We'd love to hear from you

If you have an enquiry about our solutions or services then feel free to drop us a line to see how we can help.

How To


How To Set Up Email Redirect in Outlook and Outlook Web App OWA

How To Set Up Email Redirect in Outlook and Outlook Web App OWA

This blog outlines how to set up email redirect in Outlook and Outlook Web App (OWA)

You can use Outlook Inbox Rules to redirect any messages you received that match conditions specified in the Rule to another email account.

There are two methods to set up an Email Redirect when using Microsoft’s Office 365. You can use the local Outlook application or the Outlook Web App via a browser. This blog will show you how to set up Inbox Rule to achieve this using either method.

I. Set Up Email Redirect in Outlook local

1. In Outlook, click the FILE tab

2. From the Account Information window, select Info tab and then Manage Rules and Alerts

3. In the Rules and Alerts dialog box, on the Email Rules tab, choose New Rule.

4. In the Rules Wizard, under Start from a blank rule, click Apply rule on message I receive, and then click Next.

5. Tick the check box next to each condition that you want the incoming message to meet (match) for the rule to apply.

In this case, under Step 1: Select condition(s), select “where my name is in the To or Cc box”. The selected condition will appear in the box Step 2: Edit the rule description (click an underlined value). Then click Next.

If you choose a condition with a blue underlined value, specify the value by clicking on the underlined text.

6. Select the action(s) that you want the rule to take when the specified conditions are met.

In this case, under Step 1: Select action(s), select “redirect it to people or public group”. The selected action will appear in the box Step 2: Edit the rule description (click an underlined value)

Click on “people or public group” under Step 2, a Rule Address dialog box will open.

You can search the contact where the email will be redirected to by name. In the contact list, double-click the contact or public group. The selected contact or public group will appear in the To–> box.

Then click OK

7. Tick the check box if there is any exception to the rule.

If there is no exception, click Next

If there are exceptions, under Step 1: Select condition(s), tick the checkbox next to the exception condition(s). The selected condition will appear in the box Step 2: Edit the rule description (click an underlined value). Click the underlined value, and select or type the necessary information for the condition.

Then click Next

8. Finish rule setup dialog box will appear.

Under Step 1: Specify a name to this rule, type a name

Under Step 2: Set up rule options, select the check boxes for the options that you want. If you want this rule to be effective immediately then ensure the Turn on this rule check box is ticked

Click Finish

9. Your new redirecting rule appears in the list shown on the Rules and Alerts dialog box with a summary of the action and condition under Rule description.

Click Apply

10. To turn off the rule, un-tick the check box next to the rule name.

With the rule check box ticked

– to Edit Rule Settings / Rename, click Change Rule and then click Apply.

– to delete a rule, click Delete then click Apply

II. Set Up Email Redirect with Outlook Web App

1. In a Web browser, sign in to Outlook Web App using the URL provided by the person who manages email for your organisation or at https://outlook.office365.com. Enter your user name and password, and then click Sign in.

1. Choose Settings (gear icon at the top right corner) then select Mail shortcut aleft-handtom right corner.
On the left-hand menu, select Options tab > Mail > Automatic Processing then Inbox and Sweep rules
You can also type Inbox Rules in the Search all settings field.
Click the + icon to add a new rule

2. Name: Enter a name for your new rule

3. Select the condition(s) you want the incoming message to meet (match) for the rule to apply.

When the message arrives, and it matches all of these conditions: click the drop-down box to reveal a list of conditions and. In this case, select My name is and in the To or Cc box. Then select [Apply to all messages]

4. Select the action(s) that you want the rule to take when the specified conditions are met.

Do all of the following: click on the drop-down box to reveal a list of actions to take. In this case, select Forward, redirect or send then Redirect the message to

5. Select the address you want to redirect the message to by double-clicking the contact in the contact list. If the address you want to redirect your message to isn’t in the address book, you can enter the email address in the To line at the top of the window or enter the Search People field

6. Click OK to save your selections and return to the New inbox rule window.

7. Click Save to save your rule and return to the Inbox rules tab.
To Stop Forward Rule, untick the check box and click Save.
If you want to delete a rule, on the Inbox rules window, ensure the rule checkbox is ticked then click the trash icon
If you want to edit a rule, on the Inbox rules window, ensure the rule checkbox is ticked then click the pencil icon

What is the difference between Auto Forward and Redirect?

FORWARD

Forwarded messages will appear as messages that are forwarded from you

– When email is forwarded, an “FW:” appears at the beginning of the subject line

– Reply to forwarded message will go to the address the messages are forwarded from

For example, if your name is ‘Andrew’ and you received an email from ‘Susan’ and forwarded it to ‘John’, for John, the email will appear to have come from you ‘Andrew’

REDIRECT

– Redirected messages will appear to come from the original sender

– When email is redirected, email is sent in its original state

– Reply to redirected messages will go to the address of the original sender

For example, if your name is ‘Andrew’ and you received an email from ‘Susan’ and redirected it to ‘John’, for John, the email will appear to have come from ‘Susan’, not from you ‘Andrew’

Note

– For your records, a copy of the message remains in your mailbox or its designated folder in both cases.

– If you add an action to delete a message in the Rule, the message will go to your Deleted Items folder and will still be counted against your mailbox limit. If you exceed your mailbox limit, you may be blocked from sending or receiving new messages, and forwarding rules may not work until you delete enough messages to bring the total below your mailbox limit.

– When you create a forward or redirect rule, you can add more than one address to send to. The number of addresses you can send to may be limited, depending on the settings for your account. If you add more addresses than are allowed, your rule won’t work. If you create a rule with more than one address, test it to be sure it works.

– Your administrator may have blocked the ability to use forward or redirect rules to send mail to some or all domains outside of your own. After you’ve created a redirect or forward rule, test the rule by sending a message from a third account to your account. Then check the account your rule is set to forward messages to.

How To Set Up Outlook Auto Forward including Outlook Web App

How To Set Up Outlook Auto Forward including Outlook Web App

This blog outlines how to set up Outlook auto forward, including Outlook Web App.

You can use Outlook Inbox Rules to forward any messages you received that match conditions specified in the Rule to another email account.

There are two methods to set up an Auto Forward when using Microsoft’s Office 365. You can use the local Outlook application or the Outlook Web App via a browser. This blog will show you how to set up Inbox Rule to achieve this using either method.

I. Set Up Auto Forward with Outlook local

1. In Outlook, click the File tab

2. From the Account Information window, select Info tab and then Manage Rules and Alerts

3. In the Rules and Alerts dialog box, on the Email Rules tab, choose New Rule.

4. In the Rules Wizard, under Start from a blank rule, click Apply rule on message I receive, and then click Next.

5. Tick the check box next to each condition that you want the incoming message to meet (match) for the rule to apply.

In this case, under Step 1: Select condition(s), select “where my name is in the To or Cc box”. The selected condition will appear in the box Step 2: Edit the rule description (click an underlined value). Then click Next.

If you choose a condition with a blue underlined value, specify the value by clicking on the underlined text.

6. Select the action(s) that you want the rule to take when the specified conditions are met.

In this case, under Step 1: Select action(s), select “forward it to people or public group”. The selected action will appear in the box Step 2: Edit the rule description (click an underlined value)

Click on “people or public group” under Step 2, a Rule Address dialog box will open

You can search the contact where the email will be forwarded to by name. In the contact list, double-click the contact or public group. The selected contact or public group will appear in the To–> box.

Then click OK

7. Tick the check box if there is any exception to the rule.

If there is no exception, click Next

If there are exceptions, under Step 1: Select condition(s), tick the checkbox next to the exception condition(s). The selected condition will appear in the box Step 2: Edit the rule description (click an underlined value). Click the underlined value, and select or type the necessary information for the condition.

Then click Next

8. Finish rule setup dialog box will appear.

Under Step 1: Specify a name to this rule, type a name

Under Step 2: Set up rule options, select the check boxes for the options that you want. If you want this rule to be effective immediately then ensure the Turn on this rule check box is ticked

Click Finish

9. Your new forwarding rule appears in the list shown on the Rules and Alerts dialog box with a summary of the action and condition under Rule description.

Click Apply

10. To turn off the rule, un-tick the check box next to the rule name.

With the rule check box ticked

– to Edit Rule Settings / Rename, click Change Rule and then click Apply.

– to delete a rule, click Delete then click Apply

II. Set Up Auto Forward (with condition) with Outlook Web App

1. In a Web browser, sign in to Outlook Web App using the URL provided by the person who manages email for your organisation or at https://outlook.office365.com. Enter your user name and password, and then click Sign in.

1. Choose Settings (gear icon at the top right corner) then select Mail shortcut aleft-handtom right corner.
On the left-hand menu, select Options tab > Mail > Automatic Processing then Inbox and Sweep rules
You can also type Inbox Rules in the Search all settings field.
Click the + icon to add a new rule

2. Name: Enter a name for your new rule

3. Select the condition(s) you want the incoming message to meet (match) for the rule to apply.

When the message arrives, and it matches all of these conditions: click the drop-down box to reveal a list of conditions and. In this case, select My name is and in the To or Cc box. Then select [Apply to all messages]

4. Select the action(s) that you want the rule to take when the specified conditions are met.

Do all of the following: click on the drop-down box to reveal a list of actions to take. In this case, select Forward, redirect or send then Forward the message to

5. Select the address you want to forward the message to by double-clicking the contact in the contact list. If the address you want to forward to isn’t in the address book, you can enter the email address in the To line at the top of the window or enter the Search People field

6. Click OK to save your selections and return to the New inbox rule window.

7. Click Save to save your rule and return to the Inbox rules tab.
To Stop Forward Rule, untick the check box and click Save.
If you want to delete a rule, on the Inbox rules window, ensure the rule checkbox is ticked then click the trash icon
If you want to edit a rule, on the Inbox rules window, ensure the rule checkbox is ticked then click the pencil icon

III. Set Up Automatic Forward (without condition) with Outlook Web App

To automatically forward ALL messages to another account, proceed as follows.

1. In a Web browser, sign in to Outlook Web App using the URL provided by the person who manages email for your organisation or at https://outlook.office365.com. Enter your user name and password, and then click Sign in.

1. Choose Settings (gear icon at the top right corner) then select Mail shortcut at the bottom right corner.

On the left-hand menu, select Options tab > Mail > Account then Forwarding

2. Click the Start forwarding radio button.

3. In the, Forward my email to text box, enter the email address to forward to.

Tick the checkbox Keep a copy of forwarded messages if you want to keep copies of forwarded messages in your mailbox. If you leave this box unticked then you will not retain a copy of the forwarded message.

4. Click Save, at the top lefthand corner of the Forwarding page, to save your changes.
Your email messages will now be forwarded to the selected email address.

To stop forwarding messages to another account, open the Forwarding page (see Step 1), click the Stop forwarding radio button, then click Save at the top left-hand corner of the page.

If you don’t want to forward ALL email messages, then you can forward selected messages by using conditional rules using the steps in Section II. Set Up Forwarding Rules with Outlook Web App

What is the difference between Auto Forward and Redirect?

FORWARD

– Forwarded messages will appear as messages that are forwarded from you

– When email is forwarded, an “FW:” appears at the beginning of the subject line

– Reply to forwarded message will go to the address the messages are forwarded from

For example, if your name is ‘Andrew’ and you received an email from ‘Susan’ and forwarded it to ‘John’, for John, the email will appear to have come from you ‘Andrew’

REDIRECT

Redirected messages will appear to come from the original sender

– When email is redirected, email is sent in its original state

– Reply to redirected messages will go to the address of the original sender

For example, if your name is ‘Andrew’ and you received an email from ‘Susan’ and redirected it to ‘John’, for John, the email will appear to have come from ‘Susan’, not from you ‘Andrew’

Note

– For your records, a copy of the message remains in your mailbox or its designated folder in both cases.

– If you add an action to delete a message in the Rule, the message will go to your Deleted Items folder and will still be counted against your mailbox limit. If you exceed your mailbox limit, you may be blocked from sending or receiving new messages, and forwarding rules may not work until you delete enough messages to bring the total below your mailbox limit.

– When you create a forward or redirect rule, you can add more than one address to send to. The number of addresses you can send to may be limited, depending on the settings for your account. If you add more addresses than are allowed, your rule won’t work. If you create a rule with more than one address, test it to be sure it works.

– Your administrator may have blocked the ability to use forward or redirect rules to send mail to some or all domains outside of your own. After you’ve created a redirect or forward rule, test the rule by sending a message from a third account to your account. Then check the account your rule is set to forward messages to.

How To Set Up Your Email Account on iOS

How To Set Up Your Email Account on iOS

There are two ways to set up an email account on iOS. This blog will show you step by step how to set up automatically and manually your email account on iPhone, iPad.

I. Set up your email account on iOS automatically

1. Go to Settings, scroll down to Accounts & Passwords

2. Then tap Add Account

If you’re using iOS 10.3.3 or earlier, go to Settings > Mail > Accounts and tap Add Account.

3. Select your email provider. If you don’t see your email provider, tap Other to add your account manually.

4. Enter your email address and password.

5. Tap Next and wait for Mail to verify your account.

6. Choose information from your email account, like Contacts or Calendars, that you want to see on your device.

7. Tap Save

II. Set up your email account on iOS manually

If you need to set up your email account manually, make sure that you know the email settings for your account. If you don’t know them, you can look them up or contact your email provider.

Then follow these steps:

1. Repeat Step 1 & 2 above

2. Tap Other, then tap Add Mail Account.

3. Enter your name, email address, password, and a description for your account.

4. Tap Next. Mail will try to find the email settings and finish your account setup. If Mail finds your email settings, tap Done to complete your account setup.

If Mail can’t find your email settings, then you need to enter them manually. Tap Next, then follow these steps:

5. Choose IMAP or POP for your new account. If you aren’t sure which one to choose, contact your email provider.

6. Enter the information for Incoming Mail Server and Outgoing Mail Server. Then tap Next. If you don’t have this information, try to look it up or contact your email provider.

7. If your email settings are correct, tap Save to finish. If the email settings are incorrect, you’ll be asked to edit them.

8. If you still can’t set up your email account or save your email settings, contact your email provider.

If you try to look up your email settings, it would look like the below example.

How To Set Up Outlook Out of Office (Automatic Replies) incl. Web App

How To Set Up Outlook Out of Office (Automatic Replies) incl. Web App

There are two methods to set up an Outlook Out of Office (Automatic Replies) when using Microsoft’s Office 365. You can use the local Outlook application or the Outlook Web App via a browser.

This blog will show you step by step how to set up Outlook Out of Office (Automatic Replies) for Microsoft Office Outlook 2016, 2013, 2010.

Set up Out of Office in Outlook

1. In Outlook, click the File tab

2. Then click the Info tab in the menu, select Automatic Replies (Out of Office)

3. In the Automatic Replies dialog box, select the Send Automatic Replies check box.

If you want to specify a set time and date range, select the Only send during this time range check box.

Then set the Start time, and then set the End time. The Automatic Replies (Out of Office) message will continue to run until the date and time set for the End Time is reached.

In the Inside my organisation tab, type the message that you want to send within your organisation

In the Outside my organisation tab, type the message that you want to send outside your organisation.

Note: Sending automatic replies to anyone outside my organisation will send your automatic reply to every email, including newsletters, advertisements, and potentially, junk email. If you want to send automatic replies to those outside your organisation, we recommend choosing My contacts only.

4. Select OK to save your settings

5. If you do not set the time range, you’ll need to turn off automatic replies manually by selecting Do not send automatic replies check box (see step 3 above)

When Outlook is setup to send automatic replies, you’ll see a notification under the ribbon with this information. Select Turn off to disable automatic Out of Office replies.

Set up Out of Office with Outlook Web App

1. In a Web browser, sign in to Outlook Web App using the URL provided by the person who manages email for your organisation or at https://outlook.office365.com. Enter your user name and password, and then click Sign in.

2. Choose Settings (gear icon at the top right corner) then select Automatic Replies – create automatic reply (Out of Office) message

3. In the Automatic Replies panel, select the Send Automatic Replies check box to turn on automatic replies

Select Send replies only during this time range check box and then set a Start time and End time to control when automatic replies are sent.

Use the text box to create a message that is sent only to senders who are inside your organisation.

Select Block my calendar for this period to block your calendar for the time period you’ll be away and clear any existing appointments by declining or cancelling them. You can also set it to automatically send a response to any incoming invitations.

Scroll down the Automatic Replies panel, select the Send automatic replies message to senders outside my organisation, type the message that you want to send in the text box.

Note: Sending automatic replies to anyone outside my organisation will send your automatic reply to every email, including newsletters, advertisements, and potentially, junk email. If you want to send automatic replies to those outside your organisation, we recommend choosing Send replies only to sender in my Contact list.

4. Select OK on top left of the panel to save your settings.

5. If you don’t set a time period, your automatic reply will remain on until you turn it off. Turn off automatic replies manually by selecting Do not send automatic replies check box.

6. You’ll be reminded your automatic replies are turned on each time you sign in to your mailbox. Select Turn off to disable automatic Out of Office replies.

You can download PDF Guides on how to set up Out of Office in Outlook and Outlook Web App here.

[Checklist] What to look for when choosing an Outsourced IT Provider

[Checklist] What to look for when choosing an Outsourced IT Provider

What should business look for in their Outsourced IT Provider?

One of the hardest decisions any business needs to make is who their partners will be. This is especially true when it comes to technology partnerships, as they can become integral to everything you do as a company.

Choosing the right partner will help your business prosper. A right outsourced IT provider will focus on aligning technology to add value in supporting you to achieve your business goals.

What you will find inside the Checklist

This “What to look for when choosing an IT Provider” checklist includes 13 essential questions that you should ask before choosing an IT Support partner. The checklist addresses all facets of the potential partner, from financial strength down to personnel, technical expertise and support resources to company culture. Be sure to look for IT Provider that can provide you with evidence of a long-term track record, including detailed references from customers that have IT needs similar to yours.

13 + 15 =

Urban Network’s award-winning team has been providing Outsourced IT Services since 2002. We provide a trusted, competitive and impartial service to every valued customer throughout Greater London and Essex. With a comprehensive portfolio of managed cloud and on-premise services and a team of talented IT professionals, Urban Network can deliver a complete IT solution to your business.

Contact us today to see how we can help your business making the most of your IT investment.

[Download] The Ultimate Disaster Recovery Checklist

[Download] The Ultimate Disaster Recovery Checklist

Are you prepared in the event of data loss, natural disaster, cyber-attack, hardware failure or human error?

Every business has to prepare for the worst. That’s why we put together this “Ultimate Disaster Recovery Checklist” to help you stay one step ahead of unforeseen dramas.

In today’s always-on business landscape, maintaining an effective business continuity and disaster recovery (BCDR) strategy is becoming more important than ever before. Data is playing an increasingly critical role in decision-making processes, and the costs and risks associated with downtime are skyrocketing – not to mention the damage your brand and reputation can suffer in the event of a disaster. It is important to have a Business Continuity Disaster Recovery Plan and have it tested regularly.

In this Checklist, you will find:

  • A list of essential questions you should ask yourself prior to a disaster

  • Steps-by-step walkthrough when a disaster strike

This Checklist is no substitute for a complete Business Continuity Plan but it will get you started in the right direction – and help ensure that you have the basics Disaster Recovery guideline in place even before you invest in a more formal Business Continuity Plan.

Don’t let your business become another statistic.

Our Disaster Recovery & Business Continuity solution is designed to quickly revive your network should any downtime occur, and help get your employees operating productively in almost no time at all.

Contact us today to find out how we can help you be better prepared for any disaster — natural or human — that may come your way and get a free on-site, no obligation attached Disaster Recovery demonstration.

Improve IT efficiency – Why better equipment matters

Improve IT efficiency – Why better equipment matters

You may have heard of Moore’s Law which is an observation of the speed in the advancement of computing power. The most simplistic way to describe this is that computing power doubles roughly every year to year and a half. This prediction has pretty much held up fairly well over the last thirty years. Now, with computing power doubling every year and a half over thirty years, it means that today’s computers are roughly a million times faster than the first personal computers.

In recent years and with the innovation of “Cloud” the need for a higher specification workstation is even greater, but is often overlooked. The role of business workstations has rapidly changed from a local client/server relationship to a client to Internet relationship. Users data and indeed large email data would have been stored on a physical on-premise server are now more often stored in cloud repositories and replicated locally to users machines. Effectively, the workstations are directly communicating across the Internet to retrieve and process the data. Previously with the client/server approach the operating systems were architected such that the server handled more of the processing and the local machine focused on retrieval with a lower performance overhead. However, with the changed approach we are finding users machines physical hardware is a missed consideration, and is sometimes insufficient.

At Urban Network, both internally and with some of our client base, we have changed the strategic approach to computer hardware and what really fits the user’s needs. For users with a large mail footprint, running multiple applications accessed frequently, we are recommending machines with a high-end processor, greater levels of memory – significantly above minimum requirements of operating systems, and a Solid State Drive that processes transactions faster than a typical workstation hard disk. The resulting increase in performance, and in turn productivity vastly outweighs the higher purchase price, performing tasks faster and increasing the useful life of the machine and investment.

We would strongly suggest that businesses and individuals consider the huge benefits of spending a bit more at the point of purchase, to get a machine that will deliver the performance to improve the experience of using technology.

You can also check out our blog on “9 free tools to up your computer performance” to help keep your computer performance at its best.

60 years of downsizing & upgrading
(Credit: ZDnet)

10 Hidden IT Risks That Might Threaten Your Business

10 Hidden IT Risks That Might Threaten Your Business

Today’s big IT advantages come with major risks. Your networks and systems serve as your silent partner in operations. Should they fail – and when they do, it’s usually without warning – you’re exposed not just to an IT problem, but to a potentially large business problem.
This blog exposes 10 silent threats that might be quietly undermining your operations now – and proposes one quick, easy and FREE way to bring these threats under control, fast.

Risk #10: Wrong keys in wrong hands

It’s just common sense: you restrict crucial information, such
as bank accounts and inventory access, to carefully designated employees. Yet many businesses have lost control of their network’s user level access privileges, exposing vital company and client data to people without authorization. One of the first steps toward security is to be sure the right people have the right level of access to appropriate applications and data.

Risk #9: Bring your own headache

On the one hand, new devices such as smartphones and tablets can increase employee productivity – and when employees use their own devices, save the company money. But this new “bring your own device” (BYOD) environment brings new headaches, too. These devices are easily lost and stolen. When they are, any information available to the device – including confidential practice and client data – may be vulnerable to illicit access. Yet fewer than 50% of businesses report the ability to use data encryption and/or remote data wiping to protect their assets. Take stock of your data inventory: you need to share permissions reports that reveal which devices and users have access to which files and applications.

Risk #8: Who’s knocking at your backdoor?

Your business isn’t limited to your own systems. Thanks to access to outside servers and systems, you can leverage potent tools like Gmail and Dropbox to communicate with customers, share files and more. While these cloud services increase your capabilities without busting your IT budget, it’s important to remember that every connection that reaches out from your network may open an opportunity for someone else to reach in. Protect your portals: run an external vulnerability scan that reveals every “backdoor” through which an intruder might break into your network.

Risk #7: Weak passwords

Your password protections are only as strong as the passwords themselves. Having no passwords – or using obvious passwords such as “12345” – undermines the very protection you seek. Yet employees often fail to establish passwords or, when they do, frequently use ineffective ones. Review your passwords’ strength to identify weak spots any unauthorised user could punch through.

Risk #6: Whoa, back up

If you lost a significant chunk of your data right now, how much business would you lose as well? Too many businesses run without sufficient policies, plans and procedures for backing up critical data essential to their ability to operate. If your business depends on manual procedures that are executed inconsistently, you’re exposed to unnecessary losses; it’s time to look for automated backup solutions that are always at work – even when employees might be forgetful.

Risk #5: Show me the compliance

Sensitive data demands special attention. In many businesses, the law obliges you to preserve client confidentiality – and demonstrate that you have processes in place to ensure compliance. The best way to prepare for a regulatory audit is to run regular compliance audits of your own that allow you to take corrective actions before your operation is called into account.

Risk #4: Printing (lost) money

Despite high hopes for the “paperless” office, the reality is that businesses spend lots of money printing, faxing, copying and scanning paper documents. Consider the math: paper plus toner plus maintenance plus employee time, etc. It’s possible to bring these printing costs under control, but the first step is to discover who prints what, how often, and why. By monitoring your multi-function printers, you can limit access to authorised users, discourage unnecessary or wasteful usage, and encourage less-expensive options – such as scan to email or scan to file directories – that save time and money

Risk #3: “Ghosts” in the machines

There may be “ghosts” haunting your networks – inactive users or inactive computers that remain part of your system, even if they are no longer contributing to your productivity. While the threat may not be immediately obvious, defunct computers represent an expense you don’t need to carry. Worse, inactive users may reflect open accounts (perhaps of people who are no longer employed by your business) that could present security holes for unauthorised access. Run audits that show you what’s active or not, then clean house – and close security loopholes – by burying the “dead” devices and accounts.

Risk #2: When IT can’t keep up, your business goes down

Smart businesses and wise managers protect their critical networks with redundancy: backup servers and routers that are designed to kick in should the main system go down. But the contingency plan is only as good as the processes and practices behind them; should these be inoperative, your business will not maintain continuity in an emergency. To safeguard your business, analyse your network before disaster strikes to be sure that your contingency technologies – such as your backup designated router or alternate domain control – are online and ready for action.

Risk #1: Hiding in the dark

You want to run your businesses, not an IT department. While IT may not be top of mind, it should never be out of sight. Lack of vision into the true status of your technology, and the quality of your defences against attack or failure, may leave your business vulnerable to disruption, legal consequences and loss of revenue. By implementing regular monitoring and review procedures, however, you can anticipate challenges before they become problems, and take adequate measures to ensure the smooth conduct of your firm.

Is your IT a sure thing?

We all depend on IT. Given the stakes, it’s important our confidence is well placed. Are you sure the technology you rely upon is adequately protected? Take a moment to complete this quick self-analysis. If you
 cannot answer YES to every question, request our FREE network assessment to give yourself – and your business – the confidence you deserve.

– Have you assigned appropriate access levels and authority to restrict data and applications to the right people?

– Can you create and review permission reports that tell you which devices and personnel have access to which data and applications?

– Are the connections you use to access online services protected against backdoor invasions by unauthorised intruders?

– Are your data and applications password protected, and are your employees using sufficiently strong passwords to ensure security?

– Do you use automated backup programs for data protection, rather than random and irregular manual backups?

– If the regulators arrived at your door, are you confident you comply with legal and regulatory mandates for your data?

– Can you monitor and control printing, faxing, scanning and copying to lower costs?

– Is your system cleared of ghosts users and computers that waste resources and expose your network to unauthorised access?

– Can you verify that your data recovery and network restoration plans are operative and ready to work in an emergency?

– Do you have timely and actionable visibility into your IT status, so that you can intercept problems before they interrupt your business?

Give yourself, and your business, a “yes” vote of confidence by requesting our FREE network assessment! Your network assessment will give you insight into the true status of your IT system, and point the way to appropriate corrective actions you can make to secure your business effectively and efficiently.

To get your FREE network assessment, visit our Network Health Check service

Introducing Desktop Assistant 2.0

Introducing Desktop Assistant 2.0

Our Desktop Assistant, Monitoring & Automation tool – Sentinel is getting an upgrade, new code that allows us to make use of available technology, improving the services we deliver to our clients.

Along with the new Sentinel code comes a new icon for the System Tray on each workstation. It is more identifiable with the Urban Network initials and offers additional resources to the original Desktop Assistant.

24/7 alerting & remediation, with the new Sentinel, our Network Operation Center (NOC) team will respond to an alert or threshold being reached on any managed server and address the issue immediately. This is a brand new multi-vendor software patching engine that is integrated into our ERP system and our NOC team and will allow for all security patches to run through a 2-week pre-approval process prior to being installed onto any device. Any server requiring a restart to complete the installation task will be restarted as per the agreed “Server Reboot Schedule” already in place by a member of the team. Unless there is a separate agreement in place, Urban Network will reboot any server that requires it between the hours of 3.00am – 5.00am, 7 days a week to ensure that all servers are patched to the vendor minimum levels. This will allow our NOC team to ensure that all servers are protected against the latest software vulnerabilities.

i

Resources

l

Contact Details: Displays Urban Network contact information

System Information: Displays system details for Windows desktops using MSInfo.exe

Common Fixes

  • Network Reset: This script releases and renews the IP address using IP Release and IP Renew

  • Slow PC – Quick (Select if your PC is running slowly and you do not have time for a full scan): Delete Temp Files / Delete Temp Internet Files / Run CCleaner (using the default configuration) / Run Malwarebytes Quick Scan

  • Slow PC – Full (Select if your PC is running slowly, run a full scan): Full Defrag of the Windows system drive (Note: the defrag script will only run if the user is a local Administrator due to UAC limitations) / Delete Temp Files, Delete Temp Internet Files / Run CCleaner (using the default configuration) / Run chkdsk for the Windows system drive / Run Malwarebytes Full Scan

Maintenance

  • Defrag Windows Drives: Runs Disk Defragmenter on Windows drives. If the disk is already in exclusive use by another program or is formatted using a file system other than NTFS file system, FAT, or FAT32, it can’t be defragmented.

  • Check for Disk Errors: Runs chkdsk.exe on Windows drives.

[Infographic] 10 steps for better cyber security

[Infographic] 10 steps for better cyber security

Security breached are costly and rarely a day goes without you seeing a headline about a new data breach. You might wonder how best to keep yourself safe online. One simple advice: reinforcing the basics. Follow these simple steps in the infographic “10 steps for better cyber security” and you’ll be well on your way to protect yourself against the cyber threats.

1. Look for sites that are secure. Try using sites you trust in preference to sites that you’ve never heard of to purchase goods (secure sites use https:// at the start of their address. The S stands for secure)

2. Be wary of any pop-up they could be genuine, but could equally be a compromised site. Use a blocker, or shut them down

3. Keep your system up to date. Run the patches, refresh the Anti-Virus and keep the Operating System (OS) updated

4. Type the URL or address yourself. Don’t just use links, the likelihood of hijacks reduces hugely if you search the site yourself through the address bar

5. Don’t download software from the web unless you are certain of the source, and have carefully evaluated the software, or file

6. Always log out of the site you’re using. Don’t just shut down logged in

7. Don’t store passwords in browsers, and use different passwords for each service you use

8. Change passwords often, it’s a pain but it is a great way to reduce your risk of being a victim of cybercrime

9. Avoid public or free Wi-Fi where possible, they are often compromised, so if you do use them, be sensible and secure

10. Set the highest security on your browser. You can always lower it on occasions that demand it but evaluate the scenario before doing so

Being aware of the types of cyber scams is also the best way to prevent being a victim. Test your knowledge in our 10-question Quiz “Are you the weakest link?” to see your ability to stay safe in today’s tech-driven world.

Download-free-CyberSecurity-eBook-Quick-Guide-to-Today's-Cyber-Threats