Our mission is to help small businesses & people enjoy their Apple products and fully utilize them, like we do. No need to trek down to your Apple store.
We are passionate about Apple and supporting our customers.
We are Apple Mac and iOS integration specialists for Businesses and Home users.
As Apple Certified Support Professionals, we are your first stop for support with your Apple systems and devices in the Thames Valley & Bracknell area.
Supply & Configure
We can supply and configure technology and software to compliment your Apple products and your needs.
Whether this is for running your small business or enjoying entertainment and music at home.
Equipment & Skills
As Apple’s products are dependent on good solid Wi-Fi and internet connections,
We have the equipment and skills to ensure that your networks are working optimally for the environment you are in and the number of people using it at any one time.
You know that you can drag files or folders to the Trash icon in the Dock for later deletion. And you probably know that you can select multiple items on the Desktop or in a Finder window by Command-clicking each one in turn (Shift-click to select a sequential range of items in a list view), after which you can drag them all to the Trash. But there’s no reason to expend effort mousing if you prefer to keep your hands on the keyboard—just press Command-Delete to send one or more selected files and folders directly to the Trash. Finally, if you need your disk space back right away, press Command-Shift-Delete to empty the Trash. However, we recommend not emptying the Trash frequently—that way, you have a chance to recover something you discover that you needed after trashing it.
(Featured image by iStock.com/FabrikaCr)
For several decades, Russia has targeted a wide variety of cyberattacks at countries with which it has had disputes. That includes the United States and other Western nations, which have recently levied unprecedented sanctions against Russia after it invaded Ukraine. President Biden has warned that “Russia could conduct malicious cyber activity against the United States” in response, encouraging the private sector to increase the protection of systems and networks. This isn’t theoretical—the US Cybersecurity & Infrastructure Security Agency lists numerous such attacks in the last five years. The UK National Cyber Security Centre has also issued official advice and guidance to help businesses ensure they have effective cyber security fundamentals in place
It’s tempting to think that your business is too small or unimportant to be targeted in a Russian cyberattack. While that may be true of direct infiltration by individual Russian hackers, many cyberattacks are carried out indiscriminately by bots—the ultimate is the DDoS (distributed denial of service) attack that uses compromised computers and Internet-of-things devices to flood a targeted server or company with an unmanageable amount of random Internet traffic. Plus, a common hacking approach is to compromise an account on one seemingly unrelated system as a stepping stone to another, more secure system.
There’s nothing new here—we’ve been encouraging everyone to take cybersecurity seriously for years now. But the threat is now more serious than ever before. So, here’s what we suggest—if you need help with any of this, don’t hesitate to contact us.
- Be vigilant: The most common way that hackers gain entry into computer systems is through an employee opening a malicious attachment or being fooled into entering credentials into a fake website. Implement or refresh security awareness training that teaches employees how to recognize suspicious email, identify phishing attempts, and report appropriately.
- Use good password practices: Make sure that everyone uses strong, unique passwords that are created, stored, and entered using a password manager, such as 1Password. Password managers also identify weak passwords and those that have been compromised in security breaches—ask everyone to audit their passwords and update any that aren’t secure. (But there’s no reason to change good passwords willy-nilly.)
- Implement 2FA: Whenever possible, require two-factor authentication, which provides extremely strong protection against remote intrusion given that a compromised password is no longer sufficient.
- Keep software up to date (patch management): Install all software and operating system updates on all platforms. In its security update notes, Apple often says that particular vulnerabilities are actively being exploited—it’s crucial to install such updates immediately. It is essential to use anti-malware software (even with macOS), keep its signatures current.
- Backup regularly: Ensure that all systems are backed up regularly, and for your most important data, make sure backups are protected from ransomware encryption by storing them offline or using object locking on a cloud storage service. Be sure to test your backups regularly as well—backing up is the first step, but being able to restore is what’s necessary.
- Increase monitoring: Keep a centralised record of all employee reports of suspicious behavior to better identify attack patterns and targeted systems. Whenever possible, make sure server and network device logging is enabled so any incidents can be investigated more fully. Turn on any anomaly reporting capabilities in backup and other security-related apps.
- Plan for the worst: Develop or revisit business continuity and crisis response plans. For instance, discuss how you’d deal with losing Internet connectivity, being locked out of key online accounts, or having all your data rendered inaccessible by ransomware.
There’s no reason to panic, but the increased threat from Russian cyberattacks is a good excuse to focus more attention on digital security and maintaining your Macs.
We offer a great managed program called Peace of Mind +, where we will take care of that maintenance and patch management, so you can get on with more important things. We even include the anti-malware software.
The Internet makes astonishing things possible, but it also opens us up to attacks that would previously have been inconceivable. As more of our business is conducted across the internet, now is the time to start making sure our business and Apple devices are properly protected and maintained.
(Featured image by iStock.com/BeeBright)
Social Media: The Russian invasion of Ukraine is horrific, but the economic sanctions and other responses from Western nations mean that businesses of all sizes need to be more vigilant about cybersecurity. Read on for suggestions:
With the recent release of macOS 12.3 Monterey and iPadOS 15.4, Apple shipped Universal Control, the last major technology promised in its 2021 operating system upgrades. Universal Control enables you to use the keyboard and mouse or trackpad attached to one Mac to control up to three other Macs or iPads—you can even copy and paste or drag items between devices. It’s a great way to make more of your Apple devices while staying on task—no longer do you need to stop using your Mac to accomplish something on your iPad, and if you have both an iMac and a MacBook Air, it becomes trivially easy to use them simultaneously.
Universal Control can simplify grabbing a file from your MacBook Air while using your iMac, or it might make it easy to check something in an iPad-only app without switching from your familiar Mac keyboard and trackpad. For those who would benefit from more screen space, Universal Control simplifies keeping a Web browser window open on one Mac while you’re writing about it on another.Read More