Blog

  • 0

Microsoft OneDrive Changes – How will they impact you?

Category : Blog

Microsoft have just shared changes that are coming to OneDrive

Microsoft 365 Roadmap | Microsoft 365

Many users have personal OneDrive accounts as well as business ones.  If OneDrive detects that a business user also has a personal account, it will, “helpfully” offer to synchronise those files to the business PC, by default.
There is a cyber-security risk element. Microsoft clearly think that its helpful to have the PC automatically detect these and sync them for users.   We think that will be true in most cases, but not all.  This is especially true when the business has no control over the content people use on their personal files, and some might be, well, personal, and not appropriate for work.  Likewise, it makes it far too easy to accidently, or deliberately, copy sensitive business files into the personal account.  From there, the files can be further shared with no further restrictions, unless the business has invested the time and effort in setting up DLP services in 365 – something that is complex and not prevalent in smaller businesses.  (some commentators are going so far as to say this will defeat DLP settings, although we are yet to verify this)

OneDrive New Feature Allows Default Sync of Personal & Corporate Accounts


  • 0

Windows 10 Support Extension Option

Category : Blog

We’ve been warning all our clients about the end of support for Windows 10.  Microsoft have reaffrmed, as recently as last week, that free support for Windows 10 will officially end on October 14, 2025. After this date, users will no longer receive free security updates, bug fixes, or technical assistance through Windows Update.

However, there is a potential lifeline. Microsoft has introduced a paid Extended Security Updates (ESU) program, allowing users to continue receiving critical security patches through October 2026 for a fee—details TBC but it does look expensive.  There is also an option for home users to redeem 1000 Microsoft Rewards Points.

Updates are still coming

The latest Windows 10 patch (KB5030211) has added a new “Windows Backup” feature allowing users to backup user settings, installed applications and files.

Alongside this announcement, Microsoft released the June 2025 cumulative update (KB5060533) for Windows 10 versions 21H2 and 22H2. This update includes minor security and quality improvements, as well as a new Calendar flyout feature that restores seconds to the system clock. While no major new features were introduced, the update underscores Microsoft’s continued maintenance of Windows 10 until its official October end-of-support date.

Our recommendation is to continue to move all devices from Windows 10 to Windows 11 as soon as possible.


  • 0

How to secure your Email

Category : Blog

Hacking someone’s e-mail address promises potential rewards for the criminally-minded. Of course, the most obvious is gaining access to your private conversations, whether to reveal sensitive personal or professional, information that could be used for malicious purposes including identity theft and corporate espionage. A hacker could also delete messages in an attempt to destroy valuable information.

But for the average online user, the most serious threat from hacked e-mail is that a criminal can use your account to discover the keys to your other online accounts, such as financial services like banking and PayPal. Many websites with secure login portals provide the ability for you to retrieve a “forgotten” username and/or password. When the sites send this information to your registered e-mail account, it is presumed that you are the only one with access to this account. A hacker who has snuck in could do the same, and gain direct access to everything from your Facebook account to your mortgage, investments, banking, and utilities.


  • 0

How to secure your windows operating system

Category : Blog

Today’s operating systems are more sophisticated and feature-rich than ever before, which makes them substantially more useful to the enterprise but also adds to security vulnerability—unless the operating systems are configured, administered and monitored correctly. Contrary to popular belief, this can be accomplished with a minimum of fuss and bother. The key is to centralize and automate operating system security across the enterprise, rather than do it manually for each box.