In this day and age we keep hearing the terms User Experience and User Interface (UX/UI). These are terms given to different aspects of how we interact as humans with a product whether it be physical or digital. For a detailed definition have a look at this easy to understand blog
As many of the platforms users will know Zoom has a limit of 40 minutes on its free license. Most business users will have realised this for the first time during an important call with a customer or an investor when suddenly the call ends. Panicking you try to get a new call setup and spend the first few minutes of the call explaining to the other party how IT are going to get a right royal telling off for that happening.
During the Covid-19 Pandemic about 88% of all companies implemented mandatory work from home for all employees and many of these will offer WFH as an ongoing option for employees. Many of these organisations prior to the pandemic did not even know what WFH was let alone permitted employees to do it. This means that with the rapid change caused by the Pandemic many companies simply told staff to work from home with no real consideration to whether this was a secure thing to do or whether the employees would actually be able to perform their job by getting access to the necessary applications. Many IT departments were making changes on the fly.
This new WFH culture meant that people were engaged less with in person communications and therefore email usage increased. With this came an increase in Phishing attacks from those who were keen to alleviate you of your savings or company funds. In fact 30% of all Phishing attacks are targeting work from home employees and combined with the statistic that 90% of all employees find it difficult to identify a phishing email it is easy to understand how this is a significant risk to any company whose employees are, forced through legislation or otherwise, working from home.
The solution to this is a three prong approach:-
- Ensure all staff have received comprehensive training on how to identify and handle phishing and other malicious emails. In fact employee cybersecurity training of any form will benefit the company.
- Ensure all staff have suitable secure equipment to work from home with. If they are using their own equipment then get your IT to audit their machines to ensure they are fit for purpose. Consider providing company secured equipment to those “intense users” for work from home use.
- Ensure your company email is secure and that it protects from most kinds of malicious email. This may cost a bit more each month but the long terms benefits outweigh these costs.
At FunctionEight we often win new clients because the old IT provider failed to secure the email properly or advise the client what should or should not be done. Don’t become a victim and ensure you heed the words of advise above.
If you are unsure how to proceed please feel free to contact Henrik on his email email@example.com to see how FunctionEight can help you.
For a more comprehensive look at WFH policies please review our previous blog https://www.functioneight.com/blogs/wtf-wfh-work-home
There are many governments grants available in Hong Kong an SME. In fact, the government has over 40 grant schemes available. I am not sure exactly how much money has been put into these grants but it runs into the 10’s billions Hong Kong dollars and there is a large percentage of the grant still available. This means that the average SME should be applying for 3 or 4 of these grants to maximise what is available to them.
Soon after the horrific explosion that occurred in Beirut the dark side of our world kicked in and specifically two things occurred that seem to be an ever increasing trend in times of crisis:-
Actual photos and videos of the event are edited and manipulated to accommodate a different and often more sinister story line. Regular media and social media are excellent avenues for the distribution of material…
Attempts to gain access to your data through illegal means is an activity that is increasing at an almost exponential pace. To put this into perspective a new Phishing site is launched every 20 seconds. The bad guys attempts to get your data is getting ever more innovative.
We are now 6 months into the new way of working. Work From Home, no meetings, social distancing etc. The days of in person committee meetings or coffee shop meetings at least for the time being are over.
We have all gotten used to the new normal of Zoom meetings or Teams meetings etc.
So the D-Biz has been open for applications for almost 1 month now and the rumours are that there have been 10,000 applications already submitted. I cannot verify this but if everyone has applied for the full amount of 300,000 that would mean 3 Billion in funding requests which since the programme has only 500 Million available it would mean in the first month of application the programme is 6 time oversubscribed already.
In these difficult times many companies are forced into difficult decisions regarding manpower and unfortunately headcounts and cost savings often need to be done. If you are unfortunately in that situation and you make the conscious decision that part of that reduction involves your IT person then below is the list of the most important credentials and access that you need to ensure you get documented such that anyone else whether an existing internal resource or an outside resource can pick up and put the rest of the information together.