30 Mar 2020
Designed by Freepik

Working through Covid-19

We are continuing to monitor the impact the COVID-19 crisis is having on IT projects but of course, working in IT does mean that services can often be delivered remotely.

Consequently, we have identified areas where we think we can help organisations face some of the challenges that the Coronavirus outbreak might be causing by making workers work from home.

 

This includes:-

• Achieving remote connectivity
• Problem solving
• System configuration and set up
• System Architecture
• Design reviews
• Project planning (e.g. future migration/rollout projects)
• IT strategy reviews
• Hosting workshop sessions
• Remote meeting attendance and hosting
• On-line training sessions

 

AND providing remote assistance to customers including:-

  • Endpoint management (i.e. the ability to remotely discover, provision, deploy, update and troubleshoot endpoint devices within an organisation).
  • Endpoint management – system health checks.
  • Application sequencing/packaging/delivery.
  • Endpoint remote connectivity.

 

Our approach is to offer simplified and appropriate remote assistance for customers with sessions:-

  • Scheduled on an ‘ad-hoc’ basis.
  • Remotely delivered ‘on-line’.
  • Billed by the hour.

 

If this is of interest to your organisation and you would like further details please get in touch so that we can schedule a call to discuss your requirements.

07 Jun 2019

Why has Windows XP received a new patch in 2019?

2014 was Microsoft’s official timestamps for when Windows XP would stop receiving support. That was until 2017 when a patch was released to defend itself against the WannaCry ransomware situation. 2 years down the line and again it seems Microsoft have released another new patch…. But why?

 

Microsoft recently released patches for both Windows XP and Windows Server 2003. The reason behind this is said to be to prevent a ‘wormable vulnerability’ that has the potential to cause as much chaos as WannaCry did back in 2017 if unchecked.

 

On the 14th May 2019, Microsoft stated:
Today Microsoft released fixes for a critical Remote Code Execution vulnerability, CVE-2019-0708, in Remote Desktop Services – formerly known as Terminal Services – that affects some older versions of Windows. The Remote Desktop Protocol (RDP) itself is not vulnerable. This vulnerability is pre-authentication and requires no user interaction. In other words, the vulnerability is ‘wormable’, meaning that any future malware that exploits this vulnerability could propagate from vulnerable computer to vulnerable computer in a similar way as the WannaCry malware spread across the globe in 2017. While we have observed no exploitation of this vulnerability, it is highly likely that malicious actors will write an exploit for this vulnerability and incorporate it into their malware.

Now that I have your attention, it is important that affected systems are patched as quickly as possible to prevent such a scenario from happening. In response, we are taking the unusual step of providing a security update for all customers to protect Windows platforms, including some out-of-support versions of Windows.

Full Microsoft statement HERE

 

If you need some advice and guidance to do with IT security, or an independent security audit please feel free to contact us directly! CLICK HERE