Rivercity Technology Services LTD Logo
About Us
Services
Icon showing a support technician
IT Support Services
Cybersecurity Risk Management at one predictable flat rate.
Icon of light bulbs on a laptop screen
IT Consulting
Business optimization through the smart use of technology.
Icon showing a hand holding a phone
Business Phone Services
VoIP Telephone solutions from RCT. 
Icon showing a database and a cloud
Backups & Recovery
Cloud & On Premise - ready to recover!
Icon showing computer code on a monitor
Software Development
Web & Mobile App development
Icon showing website wireframes
Website Development & Hosting
Web design and full hosting & maintenance packages!
Icon showing an envelope being opened
Modern Email Management
Microsoft 365 email provisioning, security & management.
Icon of a magnifying glass inspecting binary code on a computer screen
Cybersecurity Risk Assessment
Internal auditing to help identify potential cyber threats.
“You’re giving me the ‘it’s not you, it’s me’ routine? I invented ‘it’s not you, it’s me.’ Nobody tells me it’s them not me; if it’s anybody, it’s me.”
- George Costanza
Learning CenterNewsletterContact Us
Book A Consultation
November monthly download

The Monthly Download—November 2022

What does ‘zero trust’ actually mean?

It’s nothing to do with the fear that your teenage children will hold a party when you go away for the weekend…

Zero trust is actually about technology security. It’s one of the most secure ways to set up your network, although it can have a very negative effect on productivity.

Most networks take a ‘trust but verify’ approach. They assume every device that connects is supposed to be there. Access the network once and you can go anywhere.

Imagine you’re using a security pass to access a building… and once inside there are no further security checks, so you can get into every single room.

Cyber criminals love this approach, for obvious reasons.

Zero trust is the opposite approach. Every login and device is treated as a potential threat until it’s authenticated, validated, and authorized.

Once in, you can’t access other parts of the network without going through this
process again.

Back to the building analogy – once inside the building you are surrounded by security doors and must use your security pass to get through each one. If your pass isn’t valid, you’re limited where you can go.

Zero trust has its uses, especially with so many people working remotely these days. But it can have a negative effect on your workflow and can slow down your team.

If you want to talk through whether it’s right for your business, get in touch.

Did You Know?

About the worst ever ransomware attack?

The worst ransomware attack in the world was against insurance group CNA Financial in March last year.

Cyber criminals took company data, customer information, and even blocked employees from entering the network.

Two weeks after the attack, CNA Financial paid a whopping $40 million to regain access to its systems.

Ouch.

Technology Update

If you love your Apple Watch, but wish it helped you stay as productive with your work as it does with your fitness, this could be good news.

Microsoft’s planning to launch its To Do app for the Apple Watch. It will give you reminders of your daily to do list wherever you are.

The bad news is, you’ll have to wait till March for the app to be released.

Tech Facts

#1 Japan holds the world record for the fastest internet speed: 319 terabits per second (that’s 7.6 million times faster than your connection).

#2 No one knows the identity of the founder of Bitcoin, only his pseudonym, Satoshi Nakamoto.

#3 The word ‘technology’ was coined by Aristotle back in 330BC.

Inspirational Quote of The month

“Do you feel good in your
role? If yes, that’s the perfect
time for you to experiment
with something new, to get
out of your comfort zone.”

- Pierre Nanterme,
former chairman and
CEO of Accenture

Test Your Tech Knowledge with This Month's Quiz

Who’s the Top Tech Master in your office? Let’s find out… (and no Googling).

  1. What is Fortran?
  2. What does IT stand for?
  3. Which animal is the mascot of operating system Linux?
  4. Which was the first voice assistant on phones?
  5. When were emojis first used?

The answers are Below.

  1. It’s a programming language first developed in the 1950s and still used today.
  2. Information Technology
  3. A penguin called Tux
  4. Siri, introduced by Apple in 2011
  5. Ages ago, back in 1997. They originated on Japanese mobile phones, spreading worldwide in the 2010s.

New to Microsoft 365

Breakout rooms coming to Android.

If you use Microsoft Teams on an Android device, you might have discovered you’re excluded from using breakout rooms. There simply hasn’t been the capacity for it.

From January, this should change. The breakout room feature is set to roll out on Android, making meetings more productive for everyone.

Not long to wait.

Is it time to upgrade to Windows 11?

It’s been just over a year since Windows 11 launched. Yet there are still loads of businesses that haven’t yet upgraded from Windows 10.

What about your business? Is it time to make the move?

Our expert opinion is yes. While we love Windows 10, Windows 11 is more suited to the hybrid way we work today.

Not only does it have a more modern look and feel to it than Windows 10; it also has new features that make work more intuitive. These features can help keep your people motivated and productive, wherever they are working.

We’ve just seen the first big update to Windows 11, and are expecting to see a number of smaller updates over the coming months. This will bring new features and tweaks to make the experience even better.

If you haven’t yet made the move from Windows 10 to 11, now’s a great time to do it. And if you need a hand, we’d love to help.

Q&A

Q: Someone on my team fell for a phishing email. How can I prevent this from happening again?

A: Phishing emails look like they’re from reputable companies, but they are scams. The criminals are trying to get malware onto your system, steal login details or get you to make a fraudulent payment. You need a blend of protective software and regular cyber security awareness training. Contact us and we’ll advise the right mix for your business.

Q: Is my small business really a target for ransomware?

A: Yes! Don’t make the mistake of believing that because you’re not a big corporation you’re not on cyber criminals’ radar. In fact, small businesses are a bigger target because they often have lower levels of security.

Q: Should I block social media websites for my employees?

A: You can, but would that create trust issues? Rather than blocking websites, create a social media policy outlining the consequences if social media is abused.

Business gadget of the month

There’s no worse feeling than being away from the office and needing to stay connected… only to find you forgot to charge your device before you left. Step up, the portable power bank.

Our favorite is this Anker PowerCore 13,000 power bank. It looks sleek and stylish, charges well, and isn’t as heavy as some others. It’s reasonably priced too, at $39.99.

This Is How You Can Get in Touch with Us

Rivercity Tech
Article Written by Rivercity Tech
Related Articles
Featured image
The Monthly Download—October 2022
Software as a Service plays a critical part in shaping the way we work today—but it comes with security risks for businesses....
Featured image
The Monthly Download—September 2022
Why do you need to automate more? Are executives really the weakest security link? Who's to blame for a breach? We answer these and more....
2022 - Copyright, All Rights Reserved
crossmenu