telanova Blog

telanova: the outsourced IT team that feels like your own

Providing advice, consultancy, helpdesk, monitoring and maintenance, updates, upgrades, security: all the things your in-house team would do, but better and at a fraction of the cost and hassle.

Spectre and Meltdown - Criminals take advantage in Germany

Keep secure do not download unknown patches from email links
Using the latest wide news coverage of the Spectre and Meltdown vulnerability, criminals have seized on the chance to distribute their own trojans to the unsuspecting users.

Recent news from Malwarebytes is advising that a German email has been circulating purporting to be from the German Federal Office for Information Security , with a valid SSL certificate for the website that is linked in the email, all look legitimate.However, once you visit the site, and download the zip file, inside is a file named intel, which adds to its credibility, but once the intel.exe file is run, it installs a trojan (Smoke Loader) and starts downloading and uploading encrypted data to external servers.

While this website has now been taken down by the hosting providers, there will undoubtably be further emails circulating that will try to take advantage of people wanting to download patches. So whether you are an Accountant in Andover, a Barrister in Basingstoke, or a Loan Officer in London, ensure you download the patches from the domain, or the domains.

For a list of the updates that are currently available, visit the page and you’ll see the hotfix numbers that you can search the MS website from.

GDPR Countdown Clock

How much time is left before the General Data Protection Regulations come into force ?

Companies worldwide that are working with European Individual's data should now be aware of the impact GDPR will have on the way they work with that data.

When do the new regulations come into force ?

25th May 2018

Here are some more questions to ask your leadership ( Download a printable version here )

  • Have you made everyone, and we mean everyone, in your organisation aware of the regulations ? Yes / No
  • Is your company aware of all the different repositories of personal data ? Yes / No
  • Has your company's privacy notice been updated? Yes / No
  • Are the processes for deleting personal data easily accessible and documented ? Yes / No
  • Have you done a trial run on how long it takes to complete a subject access request to complete it within the allowed time frame (normally 40 days) ? Yes / No
  • Does the privacy notice clearly state why the information is held ? Yes / No
  • Is all data, held under consent, clearly recorded on how that consent was attained ? Yes / No
  • If any data, is, or may belong to children, do you have a method of recording parental / guardian consent with this data, and for any data that could belong to under 18s have you got that consent ? Yes / No
  • Where are the documented procedures for detecting, reporting and investigating a data breach ? Location : _____________________________
  • Where are the documented procedures for carrying out DPIA's for new developments / technologies, or new processes ? Location : _____________________________
  • Who is/are the Data Protection Officers Name(s) : _____________________________
  • If you have overseas branches, which state is the lead supervisory authority ? State : _____________________________ / N/A
For more information visit the ICO website

Now's the time to upgrade your wireless infrastructure

If your business is relying on older wireless infrastructure it is probably time to upgrade. Wireless traffic is only going up, not only is the demand from each device going up, each person typically has more devices - laptop, phone and tablet etc!

On top of that, nearby wireless access points, bluetooth and other wireless peripherals all compete with you for the limited amount of wireless bandwidth.

Enter "5GHz". The "5GHz" band has a lot less devices competing. Typically 5GHz has a smaller range than 2.4GHz, which counter to what you would expect is actually a benefit. It means there are fewer devices competing within an access point’s reach.

Any laptops, phones and tablets replaced within the last few years probably already support the latest wireless protocol 802.11ac which uses the 5GHz band, why not update your wireless infrastructure to support them? Wireless 802.11ac infrastructure is also now quite reasonably priced.

telanova will guide you through the whole process: defining your requirements, choosing a vendor, creating a secure design, implementation, and post installation support. Contact telanova on 01344 989 530 or This email address is being protected from spambots. You need JavaScript enabled to view it. to get started.

Protect your business from ransomware and other nasties

Ransomware is a type of malware that encrypts every file it can find on your network. When you try to access one of the files you can’t: a popup demands payment of hundreds or thousands of pounds to unlock them for you. Some notable examples of ransomware that you may have seen reported in the news are Cryptolocker, Locky, and CryptoWall.


Telanova has a multilayered approach to protecting your business from ransomware and other nasties:

  • Prevention - The first line of defence, to stop malware from getting in

  • People - Some malware may penetrate you defences, your staff need to be on the lookout

  • Limit damage - If malware manages to penetrate your defences and get past your staff, make sure it can do as little damage as possible

  • Fast recovery - The last line of defence for your business is to make sure you can get back up and running again as fast as possible following an infection


Prevention - You need a belt and braces approach. telanova will check you system and advise. At a minimum you should deploy all of these:

  • Email server security - to scan incoming emails before they reach you

  • Web security - to scan web pages before you open them

  • Antivirus/antimalware - to protect each individual device


People - There is a constant arms race between the people who create the ransomware and the people who write the software to protect you. When new ransomware comes along for the first time, your security software may not protect you from it. So you need your staff to be vigilant. telanova will train your staff:

  • To identify the different types of fraudulent emails (phishing, spear phishing, whaling etc)

  • To spot bad links in emails

  • Don’t visit suspicious websites

  • To report anything suspicious on their devices asap

  • To know what to do immediately following an infection


Limit damage - In the event something manages to get through all your defences, it is important to limit the damage. You don’t want your business grinding to a halt from a single infected device. telanova will:

  • Lower each staff member's privileges to the minimum needed for their job

  • Make sure each staff member can only access the shared folders they need

  • Separate personal and guest devices from your business network


Fast recovery - Downtime is costly to your business, we can make sure your recovery is as quick and painless as possible. Telanova will:

  • Ensure your backup system is sufficient for your recovery requirements

  • Perform regular disaster recovery tests

  • Consider a deployment solution to quickly wipe / reinstall PCs


Contact telanova on 01344 989 530 or This email address is being protected from spambots. You need JavaScript enabled to view it. to protect your business from ransomware and other types of malware

Meet Jon Hobson

What is your job at telanova? Primarily, I work with Paul designing and implementing IT solutions for our customers.  When Adam needs me, I drop into the support team as a 3rd line engineer.  I also look after our internal information systems, making sure our engineers have the resources they need to do their jobs.

Read more ...

Email Facebook Google LinkedIn Twitter

We use cookies to provide you with the best possible experience in your interactions on our website

You agree to our use of cookies on your device by continuing to use our website

I understand