Getting to grips with problems relating to your computer network can be a frustrating affair, but it’s one which is likely to happen on a daily basis.

Computer networks are, after all, highly complex systems that comprise various components and are in use by multiple users. These structures may bring many benefits, but they can also be a recipe for disaster. And, if your network fails or experiences any issues, then your organization’s productivity is going to be affected.

Your main objective, with your computer network, should be to keep it online and functioning correctly. But you can only do this if you know what the most common computer network problems are, so let’s take a look:

  • Slow Connectivity: If there’s one thing that frustrates an employee then it’s slow connectivity over a network. PCs can grind to a halt and even the simplest task can take an age to complete. It’s often caused by large file transfers, so a limit should be put in place on the size that is permitted e.g. no email attachments that total more than 20mb as a standard rule. Sometimes this lag can also be caused by faulty network cards, so it’s important to investigate this possibility. 
  • IP Conflicts: Each PC on your network should have a unique IP address such as 209.85.255.255, but sometimes two PCs can be assigned the same IP address. And this can create major connectivity issues for both parties. Sometimes these conflicts will work themselves out, but you can help speed up the process. Restarting the router is the simplest approach as it should assign new IP addresses to every PC on the network. 
  • Unable to Connect to Local Printer: Printers on a network tend to be shared by multiple users, but occasionally an error can arise that leaves people unable to access the printer. This problem is often caused by a sharing issue whereby different security settings between PCs and the printers fail to agree with each other. When this occurs it’s recommended that you check firewall settings and that your Windows network adapters have printer sharing enabled. 

  • Faulty Cables: A computer network relies on cables to facilitate its connectivity. And when just one cable fails it can have massive implications for your network. However, it’s easy to overlook cables as the source of network issues. People tend to concentrate on software and hardware troubleshooting first. Nonetheless, investigating the condition of cables in the affected network area is vital. Cables can easily become dislodged or damaged, so sometimes the fix can be as simple as plugging them back in or replacing. 
  • Weak Wi-Fi Signal: If you rely on wireless connections in your organization then you will be well aware of the issues caused a weak signal. This can often be caused by environmental issues such as the presence of a microwave or even the layout of an office. It’s important to eliminate these factors to identify the cause of the fault. Alternatively the connection issues could be caused by out-dated firmware, so make sure all updates are installed. 

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


Your PC network’s first line of defense is usually a password. But if you’re working with bad passwords then you run the risk of compromising this security.

Almost every computer application requires a password to access it. And, in business, these passwords can provide access to numerous terminals and networks. A lot of data is available on these computer systems and this is why security should always be a priority. However, your security can only be as strong as your first line of defense. And if your passwords are weak then your organization’s security is going to be equally weak.

There are certain mistakes associated with weak passwords that need to be eliminated from your business to keep it safe and secure. Let’s take a look at some of the most common password mistakes:

  • Writing it Down: All over the country there are thousands of Post-It notes containing secure login details that are attached to PCs. This is a major security risk. Passwords need protection of their own. If they’re on display for the entire world to see then, that’s right, the entire world can take advantage of them. Instead, memorize the password or invest in a password manager. 
  • Sharing Passwords: Although not quite as severe as writing your password down, sharing passwords with colleagues is still a guaranteed method of weakening your password. It may feel as though sharing your password – if, for example, you’re away from the office and a colleague needs to access a document on your PC – is a safe move, but there is no guarantee that your PC will remain secure. If you do have to share your password then make sure you change it as soon as possible. 
  • Using the Same Password: You should never use the same password across multiple applications. If you do favor recycling your passwords in this manner then you can easily fall victim to password bots. These automated pieces of code are loaded up with login details – usually purchased on the dark web – and then instructed to try and gain access to other websites with them. So, if your LinkedIn login details have been hacked, it’s possible for a hacker to use a bot to try these details in Gmail, Twitter and Instagram. And, if the details are the same, you’re going to get hacked. 
  • Based on Personal Details: An easy method for formulating a password that you can remember is by basing it on some personal details. So, for example, you may use your date of birth or your mother’s maiden name. It’s unlikely you’ll forget these, so you won’t have to write them down and compromise their security. The only problem is that personal details can easily be accessed by others. And this is never truer than in the digital age where our personal details are splashed all over our social media accounts. 
  • Too Simple: A password needs to be complex, so working with passwords such as ‘123456’ and ‘Password’ is a poor strategy. However, due to the ease with which these can be remembered, many people use them as passwords. And hackers are aware of this. What you really want is a password which is unusually complex e.g. one that doesn’t contain recognizable words or number sequences.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


What’s worse than one piece of malware? Multiple strains of malware. And, when you encounter a rootkit, this is exactly what you’re faced with.

Rootkits are a very serious form of malware. They’re not a new method of hacking, they have been present for close to 30 years now, but they’re still notoriously difficult to treat. There are many dangers associated with rootkits with the primary concerns being that they remain hidden on PCs and grant remote access to hackers.

Understanding what a rootkit is can be complex, but we’re going to break it down into the basics for you. And, with this on your side, your organization should become that little bit securer.

What is a Rootkit?

Rootkits are a collection of tools that allow hackers to gain unauthorized access to a PC. They’re stealthy pieces of kit that can evade security software, so detecting that a rootkit has infected your system is a task all of its own. The major threat, however, comes from the payload within a rootkit. The contents of a rootkit can include the following:

  • Keystroke loggers
  • Ransomware
  • Trojans
  • Bot software for initiating DDoS attacks

And, once it has been activated, a rootkit will commonly set up a backdoor exploit. This allows the hacker to gain access, without detection, to an infected PC as and when they want. Not only will this allow the hacker to take control of the PC, but it also grants them the opportunity to download further malware to the workstation.

How are Rootkits Spread?

Rootkits are clearly a formidable foe to encounter, but how do they spread? Rootkits, as with most forms of malware, favor the standard distribution methods:

  • Email: Rootkits are most commonly found on emails as attachments, but email also has the potential to contain links to malicious websites. 
  • USB Drives: The relatively small size of a rootkit makes them perfect for loading on to USB devices such as flash drives. These can then be uploaded seamlessly to a PC once plugged in. 
  • Vulnerabilities: Hackers are often able to gain access to a PC due to vulnerabilities in the OS or a particular piece of software on that system. These vulnerabilities will often allow unauthorized access and the chance to install rootkits without detection.

How Do You Protect Against Rootkits?

The last thing that your organization wants is to fall victim to a rootkit. Their stealthy nature makes them difficult to detect and thoroughly removing every trace of their multiple payload is time consuming.

Therefore, you need to set up a system of best practices that look to minimize the risk of unleashing a rootkit on your network. Make sure that the following is in place:

  • Carry out IT Inductions: It’s crucial that all employees are put through an IT induction when they join your organization.
  • Install all Updates: Rootkits often take hold of system through the exploitation of vulnerabilities. If you make sure that system updates are installed as soon as possible then you minimize the risk of these exploits.
  • Work with Anti-Malware Software: You can’t identify every type of rootkit with anti-malware software, but you can identify a large number of them before they take hold. And this software is also capable of identifying malicious websites before they are accessed.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


Malware is well known for infecting systems and causing major problems from the second it’s executed. But certain strains of malware act as an enabler.

Security researchers have recently discovered one of these enablers and dubbed it SystemBC. It’s important to stress that SystemBC isn’t an immediate attack. However, it’s just as dangerous as your everyday malware. If not more dangerous. And this is why understanding how an enabler works is crucial for the security of your organization.

It’s always important, where PC security is concerned, to be proactive. So, to help you enhance your organization’s defenses, we’re going to run over the principles of the SystemBC malware.

What is the SystemBC Malware?

The simplest definition of SystemBC is that it enables other malware to unleash attacks. But how does it do this? The answer lies within SOCKS5 proxies. The average PC user will be unaware of what SOCKS5 proxies are, but this doesn’t mean they are impossible to understand. SOCKS5 is a method of internet communication that takes place between a client and a server. And it’s most commonly used in authorizing access to servers.

SystemBC takes advantage of these SOCKS5 proxies to overcome security systems and exploit vulnerabilities. The main method of exploitation is to illegally access a server and then install a command and control (C&C) server. With this C&C in place, SystemBC has the ability to cloak traffic and activity from other malware which can then spread outwards through the server.

How is SystemBC Distributed?

SystemBC has, at the time of writing, been discovered in both the Fallout and RIG exploit kits. These kits allow hackers to package together several different exploits in one product. These assorted exploits can work in synchronicity with each other or independently. And this makes them very dangerous. The Fallout and RIG exploit kits tend to focus on vulnerabilities in Flash and Internet Explorer, an approach which is exceptionally common when it comes to hacking.

Protecting Your Organization from SystemBC

The key to protecting your server from the threat of SystemBC is by being vigilant. Software patches remain the number one preventative measure when it comes to combating vulnerabilities. Software developers release these on a fairly regular basis, but also in emergencies when major vulnerabilities are discovered. And they need to be installed immediately. An exposed entry point to your network is a major threat to your security and plugging it is crucial.

One of the major problems facing organizations, in terms of IT security, is the use of legacy systems. These are systems which no longer receive support from their developers. If a vulnerability is discovered in such a system then it will remain there. It will not be resolved. Therefore, it’s vital that your organization regularly assesses the suitability of your PC systems for engaging with the internet. If a particular part of your network is no longer supported then it’s time to replace it. Otherwise you could soon find malware such as SystemBC making its home on your server.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


Data will always be one of the cornerstones of your business. But keeping this data secure in the 21st century is a big ask. So, how do you protect it?

A staggering amount of data is created every single day and your business will contribute to this with each order placed, every service request logged and all the mailing lists you create. Data such as this is sensitive and needs to be protected. If personal details are compromised then they can be used for fraudulent purposes. Your customers need to trust your organization to handle and protect their data correctly. But in a world full of hackers, malware and social engineering it can feel like an uphill struggle.

However, you can make a significant difference to your data protection. And it doesn’t have to be difficult. In fact, you can elevate the security of your data quickly and effectively. All you have to do is follow our 7 tips for keeping your sensitive data secure.

  1. Use Cloud Storage

Individual PCs can become compromised by security breaches. And this means that the data stored on this hardware is up for grabs. But if this data is stored remotely it’s securer and less likely to be stolen. The perfect way to achieve this is by investing in remote cloud storage.

  1. Never Display Passwords

Passwords should never be displayed e.g. written on a Post-It note stuck to your monitor. Hackers don’t have to be external figures, they can easily be an internal threat. Therefore, create passwords which you can remember easily and don’t need to have visible reminders for.

  1. Make Sure Deleted Files are Overwritten

A deleted file isn’t necessarily deleted. And a hacker who knows what they’re doing can easily retrieve those files you thought were deleted for all eternity. But if these deleted files are overwritten enough times then you can make it impossible to retrieve them from your hard drive.

  1. Always Encrypt USB Sticks

USB sticks are useful for carrying around large amounts of data in a small space, but their small size means they’re easy to lose. Therefore, you should always ensure that data on these devices is encrypted and password protected.

  1. Install Anti-Malware Protection

You can never take enough precautions when it comes to data security, so anti-malware software should always form part of your strategy. Malware operates stealthily and can steal your data at a rapid pace. But with anti-malware protection in place you can reduce the risk of malware getting a foothold in your system.

  1. Always Install Updates

PC software and hardware is prone to security vulnerabilities. And these vulnerabilities give hackers the opportunity to access your systems and your data. Installing all updates at the earliest opportunity helps you to avoid having your systems and data compromised.

  1. Destroy Old Hard Drives

Technology advances at a rapid pace and PC hardware can soon become obsolete in the face of newer, faster technology. Hard drives are a case in point. But you need to make sure old hard drives are disposed of correctly. They contain a lot of data, so need to be thoroughly cleaned and then shredded to prevent any sensitive data being made available to external sources.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More