<?xml version="1.0" encoding="utf-8"?>
<!-- generator="Joomla! - Open Source Content Management" -->
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>telanova Blog</title>
		<description><![CDATA[telanova is a unique Manage IT services. With a head office in Bracknell, telanova supports the UK and more. Whether via VCIO and strategy planning, or proactive maintenance, telanova helps you make the most of IT.]]></description>
		<link>https://www.telanova.local/about/blog</link>
		<lastBuildDate>Thu, 24 Nov 2022 12:34:56 +0000</lastBuildDate>
		<generator>Joomla! - Open Source Content Management</generator>
		<atom:link rel="self" type="application/rss+xml" href="https://www.telanova.local/about/blog?format=feed&amp;type=rss"/>
		<language>en-gb</language>
		<managingEditor>warwick.grigg@telanova.com (telanova website)</managingEditor>
		<item>
			<title>WiFi or wired connections - How to get the best for your organisation?</title>
			<link>https://www.telanova.local/about/blog/295-wifi-or-wired-connections-how-to-get-the-best-for-your-organisation</link>
			<guid isPermaLink="true">https://www.telanova.local/about/blog/295-wifi-or-wired-connections-how-to-get-the-best-for-your-organisation</guid>
			<description><![CDATA[<p><img src="https://www.telanova.local/images/blog/WiredvsWireless.png" /></p><p>WiFi is flexible, you can work from anywhere without a network cable. The downsides are:</p>
<ul>
<li>Dead spots.</li>
<li>Interference from other nearby WiFi networks, or microwaves, baby monitors etc</li>
<li>The more people use it the harder it is to make it fast enough and reliable</li>
</ul>
<p>A wired connection is much faster than wifi and more reliable, but you can only work where your cable reaches.   It can be expensive and disruptive to install cables everywhere they’re needed.</p>

<p>WiFi is well suited to organisations with open plan offices with laptops and hotdesks that use only small files.  Enterprise WiFi solutions typically have multiple WiFi access points and a central WiFi controller.  Not only does this make sure the whole office is covered but also spreads the load and improves reliability. </p>

<p>Whereas a graphic design firm with powerful workstations will be transferring large files and would benefit from  wired connections.</p>

<p>Getting the best balance between cost and performance can be tricky especially with a mix of different requirements. In a business environment a DIY approach doesn’t make sense: the business will spend time, money and energy on the wrong solutions. Instead, engage telanova as your IT team.</p>

<div class="controls"><a href="https://www.telanova.local/contact"><button class="btn" type="button">Contact Us</button></a></div>]]></description>
			<author>jon@telanova.com (Jonathan Hobson)</author>
			<category>Blog</category>
			<pubDate>Mon, 16 May 2022 08:05:46 +0100</pubDate>
		</item>
		<item>
			<title>Laptop Encryption</title>
			<link>https://www.telanova.local/about/blog/354-laptop-encryption</link>
			<guid isPermaLink="true">https://www.telanova.local/about/blog/354-laptop-encryption</guid>
			<description><![CDATA[<p><img src="https://www.telanova.local/images/encryption.jpg" /></p><p>For many years businesses have been increasing the security of their devices, by creating password policies, then making the password requirements more complex and latterly adding multi-factor authentication into the mix.</p>

<p>This has led to many organisations assuming that because they have enforced a fiendishly complex password policy together with the use of an MFA app, in the event of that device is lost or stolen, the data is inaccessible to the thief or finder.</p>

<p>If an attacker has physical access to a device, it is quite easy to bypass the password protection and access the data on the device.  However, there is a solution that is built-in to most modern devices but requires configuring - Device Encryption.</p>
 
<p>When device encryption is enabled, the storage unit in the device is encrypted with a strong cryptographic algorithm and a special recovery key is generated.  If there is an attempt to bypass the security on the device, perhaps by removing the storage media and putting it in another computer, the attacker won’t be able to access it without that recovery key.  On a Windows computer this is called Bitlocker and on a Mac it is called FileVault.</p>

<p>That now makes the Recovery Key itself very important and needs to be stored securely.  If there is a change to the device, the user may be prompted to enter the recovery key when starting the device up.  Lose the key and the device is unusable, the only option is to reformat the storage device and start from a clean fresh installation.  For a business, managing a fleet of devices, making sure that encryption is enabled, and that the recovery keys are stored in a safe location is essential.</p>

<p>At telanova we enable laptop encryption for our customers, monitor the status, and ensure that the recovery keys are kept separate and secure.  Some customers have security requirements that mean desktops need encryption, too, especially if they are located in areas where the public have access, such as showrooms.  Furthermore we ensure that our customer’s data is securely backed up to the cloud, so that should the unthinkable happen, their data is protected.</p>

<div class="controls"><a href="https://www.telanova.local/contact"><button class="btn" type="button">Contact Us</button></a></div>
]]></description>
			<author>tim.nicholls@telanova.com (Tim Nicholls)</author>
			<category>Blog</category>
			<pubDate>Mon, 11 Apr 2022 14:36:20 +0100</pubDate>
		</item>
		<item>
			<title>What’s the most common IT problem?</title>
			<link>https://www.telanova.local/about/blog/353-what-s-the-most-common-it-problem</link>
			<guid isPermaLink="true">https://www.telanova.local/about/blog/353-what-s-the-most-common-it-problem</guid>
			<description><![CDATA[<p><img src="https://www.telanova.local/images/My-computer-is-slow.jpg" /></p><p>A customer asked us, “what’s the most common IT problem?” and that’s definitely "My computer is too slow!"</p>

<p>Sometimes there’s a technical issue with the computer making it slow, something unusual running in the background, or a pending hardware failure. But often the issue isn't actually a technical fault… it’s that the end user is frequently having to wait when carrying out some business process.</p>

<p>IT is never fast enough. It’s never good enough. We always want IT to be faster, better, so we can get more work done in less time! Unfortunately, everything in IT is a trade off: speed, budget, reliability, capability, and more. And it’s not just the computers, but the internet connection, cloud services, servers, Wi-Fi, network equipment, etc too.</p>

<p>So what do we do about it? To start with, we learn how our customers use IT and what their needs are, so that we can help them choose the best balance within their budget. Then on an ongoing basis, our support team will make their choice work for their business in a practical way.</p>

<p>Are you getting the best bang for your IT buck?</p>

<div class="controls"><a href="https://www.telanova.local/contact"><button class="btn" type="button">Contact Us</button></a></div>

]]></description>
			<author>paul.grigg@telanova.com (Paul Grigg)</author>
			<category>Blog</category>
			<pubDate>Mon, 21 Mar 2022 11:14:41 +0000</pubDate>
		</item>
		<item>
			<title>Bring Your Own Device safely</title>
			<link>https://www.telanova.local/about/blog/321-bring-your-own-device-safely</link>
			<guid isPermaLink="true">https://www.telanova.local/about/blog/321-bring-your-own-device-safely</guid>
			<description><![CDATA[<p><img src="https://www.telanova.local/images/blog/byod.jpg" /></p><p>It has become more common for businesses to allow their users to access their email, calendars or other services such as Microsoft Teams, through a personal mobile phone, tablet or other device, usually referred to as “Bring Your Own Device” (BYOD). It has become increasingly popular because people don’t want to carry a work and a personal device, but do want the convenience of being able to stay in touch on-the-go.  The increase in remote working as we have navigated the restrictions imposed by COVID-19 has added to the popularity, and companies have appreciated not having the extra expense of providing these devices to their users.<p>
<p>]]></description>
			<author>tim.nicholls@telanova.com (Tim Nicholls)</author>
			<category>Blog</category>
			<pubDate>Mon, 14 Mar 2022 09:36:12 +0000</pubDate>
		</item>
		<item>
			<title>Stop sharing passwords</title>
			<link>https://www.telanova.local/about/blog/286-stop-sharing-passwords</link>
			<guid isPermaLink="true">https://www.telanova.local/about/blog/286-stop-sharing-passwords</guid>
			<description><![CDATA[<p><img src="https://www.telanova.local/images/passwords1.png" /></p><p>A manager called us, needing his assistant to send some emails for him.  He was planning on sharing his password.</p>

<p>A major security violation! If you share your password:</p>
<ul>
<li>The person you have shared it with may have access to things they should not - like personal emails or private appraisals</li>
<li>There is no accountability or traceability - if they access/edit/delete an email, there may be no way to show if you did it or if it was the other person.</li>
<li>The more people that know a password the more chances are for it to be compromised - making it less secure.</li>
</ul>
<p>The truth is if sharing your password is the only way to share access - it is a sign of poor IT.</p>

<p>The good news is they were on Office 365, a business-class email system, which allows you to grant a colleague access to your emails and the ability to send them as you. We helped him grant access to his assistant, no password sharing required.</p>

<p>There are a few cases where sharing passwords might be unavoidable - such as log-ins to third-party websites or devices that only allow one account.  In these cases, we suggest a secure password manager like LastPass.</p>

<p>Password managers allow you to securely store and share passwords and keep them updated without having to actually give someone the password.  They can be configured so that the password can’t be seen or copied when it is used to login.  </p>

<p>It has other advantages too: the passwords can be more complex (as you don’t have to remember them); security checks are carried out for weak or potentially compromised passwords and it provides auditing tools so you can see who used which password and when they used it.  You can also set it up to use 2FA, so you get an extra verification step before using it, which is handy if some of the logins stored in the password manager don’t themselves support 2FA.
</p>

<p>Contact telanova to beef up your IT security</p>

<div class="controls"><a href="https://www.telanova.local/contact"><button class="btn" type="button">Contact Us</button></a></div>
]]></description>
			<author>tim.nicholls@telanova.com (Tim Nicholls)</author>
			<category>Blog</category>
			<pubDate>Mon, 07 Mar 2022 11:10:11 +0000</pubDate>
		</item>
		<item>
			<title>IT supply chain attacks</title>
			<link>https://www.telanova.local/about/blog/309-it-supply-chain-attacks</link>
			<guid isPermaLink="true">https://www.telanova.local/about/blog/309-it-supply-chain-attacks</guid>
			<description><![CDATA[<p><img src="https://www.telanova.local/images/blog/ITSupplyChainAttacks.jpg" /></p><p>Often robbers don’t break directly into a bank, but via the coffee shop next door.</p>
<p>IT supply chain attacks are like that. Hackers don’t gain access to a target directly but via a less secure supplier. So organisations assess their suppliers’ security arrangements.</p>
<p>Larger organisations are demanding their smaller suppliers comply with security policies and prove that they are safe to do business with.</p>
<p>We will:
<ul>
<li>Audit your security and suggest sensible changes and policies to make sure your business is secure.</li>
<li>Prove that you are secure, by gaining accreditations such as Cyber Essentials.</li>
<li>Guide you through any security requirements your customers may require from you</li>
<li>Implement policies to make sure your suppliers are secure - making sure they are not the weakest link either.</li>
</ul>
</p>
<div class="controls"><a href="https://www.telanova.local/contact"><button class="btn" type="button">Contact Us</button></a></div>
]]></description>
			<author>jon@telanova.com (Jonathan Hobson)</author>
			<category>Blog</category>
			<pubDate>Mon, 28 Feb 2022 09:36:12 +0000</pubDate>
		</item>
		<item>
			<title>Managing email signatures</title>
			<link>https://www.telanova.local/about/blog/298-enforcing-a-consistent-email-signature-across-your-organization</link>
			<guid isPermaLink="true">https://www.telanova.local/about/blog/298-enforcing-a-consistent-email-signature-across-your-organization</guid>
			<description><![CDATA[<p><img src="https://www.telanova.local/images/blog/Email-signatures.png" /></p><p>Making sure your employees have set an email signature with the same style, branding and information can be a major hassle. It’s manageable when you’re small, but as you start to grow, it’s a real time waster, especially as employees typically send email from multiple devices - laptops, mobile phones and tablets.</p>

<p>That's why we set up our customers with the Exclaimer cloud email signature service. Each employee gets the business’s signature added to every email, whatever device it's sent from.</p>

<p>With Exclaimer it’s very simple to promote new products or show off an award. Just update the central template and everybody’s emails will immediately go out with the new information. Exclaimer works with both Microsoft 365 (formerly Office 365) and Google Workspaces (formerly Google G Suite).</p>

<p>Contact us if you want your employees to have professional email signatures.</p>
<div class="controls"><a href="https://www.telanova.local/contact"><button class="btn" type="button">Contact Us</button></a></div>
]]></description>
			<author>tim.nicholls@telanova.com (Tim Nicholls)</author>
			<category>Blog</category>
			<pubDate>Mon, 14 Feb 2022 14:31:23 +0000</pubDate>
		</item>
		<item>
			<title>Tales from our helpdesk: server failure on Christmas eve</title>
			<link>https://www.telanova.local/about/blog/352-tales-from-our-helpdesk-server-failure-on-christmas-eve</link>
			<guid isPermaLink="true">https://www.telanova.local/about/blog/352-tales-from-our-helpdesk-server-failure-on-christmas-eve</guid>
			<description><![CDATA[<p><img src="https://www.telanova.local/images/server.jpg" /></p><p>In the early hours of Christmas Eve our monitoring platform alerted us that a server was offline - Paul diagnosed a faulty RAM module.</p>

<p>He was quickly onsite, verified that the RAM was faulty and liaised with the manufacturer to get a replacement.  He removed the faulty RAM and booted the server - adjusting resource limits to allow everyone to work.</p>

<p>As soon as the replacement RAM arrived, we went onsite to install it and re-adjust the resources back to normal.</p>

<p>This could have been a much worse outage, but for our customers:</p>
<ul>
<li>We spec servers to be able to cope with the failure of a component.</li>
<li>We supply equipment with business class warranties, which means technical help and spare parts are readily available from the manufacturer.</li>
<li>Our 24/7 monitoring system is deployed, configured to detect the failure and alert us.</li>
<li>We configure and test out-of-band tools that allow us to identify issues even if the server is off.</li>
<li>Our out-of-hours engineers are experts in identifying issues, temporary workarounds and making replacements.</li>
<li>Our engineers speak the language of manufacturers, which allows us to rapidly get parts dispatched.</li>
</ul>
<p>Without the services we provide outages would last significantly longer.</p>

<p>Some people might think that they’re fine with just the manufacturer’s on-site response. However:</p>
<ul>
<li>The manufacturer will often just ship out the replacement part and expect the customer to replace it - would you know how?</li>
<li>The manufacturer doesn’t know how the customer’s systems are set up and aren’t responsible for other components, whereas we do know and we’ll get the system back up and running while we’re waiting for the replacement part</li>
<li>Replacing the part doesn’t always get you back up and running - we resolve the knock-on effects, for example reinstalling software or restoring from backup</li>
</ul>
<p>For peace of mind, engage telanova as your IT team</p>
<div class="controls"><a href="https://www.telanova.local/contact"><button class="btn" type="button">Contact Us</button></a></div>
]]></description>
			<author>jon@telanova.com (Jonathan Hobson)</author>
			<category>Blog</category>
			<pubDate>Mon, 07 Feb 2022 11:14:41 +0000</pubDate>
		</item>
		<item>
			<title>Email attachments are too dangerous!</title>
			<link>https://www.telanova.local/about/blog/285-email-attachments-are-too-dangerous</link>
			<guid isPermaLink="true">https://www.telanova.local/about/blog/285-email-attachments-are-too-dangerous</guid>
			<description><![CDATA[<p><img src="https://www.telanova.local/images/attachment.jpg" /></p><p>Email attachments are too dangerous! Email filters, Antivirus, UTM (Unified Threat Management) appliances etc, all attempt to mitigate that risk, but they won’t catch the very latest attacks. Allowing everyone on the internet to send you attachments is like leaving your door unlocked and only tackling the bad guys when they’re halfway up the stairs!</p>

<p>Email attachments were invented in the early days of the internet when the internet was a far safer place, and they haven’t been improved since. It’s time to replace them with something better.</p>

<p>Most cloud storage products (Microsoft OneDrive, Dropbox etc) have two features that replace the role of emailed attachments with something far safer.</p>
<ul>
<li>When you want to send someone a file, “Share” the file/folder with them.</li>
<li>When you want a file from someone, send a “File Request”. The recipient will receive a link they can use to upload the files to you.</li>
</ul>
<p>There are other advantages too</p>
<ul>
<li>Guaranteed encryption in transit</li>
<li>Set a time limit for access, e.g. 30 days</li>
<li>Made a mistake? Revoke access at any time</li>
<li>Track when files are accessed</li>
</ul>
<p>Once your colleagues and business contacts have become familiar with the new way of working you can block email attachments outright, allowing file sharing only via your approved platforms (eg Office 365, G suite, Citrix Sharefile, or the specific platform relevant to your industry)</p>

<p>We have successfully implemented this for several of our customers with compliance requirements in the fields of Finance, Accounting etc.</p>

<p>Contact us to manage the whole process for you, training, implementation, and blocking.</p>

<div class="controls"><a href="https://www.telanova.local/contact"><button class="btn" type="button">Contact Us</button></a></div>

]]></description>
			<author>tim.nicholls@telanova.com (Tim Nicholls)</author>
			<category>Blog</category>
			<pubDate>Mon, 31 Jan 2022 08:07:01 +0000</pubDate>
		</item>
	</channel>
</rss>
