01892 614040 info@cencom.co.uk

Encrypt USB Drive

BitLocker on Windows BitLocker will encrypt your USB drive and then require a password to be entered whenever it is connected to a PC. To get started using BitLocker, connect your USB drive to your computer. Right-click on the drive and click on Turn on...

Certifiable

CenCom Solutions has achieved Cyber Essentials certification. We have discussed Cyber Essentials before and we have been advising our clients to become certified for at least a couple of years. Well we are going to practice what we preach and have gained...

Outlook Tips 2

Delay Sending Have you ever clicked send and then suddenly realised you forgot the attachment, or included a recipient who should not receive that email. You try to catch it but it is too late, it has gone. To mitigate against that there is a setting in...

CenCom are proud of our Managed Backup

CenCom Solutions Managed Backup & Recovery Backup and recovery made simple. When the inevitable happens, rest assured that you can quickly get back to a stable state. Whether it comes from a technology failure, a natural disaster or just user error, CenCom...

Image in that

Image in that We all want to make our work stand out and many times you will have wanted to insert a fun or informative image into a word or PowerPoint file. Some of you might remember the good old days where office came with a second CD which had clip art gallery on...

General Data Protection Regulations and your business

This is an enhancement to existing privacy regulations in the UK currently enforced by the Information Commissioners Office under the UK Data Protection Act.
The Regulation is a European one however because it comes into force before the UK leaves it will be relevant and UK government has already said they would expect to implement it in UK law anyway.

What the GDPR is that?

What the GDPR is that? From a personal point of view many of the changes which this brings are a good thing. People have for many years now been taking personal information online and in other methods from us and then using it is ways we have not agreed with and many...

ALERT from CenCom Solutions

WannaCry RansomWare. Over this weekend, you will probably have heard of the outbreak on Friday of a new strain of ransomware called WannaCry. Much has been said of it being caused by out of date computers and systems however this is not the whole story. The ransomware...

Threat Alert!

Be Aware! CenCom have recently been made aware of a spoof email that’s been sent to several client's email accounts. The email invites recipients to download an invoice from a malicious link. Some of these emails claim to be from senior members of clients or members...

Search and Ye shall find

Search Finding things, you need is becoming increasingly complicated with 1000’s of emails and documents stored in a variety of places. Many users struggle to find things and there is a limit to the our ability to remember where and things were  to try and search...

Take Note

OneNote to rule them all. Microsoft Office has included OneNote for some time now and it has improved with each iteration however many of you may be unfamiliar with the office products outside of the Word, Excel, Outlook and PowerPoint staples used by most of you. We...

When is a restart not a restart?

When its a shutdown! CenCom often ask users to "restart" and are told "I restart every day" or "I have already restarted" but CenCom technician can see the last time the system restarted and our systems are showing they have not restarted. So what is the confusion,...

Creators Update

The New Windows 10 and you Many of you will have had the new “creators update” deployed and many more will have it delivered over the coming weeks so we thought we would explain what is happening and why some inconvenience may be a good thing. Firstly, as you may be...

Go With The Flow

In November I have been Going With The Flow This last few weeks we have been looking at the new Microsoft Flow. It appears to be the solution to so many of the problems found when using cloud services that I have spent some time trying to use it to meet a number of...

Cyber Essentials

Cyber Essentials is a UK government backed certification showing that your organisation meets a minimum level of good security practice. Most of these things, if you are a client of CenCom we will be doing for you but the certification is a requirement for any...

Keeping Safe With Email 1

Keeping e-mail Safe and Secure series Don't confuse Phishing, Spam and Viruses It is easy to confuse which is which but here is the simple definition Virus: this is usually an attachment to an email or it could be a link to a download or webpage which will infect your...

Outlook Tips 1

Outlook 2010, 2013 and 2016 Outlook has been around for some considerable time and is the favoured mail, calendar and contact manager for most serious businesses, People tend to take for granted how you use it but some of the tips below might be new to you and can...

HTTPS by default

Websites are becoming secure by default, Should yours? You will probably have seen some sites start https:// and others only http:// and you may have read all the advice about making sure you can see a padlock when you are on your bank website or you are entering your...

Is a password enough

Is a password enough? Security is a balance between usability and protection, A truly secure computer is in a physically locked box with no power, but that's not practical. People need to use the systems and that is when the problems start both for people who want...

Are you at risk from data pirates?

Are you at risk of the data pirates? We used to think of viruses as something malicious created for no other reason than to do damage. Most virus attacks were untargeted and caused by bad practice and were reasonably easy to protect against with good working practice,...