it’s set up securely. Only allow external chats from trusted domains, and make sure chat logging is enabled.

If you want extra help safeguarding your setup, we can do that. Get in touch.

Security alert: Attacks on business email accounts are surging

Email has become an essential tool for any successful business, but as the saying goes, “with great power comes great responsibility”.

As a business owner, it’s your responsibility to make sure your emails are secure. It’s one of the key ways to stop your business data falling into the wrong hands.

Business Email Compromise (or BEC) is a growing threat. And if you become a target, it could cost you – big time.

So, what exactly is a BEC attack?

In simple terms, it’s where scammers pose as people high up in the business, like CEOs, executives, and IT staff. The goal is to trick your employees into sharing sensitive information or sending money. Research shows that nearly 90% of BEC attacks are set up this way.

It’s easy to see how someone might quickly respond without a second thought, especially when they trust the sender.

BEC attacks have spiked dramatically this year, especially over the third quarter. Researchers have analyzed 1.8 billion emails worldwide, discovering a shocking 208 million malicious emails among them. And of these malicious emails, more than half (58%) were BEC attempts.

The figures make it clear: BEC scams are now the biggest email threat to businesses.

Another thing worth noting? Most BEC scams target employees lower in the business, who might be less likely to question authority or be less aware of cyber threats.

Although BEC attacks are common, it’s also important to remember that scammers still use other methods too. This includes commercial spam and phishing attacks, which are designed to trick people into sharing personal information, like login details.

In fact, the combined effect of these types of scams now overshadows traditional ransomware and malware attacks.

Luckily, it isn’t complicated or expensive to protect your business.

Simply make sure that all members of your team are trained to think twice about every email they receive.

If an email asks for sensitive information or a financial transaction – especially if it feels urgent – your employees should know to stop and check with someone before they action anything.

If you need help making sure your business is secure, get in touch.

Can’t find what you need in Teams? This makeover will increase your business’s productivity

Ever feel overwhelmed by the maze of chats, channels, and notifications in Microsoft Teams? Well, here’s the good news: Microsoft’s rolling out an update to help streamline things.

The update will create a simpler workspace that’s easier to navigate – grouping everything in one location under the Chat menu. Think of it as a central hub where all your key conversations and notifications live.

The update also includes a new “@mentions” view that gathers all your direct messages and important mentions in one place. This will make it easier to catch up on messages you’re tagged in, helping you to make sure important notifications don’t slip through the cracks.

Teams will also be getting improved filters and controls. This will let you do things like filter out less urgent notifications, as well as create custom sections to keep your chats, channels, and meetings organized by project or topic.

Another great feature being introduced is a new “favorites” section, allowing you to pin your top chats and channels for quick access.

Also, threaded conversations are expected to arrive some time in mid-2025. This will mean that replies get grouped together in the same thread, making it easier to follow discussions without losing track of previous messages.

All these improvements are coming to desktop, Android, and iOS – so your team will be able to stay on top of things no matter where they are.

If you’re not already using Teams to keep communication flowing in your business, now’s a great time to start. We can help with that, get in touch.

Security alert: Does your business have old logins for ex-staff?

When someone leaves your business, you might be so wrapped up in the rush of everyday tasks, you forget to delete their login details.

It’s easy to overlook. You’ll get around to it later, right?

But unused login details could be a ticking time bomb for security breaches, leaving the doors wide open to cyber criminals. It can also be an unnecessary drain on your budget if you’re paying for old subscriptions you no longer need.

A recent report found that almost half of businesses had accounts that were no longer actively managed.

If you’ve forgotten about an account, you’re not monitoring it. And this leaves your business vulnerable to attacks.

These risks aren’t just hypothetical, either. Many cloud security breaches happen because unused login details and accounts have been compromised.

So, what do you need to do?

Take the time to audit all accounts and login details used by your business. Make sure you no longer have accounts open for ex-employees (and check that their access has been fully revoked, not just left inactive).

The same goes for any software or service that you’ve stopped using in your business. You might not realize you’re still paying for a service you haven’t touched in months – or even years.

Going forward, make sure you have a clear process for when people leave, and regularly review the applications and services your business uses.

If you’re not sure where to start, let us help you perform a security review and make sure you’re not leaving your business exposed to unnecessary threats. Get in touch.