Windows 7 – End Of Live – What does it really mean for me?
It has been widely broadcast that Microsoft will stop supporting Windows 7 on January 14th 2020. That means that all security updates, bug fixes, etc will end and will not be provided by Microsoft.
Can I just remain as I am on Windows 7?
Of course there is nothing stopping you from carrying on using Windows 7 after the 14th January and there is no doubt many people and companies will but it is best to be fully informed of what that course of action means to your business and what the likely impact could be if you continue with an unsupported Operating System.
Learning from lessons of the past…
Remember when Windows XP expired but some organisations continued using it long after and fell victim to the likes of the WannaCry ransomware? It is very likely that attackers are working on similar ways to exploit the opportunities to attack when Microsoft ends its support for Windows 7.
Effectively Microsoft will not take responsibility for the Windows 7 product anymore making you more susceptible to hackers as you will no longer have regular patches and security updates. You are then risking losing important data and all the pain that comes with a cyber-attack.
Aside from the security threat aspect it also important to note that 3rd party software providers are unlikely to support their offering to you past this date if you still run a Windows 7 Operating System.
Change is always uncomfortable…
There is no doubting that change is never easy, especially when you are content with Windows 7, an operating system which is one of the most successful every developed by Microsoft. However, in order to continue receiving a better experience with improved features that can save time while producing better outputs from Word, Excel and PowerPoint not to mention closing the security risk then you really need to consider your upgrade options.
It will be short term pain for long term gain….
Nimbus are on hand to carry out a no obligation, non intrusive audit of your IT infrastructure. Using our award winning technology, we can quickly identify what devices need to be upgraded. This upgrade can either be working with the existing equipment right through to a complete refresh and everywhere in between. We can also offer flexible finance options which can alleviate any concerns about up front capital or the impact on cash flow.
Call us on: Belfast +44 (0)28 90080030 or Dublin +353 (0)1 9012099
Sean joins the Nimbus team with over 15 years experience working in the Service Industry within the Private Sector across the island of Ireland.
Prior to joining Nimbus, Sean has worked alongside Nimbus on a number of projects in his previous role in a Managed Print Services company and understands how our business has grown and developed over the years.
The new management role has been created to support the existing business growth within the UK & Ireland market, developing new business opportunities along with building strong client relationships while identifying and developing new sectors and industries.
Our Founder & CEO, Gareth McAlister said “I have known Sean over the past 5 years and am delighted to welcome him to the team here at Nimbus. His experience within the service industry will be invaluable to us as we continue our growth plans into the future”
Who are Nimbus?
Nimbus are experts in Managed IT solutions offering proactive 24/7/365 support to organisations across the UK and Ireland. We also offer high level consultancy services to larger companies on Risk and Cyber Security as well as compiling and implementing Disaster Recovery plans and strategies.
With locations in Belfast and Dublin and a highly skilled technical team of experts operating from state of the art premises, Nimbus is well equipped and experienced to take care of your organisations IT requirements.
Interested in getting a chat about what we may be able to offer your organisation?
Call us on:
028 900 800 30 – Belfast
01 901 2099 30 – Dublin
You can also email Sean at: email@example.com
Main duties, tasks and responsibilities (not exhaustive)
• Director Support: Reactively supporting and assisting Director with day to day matters arising as required. Producing reports for Director. Supporting Director with supply and maintenance of business services such as company credit cards / business insurance cover / mobile phone contracts / utility suppliers etc. Supporting Director with continual improvement of internal systems and processes. Communications with all staff to share updates / requests / cascade information from Director. Organising and booking business travel arrangements and accommodation
• Meeting Co-ordination and Client Liaison: Organising internal and external meetings, communicating with all relevant parties, producing meeting agendas, taking minutes and carrying out follow up actions as required. Booking catering and organising refreshments as relevant.
• Human Resources: Administering and recording all internal HR matters including annual leave, sickness, complaints and disciplinary matters. Co-ordinating employee reviews and staff training. Administration of recruitment activities and preemployment processes. Organising staff training and Team events and socials. • Building / Office Management and Maintenance: Carrying out scheduled H&S checks and maintaining fire safety testing schedule. Liaising with contractors / third party organisations to co-ordinate repairs / maintenance / improvement works to office premises. Maintaining stocks of office supplies and equipment.
• Accounts / Finance: Liaising with Accounts Officer to update on changes to customer accounts and feed back relevant financial information.
• General Administrative: General day to day tasks including word-processing, preparing printed documents, scanning etc. Opening mail and actioning / distributing as appropriate.
• Personal Attributes: In all above tasks, maintaining confidentiality and discretion to the highest degree, and a courteous approach to clients and staff at all times. Flexibility is key within this role and the postholder will be expected to perform different tasks as necessitated by their changing role within Nimbus as a growing and evolving organisation.
Hiring IT support can be a huge benefit for your business. Not only does it allow you to make vital business savings, but it can allow you to get the best from your computer network, allowing you to be more productive.
However, when seeking out IT support from outsourcing providers, a number of mistakes can be made. Here are the most common mistakes businesses make, and how you can avoid them for a better relationship and more fulfilling service.
1. Going for the cheapest option
In today’s gig economy there are numerous options available when it comes to finding IT support. However, not all are equal. The cheapest options aren’t good for your business. Sometimes they’re foreign based and have different cultures, expectations and resources than you need.
In addition, the cheapest options often mean they aren’t investing in their own infrastructure. They might also not be so tight on EU or UK legislation when it comes to security and data privacy. You should always be looking for a competitive price, but one that offers you a quality service as well.
2. Thinking IT support is a short-term service
There are numerous businesses who contact IT support providers looking for a quick, short contract, break-fix or PAYG. However, this can often leave your business losing out technically and opening up your company to risk.
Long-term contracts offer stability for your IT network that enable it to continuously improve and not feel like a hotchpotch of systems melded together. In addition, one long-term vendor can offer you better security assurances than lots of different vendors who might not know that other vendors haven’t implemented important security updates.
3. Not having a manager
While you’re outsourcing your IT needs, it doesn’t mean you can’t have an IT manager. You still need someone in your business who manages the computer networks, making decisions and giving direction to your IT support team. This person can also give feedback to the other leaders in the business.
Having an IT manager also allows for better, more consistent communications as everything will go through them. It also helps the IT support vendor as they have a single person to contact, with whom they can build a long-term, successful working relationship that will only benefit your computer network.
Businesses used to be able to easily understand the threats they faced: financial liquidity, changing customer behaviour, and staff morale. However, while these threats will always exist – and still pose a significant threat to businesses to this day – cyber threats are now a factor for virtually every business. The two attacks described in this article, DoS and Phishing, are not new: however, they are still important to understand and mitigate against for all businesses.
Denial of Service attack (DoS)
A denial of service attack, or a distributed denial of service attack, is the name given to an attack which overwhelms a computer system. The most common form of DoS attack is through a coordinated effort to disrupt the service of a website, by instructing automated bots – sometimes referred to as bot nets – to target web hosting servers with repeated requests. This leads to the hosting servers becoming overwhelmed and failing for all users who are legitimately trying to access the website.
The threat of these attacks can best be mitigated through a dedicated IT support team which can respond in real time to DoS attacks. IT professionals can blacklist the threat coordinators and bots from accessing the servers, limiting any impact on the website.
Phishing attacks are among the most common cyber attacks businesses face in the modern age. They work for one very simple reason: they rely on human beings as the last line of defence.
In a phishing attack, a cybercriminal will attempt to fraudulently gain access to a computer system using social engineering or electronic manipulation. One particularly common method involves a criminal spoofing an email address, making it appear legitimate to the recipient. The email would usually include a link to a website which prompts the receiver to enter sensitive data, such as their username and password. Once the criminal has the sensitive data, the damage they can cause to a business system is immeasurable.
The best preventative against these attacks is education around cyber threats and how email spoofing works. This can be delivered most effectively through a dedicated IT support team, who will have the knowledge to share with colleagues best practices and what steps to take if they suspect a phishing attack is taking place.