So last week we had our match up event….
This was a strange ordeal. So we turned up all looking like lemons and standing in this pub not knowing what was going to happen, or who we were going to be matched up with.
The atmosphere was great, everyone was chatting away whilst we waited and people were making nervous jokes.
We were then called to a private area of the pub where the match up event kicked off. We were all in a huddle with our nicknames being called out one by one for our individual pictures and then our face off picture.
We had to square up to each other and have the pictures taken – this was a great laugh seeing people that were smiley/laughing, or looking like they wanted to kill each other!
Luckily we had some support from one of our Distributor’s Exclusive Networks who gave Dan and myself a cheer when we got called up!
All in all, we can’t wait to step in the ring and enjoy the night. Starting to get a little nervous, but equally am really excited.
See you on fight night.
p.s. Editor addition – together Jack and Dan have now raised in excess of £1,000 for Cancer Research – great effort.
Two employees, Dan Jennings (Networking Engineer) and Jack Booth (Sales Executive) are throwing themselves into the ring literally to take part in the Ultra White Collar Boxing to raise money for Cancer Research UK. We caught up with them both to see how their training is coming along:
What made you want to take this challenge on?
Dan – A family member was recently diagnosed with Cancer the support he’s had is fantastic. I am happy to do my part and support those who help others with cancer
Jack – Cancer research is a great charity and is close to the heart due to losing family members to cancer. It’s great to help in any way possible to try to defeat cancer
Have you boxed before?
Dan – No never thrown a punch
Jack – No, I have messed around with some gloves with my older brother but apart from that no
What does the training regime entail?
Jack – Lots of footwork, lots of cardio (unfortunately) and pad work with weekly sparring
Dan – Weight training 4-5 days a week in the morning boxing 3-4 times a week. The boxing lesions stem from the basics to shadow boxing and sparing
How’s the training going so far?
Dan – I am growing in confidence each time I put on the gloves
Jack – it’s going well, learning the movements after every session however have a lot to learn in a short period of time!
What has been the most challenging thing so far?
Jack – foot work, my long stiff body is struggling to move like a butterfly.. imagine Peter Crouch boxing, I am similar
Dan – the footwork and endurance required I have 2 left feet and no rhythm
What are you hoping to take away from the experience?
Dan – I am hoping to help support a good cause
Jack – I am hoping to raise as much money as I can to help cancer research and learn some boxing moves on the way
We will provide another update in a couple of weeks before the big night on the 8th July. Good luck with the training boys! If you would like to sponsor either Dan or Jack find links to their Just Giving pages below.
There has been a lot of information circulating about recent virus outbreaks that have hit large organisations such as the NHS, manufacturing and Telecoms for example. People are banding about the terms WannaCry (the name of the virus in this instance) and ransomware and causing a panic about a situation that whilst important has not changed just with the recent outbreak.
There are two main ways that a virus will propagate. The first is by fooling someone into running them. Generally, they pray upon statistics. If you send an email to enough people mentioning a recent purchase on a popular website (such as Amazon), some people will have done this and this naturally will cause them to let their guard down. They might open an invoice attached to said email and infect themselves.
The second method is to use an exploit within certain software itself. This causes it to behave in a way that allows the virus access in a way that is not typically allowed.
A Virus can do a multitude of different things, but the overriding commonality between them all is that they can cause a disruption to your business.
You can however both reduce the likelihood of getting affected whilst mitigating the damage it could cause if you were to get infected.
- Training staff members to vigilant of all attachments and links from unsolicited emails even from family, friends or colleagues. If you receive an email with very unspecific information “have a look at this” should raise suspicion. If in doubt reply by simply asking the sender “did you send this”? A real person will respond, a virus will not.
- Be aware when clicking on links within emails or documents. Some will hide the site they go to. Hovering over any links will show you the actual site it will go to, if it looks suspicious do not click on them. If the site it takes you to asks for usernames and passwords be wary. Check the address is correct and know that people might use addresses that are very similar (or misspelled) to fool people. Another common trick is a page might hide the address bar so you can not verify you are in fact on the wrong page.
- Updating your software to supported versions and regular patching will help reduce the chance of exploits within the software itself. This method of propagating is much more dangerous because it allows programs to spread at the speed of computers rather than people.
- Running a virus checker on client PC’s that is up to date will help reduce infections. Known viruses are stopped from executing, preventing it from doing any damage and spreading.
- Organisations should think about security at all entry points to their systems. Be it from the web (use a firewall capable of detecting and stopping threats), emails (having email protection for spam and viruses), endpoint protection, as well as potentially preventing viruses from user carried devices (such as CD/DVD) or USB devices.
However, be aware that even with up to date systems and a multitude of layered security, there is always the potential to be infected. Therefore, make certain that you are backing up required systems and information and that those backups are both complete and stored in a safe location. Organisations should also consider a virus outbreak as part of any business continuant plan.
Author: Mike Caley, Cloud Infrastructure Engineer
Ransomware has become the fastest growing malware threat, targeting everyone from home users to healthcare systems to corporate networks. For this reason, we have been educating our customers through our recent communications and our webinar that many of you attended. Little did we realise that we would see a ransomware variant spread so rapidly and affect so many organisations as the attack that started on Friday 12th May has demonstrated.
You will have seen the headlines over the weekend that this ransomware variant has impacted far-flung organisations such as the hospitals and clinics run by the British National Health Services, Chinese Universities, Hungarian and Spanish Telecoms.
Affected Microsoft products include:
· Windows Vista
· Windows Server 2008
· Windows 7
· Windows Server 2008 R2
· Windows 8.1
· Windows Server 2012 and Windows Server 2012 R2
· Windows RT 8.1
· Windows 10
· Windows Server 2016
· Windows Server Core installation option
Microsoft released a critical patch for this vulnerability in March in Microsoft Security Bulletin MS17-010 which we strongly advise that you apply on all affected nodes of the network immediately.
The patch for 2003, XP and Windows 8 machines can be found here.
We also recommend that users and organisations take the following preventive measures:
- Establish a regular routine for patching operating systems, software, and firmware on all devices.
- Deploy IPS, AV, and Web Filtering technologies, and keep them updated. Back up data regularly. Verify the integrity of those backups, encrypt them, and test the restoration process to ensure it is working properly.
- Scan all incoming and outgoing emails to detect threats and filter executable files from reaching end users.
- Schedule your anti-virus and anti-malware programs to automatically conduct regular scans.
- Disable macro scripts in files transmitted via email. Consider using a tool like Office Viewer to open attached Microsoft Office files rather than the Office suite of applications.
- Establish a business continuity and incident response strategy and conduct regular vulnerability assessments.
The security of our customers’ systems is of upmost importance. Our team are at your disposal to offer you advice on protecting your systems and people. If you have any concerns, or would like further clarification about this statement and the recommendations we have suggested then please contact our technical support team who will be only too happy to help on 01189 186824.
We are pleased to announce that we are now a Microsoft Cloud Solution Provider (CSP) enabling us to offer clients migrating to the cloud more options and flexibility.
To join the programme, Nouveau had to demonstrate a number of capabilities including support, technical integration, lifecycle management and billing.
Flexibility and Support
With Microsoft Cloud you can scale up or down as business demands with the peace of mind that you are paying only for the services, support and storage you are using on a pay-as-you-go basis.
“We are delighted to be a certified CSP. Becoming a CSP enables Nouveau to bundle Microsoft solutions and our wrap around services and provide the customer will one bill for all services” Andy Stevens, Managing Director.
For low-cost cloud migration services and support from Nouveau including sizing, POC, provisioning, implementation and support please get in touch with a member of our Cloud team on 01189 699290.