News
Knights in shining armour!
It’s not every day that we get called ‘Knights in shining armour’, so we’re immensely proud to have been called so by Loretto Linehan, Director at Belvoir Southampton. For ten years we have worked to support Loretto, her husband and business partner Brian, and their team at Belvoir. In 2018 Brian was kind enough to say, “When Loretto and I first established Belvoir Southampton, Rupert gave us excellent IT advice and support and this has continued as our business has grown. We pride ourselves on providing an efficient and professional service to our Buyers, Sellers, Landlords and Tenants, and fully-operational IT systems are essential. I’d recommend Net Primates to any organisation that requires first-rate, proactive IT support.” Five years on and Loretto and Brian have added to their portfolio by acquiring Belvoir Basingstoke, drawing on more services from Net Primates. Help during acquisition When acquiring a new small business to accompany an existing business, integrating and adapting the IT systems is crucial for a successful merger. In order to help the Belvoir teams begin working together as quickly, smoothly and efficiently as possible we carried out a number of steps, for which Loretto has written us a glowing testimonial. Here’s how we helped Belvoir… Assessment of existing IT systems Firstly, we conducted a comprehensive assessment of the IT systems used by Belvoir Basingstoke, in comparison with the systems that we already provide to Belvoir Southampton. This evaluation helped us to…
High-speed off-grid internet connectivity
Steve could be anywhere – in the heart of the wilderness (or at festival in Oxfordshire), where the soothing sounds of nature (and folk bands) reign supreme – and his passion for the world of IT still knows no bounds. His insatiable curiosity and unyielding dedication led him to experiment with a Starlink internet-connectivity kit during his recent camping excursion. For Steve, the allure of technology is a flame that burns brightly even amidst the crackling campfires of the great outdoors. Read on… “So, I have just returned from four days sitting in a field at a Folk Festival called Fairports Cropredy Convention near Banbury. I have been coming to this Festival for over 10+ years, with a few breaks in between (baby arrival, Covid pandemic, etc) This year I decided to take along one of our Starlink kits to see and confirm how easy it is to get reliable high-speed connectivity in the middle of a field! To give some background on the location and event, Cropredy is a small village located in the Oxfordshire countryside and once a year it hosts a Folk Festival with over 20,000 people attending. This number doesn’t include the numerous support crews for front and backstage, the bands and all the various vendors and the numerous devices they bring! The Problem As you can imagine this sudden influx of people and devices puts a real demand on the local 3G/4G cell sites as…
Are your Data Silos backed up?
Most of you carry out regular backups, so we’re not trying to preach to the converted. But this blog isn’t about your regular backups… it’s about Data Silo backups. Not sure what they are? Read on. Never assume! Whilst most businesses are fully aware of the importance of backups, there are still areas of our business lives where backups could have slipped through the net. There will be a wealth of data that is not contained within your servers and standard backups. Think about the systems you use that are remote from your business – systems where you have data that isn’t on your server (where you have Data Silos): Email systems, such as Mailchimp HR systems, such as Monday.com HR Accounting systems, such as Xero Social media scheduling systems, such as Hootsuite Password managers, such as LastPass Online documentation repositories, such as Document360 CRM systems, such as Hubspot Your website. And then there’s your personal life – how many photos do you have floating about in the cloud? What to consider It’s important to backup data silos to prevent data loss in case of hardware failure, human error, cyberattacks, or other unforeseen events. Consider how often each system is used – daily, weekly, monthly… backup scheduling should reflect this frequency, replicating data and storing on servers. Servers can be on site, off site and cloud based, ideally having at least one storage facility that is geographically distant from the…
Chris Dewey celebrates his 5-year anniversary with Net Primates
We’re delighted to announce that Chris Dewey has been part of our team for the past 5 years! Many of you will have spoken with Chris over the years but may not know what a pivotal role he has played in the success of Net Primates, loyally working with us and always providing 100% customer support. Here we give a little taste of what Chris has been up to since joining us in 2018. What is your role within Net Primates? My role at Net Primates is as a Technical Manager. I play a key role in managing the Service Desk, planning site visits, and overseeing both ongoing projects and daily tasks. Can you share your key accomplishments and growth during your 5 years with us? Before I started working for Net Primates I thought I knew a lot, but I quickly realised I was mistaken. My experience at Net Primates has been eye-opening, presenting me with various challenging tasks. Among my key accomplishments is a newfound confidence in discussing cybersecurity with others. Additionally, I have acquired scripting skills, enabling me to create daily scripts for software deployment and customer issue resolution. How has the company’s IT environment contributed to your professional development? At Net Primates I embrace daily challenges, whether it’s troubleshooting issues or resolving customer concerns. The dynamic nature of each day motivates me to continually learn and grow, as I encounter unique and diverse challenges regularly. Our…
Microsoft force the MFA issue (but we did it first!)
As of May 2023 Microsoft have forced the adoption of Multi-Factor Authentication (MFA). Will you see a difference? Not if you’re a Net Primates customer. We have ensured MFA is always used as standard since 2020, recognising that it is one of those vital layers of cybersecurity. Why enforcement? Whilst the simple steps involved in MFA are straightforward and take seconds, they do take a small amount of effort, hence why some users have avoided them in the past. Unfortunately, bypassing this step leaves users with an increased likelihood of being hit by a cyberattack. Whilst no one likes to be forced to do something, sometimes it really is for our own good, and for the good of those around us. If you’re the victim of a cyberattack within your work or domestic life you will not be the only one who is impacted. If within your business, there will be significant implications – loss of reputation, a call from the ICO, decreased productivity, reduced profits, etc… Within your domestic life it could be your family’s savings that are taken. Simply taking the time to enter some straightforward authentication could make all the difference! Why not rely on passwords? Passwords alone can sometimes be like a lone hero facing an army of hackers, so that’s where MFA comes to the rescue! Acting as the second factor it’s like a secret handshake only you and your device know, granting you access…
We keep running to maintain your business fitness
Safeguarding IT systems to empower your business for success is vital to us at Net Primates. As we all understand, the digital landscape is fast paced, with most businesses relying heavily on technology to drive operations. From seamless system functionality to robust cybersecurity measures, maintaining the health and resilience of IT infrastructures is vital for sustained success. At Net Primates we understand how important it is to constantly review systems and processes, along with the latest IT trends and cybersecurity issues. We keep on top of these things so that you get the very best IT for the job, systems and processes designed for productivity and cybersecurity, and a proactive service. We use our extensive expertise, proactively making sure your systems run smoothly and keep your best interests at heart. Included within your fixed price support is constant monitoring of your systems, external suppliers and conditions. We are with you behind the scenes, working to help keep your systems operational and safe. And we’re also there to solve problems when they arise and help with strategic planning through Technology Business Reviews. Listed below are some of ways in which Net Primates works relentlessly to provide you with the very best IT Support Service. Click on the links for more detailed explanations and please do get in touch for more information. Microsoft 365 Benefit from the full Microsoft 365 suite alongside robust Net Primates cybersecurity enhancements by using our Microsoft Office…
One man causes mayhem, but justice prevails
A recent article issued by the National Crime Agency demonstrates how criminal masterminds can cause immense damage, but that they can and do get caught. The NCA identified the fraudster and kept him under surveillance. In doing so they were able to trace his vast web of deceit which included taking on several identities, moving between locations, and engaging with other criminal associates. Using mainly phone calls and social engineering, he and his team were able to defraud victims out of large sums, finding plausible stories targeted at their victims. For example, one victim tells how she was defrauded out of almost £160k after a fake call claiming to be from her bank. Another was conned into paying for a car that never materialised. The fraudster and his gang even set up a fake online real estate agency and stole the identity of a legitimate childcare company. This story highlights the lengths that criminals are prepared to go to in order to con innocent victims. On this occasion the fraudster dedicated his life to finding new ways to scam innocent victims. He didn’t rest… that’s why none of us can! In the words of the NCA: “Criminals are great pretenders. They may contact you pretending to be a trusted person or company. Millions of people are targeted by scam messages or phone calls like this every year. So if something seems suspicious or unexpected, such as requests for money or…
What will you pick from the buffet?
The beauty of a buffet is that you can choose a variety of different items in the quantities that you want, and have them all on one plate – yummy! You won’t have the same plate as anyone else, and that’s fine – you will have exactly what you choose, rather than a plate of food that someone has assumed you will like. And that is how Net Primates can help with your IT – we provide a variety of IT services, you have exactly what you need, and only have to deal with one, itemised invoice. Plus, you’ll benefit from IT products and services that interconnect without you having to liaise with various different providers. Our core provision is IT Support, ensuring local businesses can work efficiently, effectively and securely. Our aim is to take any worry away from business leaders so that you can concentrate on your core business. As we all appreciate, there are many facets to IT and we can help you with all of them. From advising you on the best machine for the job to providing your phone system and internet connectivity, we’ll also give advice on IT training, strategy and security. Choose your IT buffet from: We’re constantly examining the world around us, keeping up to date with the latest technology available and security threats (and solutions) – making sure our buffet has all the best dishes to choose from! Tell us what you want on your plate… and if you need…
Cost of living crisis fuels cybercrime
Once again cybercriminals are preying on vulnerabilities for their own gain. Business Research by Bridewell suggests that over a third of UK organisations involved in the provision of our critical national infrastructure are predicting a rise in cybercrime. The utilities sector feels particularly vulnerable with 41% of respondents seeing the surge being caused as a result of financial hardship. Scarily, over a fifth of the CNI decision makers questioned ranked employee sabotage as one of the greatest risks! Employee sabotage has already increased by 62% over the past year. Phishing and social engineering attacks are also viewed as high on the list of threats, with financial fears being used to target employees. As businesses pull their horns in, all budgets are squeezed, including those allocated for cybersecurity. Consequently, this increases the number and breadth of gaps where criminals can infiltrate a business. Domestic In the domestic space, Neighbourhood Watch reveals that a recent survey found 25k respondents had been victims of cybercrime. Additionally, many of those who replied to the survey feel more concerned about the risk of cybercrime now that we’re in a cost of living crisis. That said, it’s still the case that only 40% updated their antivirus software regularly and experts are concerned that many are not taking advantage of software updates that provide security patches. Whilst phishing emails are still flooding inboxes, text messaging and phone calls are also being used to target the vulnerable. Solution …
IT Nation Secure – Net Primates mix with other Cyber Security Specialists
One year on and Net Primates are once again ensuring that we stay ahead of the cybercrime curve by mixing with industry peers at IT Nation Secure. Steve Cole is representing us and is experiencing three impactful days of speakers, sessions and networking, focused on cyber security. The main focus for Net Primates is around the learning track of ‘Protect, Detect, and Respond’. Why go? As we all know, trying to immerse yourself in a topic can be tricky when we have the day job to deal with. By taking a few days out, Steve is able to focus 100% on learning about the latest cyber threats and security products. In addition, relationships are deepened; we are part of a global cyber security community – we are there for each other to help solve problems and keep our customers safe. Protect During IT Nation we’re able to learn about new products available, building connections with suppliers so that we know where we need to go to source vital security solutions. Detect Regrettably, protection is no longer the main concentration for cyber security specialists. It’s now widely accepted that cyberattacks can take place even where stringent measures are in place. We all now need to be able to detect an attack as soon as possible – ideally before the hackers inform us! Respond Finally, if an attack has infiltrated defences, and been detected, we need a response plan. By…