-
-
-
0
-
-
-
Matthew James
A recent discovery of a flaw in WPA2 encryption means that no wifi network is completely secure.
TLDR:-
- WPA2 – Previously the only widely available wireless encryption protocol to not be hacked has been exploited
- The hack is not device specific
- Fixes are being released, and updates should plug this security hole.
- ESP is proactively pushing updates to hardware as they become available
A Fuller rendition:-
As widely published in the popular press, Monday 16th October saw the announcement of a flaw and proof of exploit on WPA2 Wifi networks. The original source for this was https://www.krackattacks.com of particular interest to you may be the FAQ section, I have copied a selection of the most relevant questions for our clients at the bottom of the page below.
-
-
-
-
-
-
-
0
-
-
-
Matthew James
As announced in a recent post on Microsofts Techcommunity There is now a dedicated training center for use with office 365.
With the recent surge in migrations to the Office 365 platform we are sure that this is a resource that many of you out there will find very useful. Currently it houses a vast array of tutorials, information, tricks and tips and this can only be set to grow as Microsoft adds more features and applications to the quickly expanding online offering.
-
-
-
-
-
-
-
0
-
-
-
Matthew James
In there never ending march into the future there are always thresholds beyond which software applications cannot tread. Such a threshold has come for the venerable Office 2007 Office Suite as it quickly approaches the end of Microsofts support
As from October 10th, Microsoft will no longer be producing updates or bug fixes for Office 2007. Any vulnerabilities that are found in the suite of application from here forward will remain unpatched, which in itself is reason enough to update to one of the newer suites. Beyond this, Microsoft have also announced that from the 30th Office 2007 will no longer be able to connect to the Office 365 hosted email platform, providing even more of a spur for anyone still operating the suite with the cloud service. If you do currently use office 2007 with hosted email you will find yourself to decide between 2 avenues with regards to accessing your email, either to upgrade, or fall back on accessing your email via the online portal at office.com
-
-
-
-
-
-
26
-
-
-
Donna Aplin
Every day over 200 billion emails are sent, people use email to conduct business and to communicate with family and friends. But the question not many people think about; Is your email secure?
The truth is, emails are no more private than a plain old postcard.
Who have you given access to?
Recently the service Unroll.me came under a lot of attention and some well-deserved flack over the recent article dropped by the New York Times look at Uber, which detailed Unroll.me selling inbox data of their users. Unroll.me helps users manage their email subscriptions, which for a lot of people is something that sounds really useful to help manage their inbox. However, Unroll.me has been found to be selling data to Uber, particularly anonymised data detailing ride receipts from Uber and Lyft.
-
-
-
-
-
-
-
0
-
-
-
ESP Projects
What is Office 365?
It essentially began as an online version of the collaborative Microsoft Exchange solution, which enables organisations to share email, calendar appointments and contacts with other staff members. There are now lots of other useful services thrown into Office 365 including Instant Messaging, voice & video calling and a website creation tool. Specifically, you get:
-
-
-
-
-
-
-
0
-
-
-
ESP Projects
One of the most frequent technical support issues we receive here at ESP Projects is the problem of sending large files over email or sending lots of smaller attachments at once.
What really happens after you press send?
Your email is sent on either to your server or to your internet service provider for processing. Just like the mail system, once it has been dropped in the box, it is dealt with by third party carriers until it reaches its destination.
-
-
-
-
-
-
26
-
-
-
Donna Aplin
5:12pm: We have been made aware of an issue whereby a small number of customers are experiencing issues accessing their websites. The issue was first raised at 4:57pm on Friday 28th July 2017. Our engineers are looking into the issue and further updates will be posted at 5:57pm.
5:49pm: ESP engineers are onsite at our data centre working on the issue. A number of customers have had their service fully restored but a small number are yet to be resolved. A further update will be due at 6:49pm
-
-
-
-
-
-
-
0
-
-
-
Matthew James
Possible Issues With Office 365 Portal today – we will continue to update this as news becomes available
10:00am:- We are getting early indications that there is a wide spread issue with the Office 365 portal log in. When attempting log to log in, users are getting sent back to login screen even after inserting correct details. Microsoft is aware of the issue and are working on resolving this.
-
-
-
-
-
-
0
-
-
-
ESP Projects
When you put a logo in an email you only need it to be a few centimetres high. Similarly, when you visit a website, you want images to appear quickly and not have to wait for them to download. You need smaller images both ‘on the page’ and in terms of ‘file size’. This is where image compression comes in. Compressing images can also help save disk space.
-
-
-
-
-
-
0
-
-
-
ESP Projects
Tell us a bit about yourself
I’ve been a programmer commercially for around 5 years and learning for the last 8. I’ve worked across a number of different platforms, including; health and wellbeing, the financial sector and freelance web development. I went to Huddersfield University Where I gained a First-Class Degree and an award for Best Overall Performance on A Final Year Project.
-
-
-
-
-
-
0
-
-
-
Jason Francis
An intranet is a private network that utilises technologies that are normally seen as internet technologies but is operated in an isolated fashion from the rest of the public internet. OK, that seems like a bit of technical jargon, so what is an intranet really? Effectively, it’s an internal website that provides staff with a central place to share and read information.
-
-
-
-
-
-
0
-
-
-
Matthew James
Due to the recent large-scale cyber attack on the NHS, a lot of people are asking the question ‘what is ransomware?’ So we felt it was best to update our post from last year with some more specific information.
What is Ransomware?
Ransomware is a type of computer software that blocks access to data using encryption technology and displays messages requesting actions (usually payment) to get it back, hence the name ‘ransom’.
-
-
-
-
-
-
-
0
-
-
-
ESP Projects
With an increasingly small range of funds available, Charities, often overworked in this age of austerity, are being forced to work harder for the grants and donations they need to keep ticking. Digital marketing for charities hasn’t always been easy, but now, more than ever before, it is an essential task. Publicity, positive image and getting a message across are all getting more difficult to achieve in an ever more competitive environment, with different charities online vying for attention.
-
-
-
-
-
-
-
26
-
-
-
Donna Aplin
ESP Projects have joined forces with Sheffield Foyer to provide an intuitive e-learning course programme as part of their rehabilitation to help the homeless.
The MoveOn course is aimed at people looking for their first job or first tenancy to prepare and give them the key life skills to live independently and re-integrate into the community.
-
-
-
-
-
-
-
26
-
-
-
Ian Barwick
Over the past year, many organisations have been pushing harder than ever before towards a secure web with the use of an SSL Certificate. Google announced their plans of ‘Moving towards a more secure web‘ back in September 2016. Starting with the release of Chrome 56 that was rolled out late last week, users will start to see a “Not secure” message in their address bar when visiting a login or payment page which doesn’t use the secure HTTPS protocol.
-
-
-
-
-
-
-
26
-
-
-
ESP Projects
Before outlining what measures you can take to protect your computer, it’s perhaps more useful to understand what a computer virus actually is. There are many forms of threatening viruses but perhaps the worst kind that can affect your business is what’s known as ‘Ransomware’. This does what it says, it holds your files and data to ransom within your system or server. It works by encrypting certain data so that you can no longer access it. -
-
-
-
-
-
-
0
-
-
-
Jason Francis
Over the years, we’ve ‘bid’ for Website Design work in a whole variety of different ways. One of the most common, is that organisations approach us with their ‘Development Brief’ or ‘Request for Proposal’. -
-
-
-
-
-
-
26
-
-
-
James Greaves
We have all been there haven’t we, happily working along and then ding, Outlook flashes up a notification about that parcel you ordered and that you can track it now… But hang on, did I order a parcel, am I expecting a notification from DHL or the Royal Mail to let me know where it is? -
-
-
-
-
-
-
0
-
-
-
Donna Aplin
Mobile Marketing
If you’re a business wanting to market yourself effectively, embracing the opportunities that mobile marketing presents are more important than ever. With mobile browsing now exceeding desktop, the question shouldn’t be ‘should my company use mobile marketing?’ but ‘how?’
That’s all well and good if your company has the luxury of having its own in-house group of techies or a reliable marketing agency to hand, but staying ahead of the curve poses a number of problems, not least knowing where to start. This blog post hopes to at least give you some information to help you make an informed decision on the best course of action, by outlining the difference between responsive design and mobile websites; along with the pros and the cons for each.
-
-
-
-
-
-
-
26
-
-
-
Matthew James
During your busy work day you receive an email with a word document attached, you open it to view the contents and accept the prompt to run macros. The contents of the file will be un-exciting, maybe even blank, but the damage has been done. Allowing the file to open and run its macros has already opened the door for Locky and the quite devastating results of its work.
-
-