Category Archives: Uncategorized

Examples of Internet regulations around the world aimed at protecting children.

We have been writing extensively about the UK Online Safety Act, but I was interested to see how other countries deal with the same issues.

I have left the referring site links intact for anyone who fancies a trip down a rabbit hole today.

I had Copilot research for me and found an excellent piece from Ross Atkins of the BBC. Ros Atkins on… How different countries protect children online – BBC News

Here are examples of regulations aimed at protecting children online in Europe, the United States, and China:


United States:


IT Services West Sussex & the South East; Business and individual

Specialist IT Services & Products For Business

Since 2008, Tamite IT Services Sussex from Haywards Heath has provided support services to our clients. But don’t imagine that, as we have been around for a while, we aren’t forward-thinking; we are technology evangelists.

We strongly believe businesses can benefit from their technological investments by adopting AI, specifically Microsoft Copilot. We also develop Chatbots for clients that, believe it or not, aren’t as annoying as they used to be.

Contact us for a no-obligation discussion of your future plans. Click here

A future with a personal assistant on our desktop

Desktop personal assistants to deliver and support your projects

Personal assistants have come a long way since Clippy. They actively support you, provide hints and assistance as you work.

We prefer to think of AI as personal assistants, part of the team, capable of providing us and our company with numerous tasks within the business and even customer-facing tasks, such as being a more exciting way of delivering answers to faqs.

Employees and employers need not be concerned about the changes AI will bring to the workplace.

A personal assistant on every desktop can enhance productivity and improve security by reducing digital overload.

Your organisation is as good as the expertise of its teams; employee education will enable the realisation of the possibilities AI presents

IT support company east sussex, IT hardware support sussex, it support and consultancy

We believe that small and medium-sized businesses’ IT systems will benefit from AI technologies, which can leverage your existing applications and enhance cyber security.

Professional services users will especially find that Copilot AI simplifies and accurately summarises information, saving time searching for documents and content.

It also provides tailored recommendations and assists in creating content such as presentations, Word documents, Excel workbooks, PowerPoint presentations and summarised emails.

Save money, work more effectively, and integrate solutions seamlessly.

 West Sussex support company, technology partnerships, meeting customers expectations, phone support, consultancy, managed service

By utilising Microsoft Copilot features, users can overcome the initial difficulties of creating a document and hopefully contribute to a more satisfying work environment where AI personal assistants become valued team members.

However, it is vital to ensure that the environment in which Microsoft Copilot is introduced is secure.

Adding AI to your IT systems mix will inevitably highlight existing vulnerabilities within your IT infrastructure and cyber security practices.

Please read the NCSC article on employing the Principles of least privilege for more information.

IT Services & Support Sussex & Surrey, Support Contracts & System Health Monitoring

South east IT support, it support in the heart of sussex, we deliver hardware and software support service,

But what makes Tamite different to most of our IT Support competitors is that our focus is on preventing the issues arising in the first place.

We know that addressing your IT problem and getting it resolved quickly matters.

Customers rely on services, so with technical issues, prevention is better than cure for your business.

Our remote monitoring service allows us to check critical aspects of your PC or Server.

These include time to failure on your hard drive, disk space remaining, antivirus and firewall status, and many other aspects, including backup status, to allow us to monitor and anticipate problems with your systems before they become an issue.

Outsourcing backups and managed support solutions frees up your IT resources.

Backup technology, professional managed backup outsourcing, backup infrastructure, provide business backup support

Backup, Disaster Recovery, and Cyber Security are not just concepts for big business but also vital for small and medium-sized businesses.

We are a support provider dedicated to ensuring complete peace of mind, knowing that whatever technical issues happen, you are covered.

Email deliverability frustrates most companies; we provide a solution to monitor and manage your records and secure accounts.

More than just a support provider, expert advice and training.

Sussex Support, solutions company, your support team, meeting your IT needs, IT services Sussex

As a specialist in IT Security, we ensure your network is secure and free from threats, and your data is always available and adequately backed up.

In addition, we provide in-house business training for users to ensure they understand the basic rules and develop good habits that will allow them to work safely without compromising their IT security.

A Comprehensive Range Of Products & Support Services To Serve Your Business

In addition to practical assistance with technical and business processes, we have a portfolio of tried-and-tested products and IT services, all representing value and quality.

IT Security is central to our approach to supporting your business & being your trusted IT partner.

Software Solutions, complete peace through outsourced support, managed service solution,

Real Business benefits of artificial intelligence

The next few years in IT will be fascinating as AI will be genuinely transformative for many of the tools we currently use to run our business.

Artificial intelligence will also increasingly turn up on our phones and tablets and get involved in our leisure; imagine a personal assistant curating music and entertainment, suggesting recipes and getting the online shopping list ready. A practical and social secretary, though initially without the charm of Jeeves.

Implementing AI is not replacing human capabilities but creating a better customer experience.

Microsoft software with copilot AI, AI technology provider, we always listen carefully

AI as a tool is here. Developing your AI skillset is the best advice for anyone looking to succeed and progress, whether in their career, personal life or business strategy. Consider how artificial intelligence will affect your activities, and understand and embrace it.

As Artificial Intelligence technology develops, the threat to jobs and companies will actually come from the fact that, as with all new developments, we often feel threatened or fear change and resist it. Unfortunately, the people who resist digital personal assistants and don’t learn to work with AI will not be as efficient as their colleagues who have.

The sensible approach to AI is first to understand how to use it, train your employees, and plan to fully embrace a future in which AI will assist in most facets of the business.

We can confidently expect economic growth to experience a significant upturn, as we will see a productivity increase with AI in business. Having an AI colleague and assistant will greatly help many of us who currently feel we are struggling with information overload.

‘AI won’t steal your job, but people using it may’ – BBC News

We Support Sussex & Surrey businesses, but our services are Nationwide.

Although we are based in West Sussex and restrict our IT services to our local area, as we like to provide personal service and great response times, many of our products are UK-wide.

Tamite IT systems Featured product of the month:       

Keeper Password Manager

Keeper Password Manager, IT services West Sussex


People are notoriously useless at managing passwords; Keeper Security takes care of them for you. Keeper works brilliantly for individuals but has excellent team functionality that allows sharing credentials for groups within the business.

<a href=''><img alt=" Computers" src="" /></a>

Haywards Heath IT security specialist asks what can we learn from Kaspersky

The way that data breach has been handled by these two organisations provides valuable insight into how it should be done.

Haywards Heath IT security specialist Gary Johnston has been taking a particular interest in events at Kaspersky and the US Office of Personnel Management.

As an IT security specialist when stories of this kind unfold it is always interesting to see how they are dealt with by the companies involved, very often unfortunately the answer is badly.

Haywards Heath IT security specialist Gary Johnston says Kaspersky and The US Office of Personnel Management provide contrasting examples of how to deal with a data breach.

Tamite Haywards Heath IT security specialist comment on Kasperky & US Office of Personnel Management data breach

Kaspersky have given a text book demonstration of how to handle the potentially embarrassing fact that they have been the victim of data breach. Kasperky disclosed the fact that during the testing of a new product designed to search for APTs (Advanced Persistent Threats) they had actually discovered an intrusion on their own network.

The phrase not knowing whether to laugh or cry comes to mind. I should imagine that the event was akin to the head designer at Dyson plugging in the latest design, pushing a button, watching his own workshop disappear up the nozzle and saying to the assembled audience, “well that worked”. Presumably the new product has passed its Beta testing with flying colours.

Kaspersky unlike previous victims of this type of event, have actually in some ways turned what could have been a hugely embarrassing event into something a little more positive. They promptly admitted to the breach and the investigation showed that the attack was highly advanced. Using what Kaspersky have dubbed Duqu 2.0 which presumably infers a link to Duqu 1.0 (BBC News) which was famously uncovered by Kaspersky in 2011 to eves drop on the organisation.

Gary Johnston of Haywards Heath IT Security specialist Tamite Secure IT comments that Kaspersky appear to have been open about the scope of the breach from the start, including the extent and the timeline of the attack and the fact that within a short period of being discovered it appeared to uninstall itself and attempt to cover its tracks (Computer Weekly), it makes fascinating reading and gives a real feel for the sophistication of the APT.

July was also a good month to bury bad news as the events at Kaspersky were possibly over shadowed news wise by the events at The US Office of Personnel Management (US OPM) who managed to leak tens of millions of records relating to government employees. (BBC News)

In contrast to Kaspersky the reaction of The US OPM went through the usual phases, of denial, to grudging acceptance while still understating and minimalizing the extent of the breach. The classical pattern was almost complete when after having been over taken by events, The US OPM finally resorted to a hand wringing confession to the true extent of the breach. The final phase was marked by the inevitable and ritual decapitation of the person deemed most culpable. In this case the Director of US OPM Katherine Archuleta who announced she would step down to help the department “move beyond the current challenges”.

However of the two events, the one at Kaspersky is the more troubling, it seems to be a universal fact that governments don’t do a great job of IT or IT Security per se and in any case the USOP have what is known as previous. The fact that Kaspersky who do IT Security well have been spied upon for an indeterminate period should be seen as sinister.

Gary Johnston Haywards Heath IT Security Specialist goes on to say that there are three scenarios that have been mooted.

1. The Israelis who have plenty of “previous” spying on the Iranian Nuclear Arms proliferation talks and wanting early warning if their latest piece of Spyware has been exposed.

2. GCHQ, Nation state China, US NSA etc. a security service wanting to know how to circumvent the latest security products.

3. Three Cyber criminals least likely but similar motive.

The comments in this blog represent the thoughts of Haywards Heath IT security specialist Gary Johnston of Tamite IT

Watering Hole Attacks Watering Hole Attack
(shows you can lead a horse to water & make him drink!)

Watering hole attack

The news that Forbes website was compromised in November leading to thousands of its customers being potentially infected with malware, has provided a wake-up call for us all.

The term watering hole attack refers to the idea that the cybercriminals identify. Websites that will appeal to the demographic that they are intent on exploiting.

Potentially, your customers. The analogy being the obvious one of a predator, (in this case Malware), lying in wait for its prey by a frequently visited watering hole (Your website). I’m sure you worked that one out for yourself.

The exploit relies on the fact that often the company website is poorly defended, and it will be relatively easy to find an exploitable weakness in the security of the site or the underlying code. The perpetrators insert their malware, and the popularity of your website and your SEO effort will do the rest.

In the case of Forbes, (Invincea and iSight Partners said in their joint report), the attack exploited two zero-day vulnerabilities. One in Microsoft’s Internet Explorer, and the other in Adobe’s Flash Player.
Adobe fixed the flaw back in December and Microsoft updated Internet Explorer as part of its Patch Tuesday release.

The exploit appears to have been targeting senior executives, managers and professionals in the defence and financial services industries.
The very fact that two zero day vulnerabilities were used indicates that this attack was a serious attempt at compromising these high value users of Forbes website, zero day vulnerabilities suggest the attacker was sophisticated and determined, the use of two zero day vulnerabilities emphasises just how determined they were in pursuing their quarry.

The malware infection was inside the “Thought of the Day” Flash widget, which appears whenever users try to access a page. Visitors didn’t need to do anything other than to try to load in their browser to get infected. It is probable this campaign focused on cyber-espionage, not cybercrime.

It is a fact Watering hole attacks are insidious, because it wouldn’t occur to anyone that these sites could be infected.

Of course the Forbes incident was the top of the tree as far as these things go, but it does emphasise that everyone is at risk. You should realise that it is common practice for criminals to infect legitimate websites, that’s your business website, with the aim of passing on malware to your potential clients.

Forbes probably have a whole department dedicated to the upkeep of their website, you probably speak to your web designer a couple of times a year. Little wonder that because the scripts and coding that underlie the site are rarely updated or patched that they are wide open to this sort of attack.

WordPress based websites are notoriously insecure, not surprising as they make up such a big proportion of published websites, but so are most other platforms. So what is the answer? Well we would suggest you speak to an IT company who understand just how significant security is to your business. Some one that gets the bigger picture.
Your customers come to you because they want your products and trust you. It is in your interest to make sure that in visiting your site, the only thing your customers leave with are an enduring good impression of your organisation.

Hackers Topple Dominoes

dominoesRex Mundi a Cyber Criminal group who specialise in stealing user data from global companies for extortion claim to have hacked the database for the Dominoes franchises covering France and Belgium, Dominoes have conceded that they have experienced an incident. The criminal gang Rex Mundi have demanded a ransom of £24,000 to prevent the posting on the Internet of the details of 600,000 of Dominoes customers, the stolen information is said to contain usernames, passwords, email and physical addresses, phone numbers  and includes information such as the customers’ favourite topping. At the moment it appears that the customer credit card details are still secure.

Rex Mundi have a track record with previous known attacks,  in 2012 the group stole and published online loan-applicant details from thousands of users from US payday loan company AmeriCash Advance.

Belgian internet hosting company Alfa Hosting became another of Rex Mundi’s victims suffering a break-in this year leading to the names of 12,000 customers being published online.

So why is this of interest to Tamite IT Support who provide IT support to customers in Sussex and Surrey. Well the answer is it gives me a prime example of how we can link cause and effect and describe how these high profile attacks could be used to target you.

Recently there has been a spate of high profile hackings involving well known brands such as Ebay and Mums Net. In all the cases the credit card details have not been compromised. The reality is that in the world of the Cybercriminal the credit card details are often no longer the primary objective. You can only exploit them for a short time frame. In the world of Cybercrime information is King, as it gives you a commodity you can sell over and over again over a long time frame.

The next time you receive a spam email assuming it evades your spam filter or something through a social networking site that seems to be too close to the mark, try to imagine how they may have gained access to that information.

The quantity of Spam is not the only issue we are faced with, the quality has improved to the point when you would be hard put to distinguish a real message from your bank to a counterfeit and the content is becoming increasingly sophisticated add to this the use of information provided as a result hacking attacks that can be used to make the message more convincing.

See the Tamite IT Support Guide to Social Engineering and Phishing.

Next week when you receive that email enticing you to order your favourite Pizza from Dominoes with just one click of a link, with an extra 20% off with a side order of frogs legs  if it is ordered before the weekend. Take a second look and if you have the slightest doubt access Dominoes via a Google search to make sure you are using the legitimate site.

Of course telling you to be on your guard and not to take anything for granted whether the message comes through email or social media is only half of the answer. In my next blog I will discuss the other half of the answer.

If you feel you would like more information on the steps you can take to protect yourself and your business from Cyber crime Tamite IT Support provide IT Security seminars  and training aimed at small businesses  and individuals in the Haywards Heath, Sussex and Surrey areas.

Mobile phone suppliers letting down their customers.

While I love my iphone and am constantly impressed by the products turned out by the mobilephone manufacturers my feelings for the Mobile Network operators are less than favourable. When my customers ask me to recommend a mobile phone network my reaction is usually to cringe, as my experience is that mobile providers in general & even traditional telecoms service providers are all next to useless and show a disregard for their customers that beggars belief. Oh by the way I’m not going to join the chorus of voices condemning the major EE outage yesterday. These things happen occasionally and personally being without a mobile service for an hour or two won’t do me any harm and I personally think being off line for a while feels like a positive thing. Although businesses who depend on mobiles will disagree.

What does alarm me is the casual way they disregard their customers when it suits their business needs. Two recenct examples. O2 have recently sold all of their residential terrestrial Broadband business to Sky. At the start of March they notified their business customers that they would be ending their service on 18th March. Considerably less than the 30 days Ofcom demands. My customer received no notice as the notice was sent to the salesman who initially signed them up for O2 and so they were surprised when on Tuesday the 18th the broadband circuit stopped. Of course they called O2 to be told that O2 had ended their service.

As a result I had to set them up with a temporary Internet connection ironically using 3G which will give them a connection for the 10 or so days it will take to get a new circuit in place. fortunately they had another number that was able to have the broadband provisioned on it otherwise a further delay would have been inevitable for reasons I won’t go into here. I’m sure lots of other ex O2 customers won’t be as fortunate.

I would imagine my customer is not alone. So why didn’t O2 make some effort to contact their customer when it became obvious that the circuit was going to be ended as the customer hadn’t migrated to an alternative supplier. Were their too many to be contacted personally, in which case why did they let it happen or if it was a minority of customers then they should have pulled the stops out and contacted them. After all they know the phone numbers and the addresses and possess call centres full of people who will bother us when ever they have something to sell, so why not use some of this resource to help a customer that they were dropping for their own business ends. If O2 want to post a reply here feel free it will make interesting reading.

I will now move on to EE and Orange who have managed to displease me for other reasons, once again this stems from Oranges’ decision to move its customers to EE. I am not alone I know on this one. When the account was moved over to EE I was billed by EE for the correct amount, additionally I was billed by Orange for over £300. On calling Orange I found this spurious amount had inadvertantly been billed to many of their customers as a result of the change over and they were making plans to re-imburse me and all the others (nothing like some urgency).

I short circuited their plans by contacting my bank and arranged a DD clawback. problem sorted. Well not quite as a month later they did the same thing (silly me not cancelling the DD). Anyway it took Orange 3 months to sort out a credit against the invoice and to stop pestering me for payment after I ended the DD.

The lesson would seem to be the best policy is to get the best deal you can as in this industry customer service just doesn’t figure. The thing that comes through is that actually you want to go to a resseller that you have a relationship with and will look after your intersts. So when I’m asked I recommend my customers to use Simon Farncombe of Numatel. 0844 544 3789

Crawley business taking cyber security seriously.

This morning I was invited to address a number of small businesses from the Crawley and Haywards Heath area. Being Valentines day I thought that some advice on how to avoid contracting infections and how passing one on can adversely affect a relationship would be an entirely suitable and timely subject.

Entitled Time To Take Cyber Crime Seriously the subject was how we all have to step up to the mark and take responsibility for our own security, both on the Internet and in our own networks. The reasons for this are simple, the cyber security threat extends to businesses of all sizes and even individuals. The organisations behind it are professional, organised and well financed.

Recent developments in the world of malware have in my opinion signalled a step change in the threat that Cybercrime poses to the individual and small businesses. I will sum up the reasons for this by simply stating that criminal organisations have been encouraged to target this area in part because the larger targets have toughened their security stance and represent a harder proposition. Where-as individuals and small businesses not having the resources of a full time IT department are perceived as a soft target. CryptoLocker is demonstrating that the financial rewards from this area are substantial.

Bitdefender Labs identified that approximately 12,000 hosts were infected with CryptoLocker between October 27 and November 1, 2013. Even if only 3% of users infected by CryptoLocker are estimated to pay, this means the organisation behind CryptoLocker probably made in excess of $100,000 in a single week.

It is up to us as the IT Companies who provide support to this sector to provide the additional IT security training to the users to make them habitually safe. That data security products can provide part of the answer is without doubt but only when the IT environment they are deployed into is built on sound principles. All of us, IT users and suppliers now need to step up to the plate. The government seems to be getting the message and is actively encouraging better data security practice via its cyber Streetwise campaign.

The answer for small business and individuals is partly increased awareness of the risk and a sound strategy that properly addresses the areas of risk. This may be a combination of training and correct deployment of products. The name of the game is to make sure you aren’t the perceived soft touch. Its similar to the story about the Polar explorer who when he was questioned about the best way to survive a Polar bear attack replied that he relied on the fact that he could outrun his companions.


Gary Johnston – Tamite IT – IT Security Strategist

Tamite IT Security Course at the Kissingate Brewery

kissinggate logoTamite IT Security Course – IT security Basics For Businesses & Individuals

Our most recent IT Security Training Course held at the Kissingate Brewery was a great success attended by representatives of businesses from across Sussex and Surrey. Concentrating on the simple steps that individuals and small businesses can relatively simply and quickly put into place, the adoption of which will make an enormous difference to the security of the individual PC and the network to which it is attached.

One of the main aims of the Tamite IT Security Training Course is that by understanding the risks posed by Cybercrime we are able to avoid risky activities and spot potential threats.

Malware moves on constantly, and the war being waged against it is also necessarily unremitting. One of the more recently announced threats (discovered by the Security Research Firm, Intego) has been named the Crisis Trojan. Interestingly the malware was found to infect Mac OS X computers and could record keystrokes, webcams, track web traffic, take screenshots and steal data.

Owners of PCs should restrain the urge to snigger as researchers at Symantec have revealed that a worm-like version of the malware also targets Windows. As with the Mac version, this malware installs itself onto a victim’s PC if they visit a compromised website, subsequently downloading a malicious JAR file.

We believe that the only sensible way for businesses and individuals to deal with the multitude of threats posed is to train users, our IT Security Training Course is specifically designed to help you make your environment secure and keep it secure.

A small success in the war on Spam

At Tamite IT Support Sussex we are very aware of the problems malware can cause our customers, there is a constant war being waged against the spammers and criminal gangs responsible for producing and spreading malware. Occasionally the triumphs of the groups that combat Cybercrime make the news. This month a group of researchers that include security vendor FireEye have claimed a success in the war against Spam, Grum, the botnet credited with at one point being responsible for a third of all Spam on the Internet sending out around 18 billion spam emails a day, has been shutdown.

Tamite IT support Sussex IT Security Training gives you the knowledge to protect your systems and play your part in combating Cyber Crime.

The demise of the Botnet known as Grum is good news for everyone using the Internet as Spam presents a significant overhead to the infrastructures that support the web, if we had no Spam, the Internet would run faster due to the reduction in bandwidth and processing wasted carrying information that at best is a nuisance to the recipients, you could even argue from a green point of view that vast amounts of energy are being wasted with resulting CO2 emissions.

Many of you won’t even be aware of what a Botnet is and how it works, so for the uninitiated I will describe how it works.

Our PCs are constantly under attack by criminal gangs trying to plant programs we call Viruses, Trojans, Spyware etc. these can be delivered in many ways; Browsing, Social Networking, Emails and a host of other means.

If one of these programs manages to attach itself to your Computer you may well have been recruited as part of a botnet.

Once enslaved to the botnet your PC will come under the control of a server that directs and coordinates operations. Quite often they are capable of a number of functions, maybe sending out Spam or more exciting taking part in a Dos attack (look that one up on Wikipedia). Botnets are often hired out to other criminals to carry out such projects.

Now the sobering thought, According to Spamhaus’ figures, Grum used an average of 120,000 IP addresses to distribute its emails.

That means at the point the servers were taken down 120,000 PCs were being controlled by Grum. They in all probability are still carrying the code that enslaved them to Grum and other Criminal gangs won’t waste time in scrambling to recruit these machines to their Botnets.

Of course organisations like Scrum rely on people being lax with their security. Properly protected Networks are less likely to harbour infected PCs and so the next time you complain about the amount of Spam you receive consider the fact that if your aren’t properly protecting your PC you may be part of the problem.

Tamite IT Support Sussex are in the business of providing Software, Support and IT Security Training Courses to help keep your data secure.

In our IT Security Training Courses we describe simply and concisely the elements that are key to protecting your PC’s and network. By protecting ourselves we can all play our part in the reduction of cyber crim

Why IT Security Training is a must for anyone who owns or works on a computer.

An article I read this morning in an IT journal reinforced the need for companies of all sizes and individuals to take an active role in managing IT security and also the need for IT Security Training. The articles’ introduction began from the position, that a network breach is all but inevitable? Wade Baker, director of risk intelligence at Verizon, asserts that taking such a view is “unhelpful at best” and points out that “97 per cent of the attacks analysed in the 2012 Verizon Data Breach Investigation Report were avoidable, without the need for organisations to resort to difficult or expensive countermeasures.” which we think is good news for Tamite IT support Surrey customers

Tamite IT Support Surrey business supply IT security training to individuals and business.

Taking steps to improve your computer & network security does not have to be as daunting as it sounds, but it does go beyond installing Antivirus and hoping you will be protected. At Tamite IT Support Surrey we believe that by providing basic IT security training where it is explained in simple terms, how you go about keeping your operating system and other vital systems up to date thus ensuring exploits in code are closed. Recognising the vulnerable areas of your network and how to protect them and most importantly the adoption of good habits and the ability to recognise suspicious behaviors all can be demonstrated.

The truth is that most virus infections are avoidable and even the danger of losing data through hacking or leaking can be mitigated and quite often the solution is already available as part of your Operating System or other software or just by better network management. Tamite IT Support Surrey show how you are able to impliment a simple layered approach to defend your valuable data.

Tamite IT Support Surrey business can assist businesses of all sizes to formulate sensible policies and understand the technologies so that you can make decisions based on knowledge and we are always happy to assist you either with the planning or the implementation.

Tamite IT Support Surrey are in the business of providing solutions and information to help you make the correct decisions for your business.

The key areas to consider are perimeter defences which include devices such as your Broadband router and possibly other devices such as WiFi on your network. Also Firewalls both hardware and software. Correct configuration of software such as your operating system, Antivirus software and Browser. In addition the messaging you use to interact with the outside world, email, social networking etc. and critically your ability to backup & restore your data. The problem is that today the computers and systems we use every day have become so key to the smooth running of the business.