The Science Behind Turning it Off and On Again

We’ve all been there before – having problems with your tech being slow, not responding, or just not working in the way it’s supposed to. The common piece of advice that we’re always told by IT professionals seems to be “just turn it off and back on again”. But is there really any scientific truth to this simple method that seems to work like magic?

Power cycling is the proper term for this solution, usually achieved by holding the device’s power button for a few seconds to force it to turn off or unplugging it from the wall to cut off any power. When you turn off a device, all its running programs and processes are terminated, letting the system reset to a clean slate and potentially stopping any issues that were previously causing problems. Power cycling can help with a wide range of devices, whether it’s your computer itself, your phone, your internet router, or even a device like a printer or photocopier.

When your device has been running for extended periods, it’s not uncommon for performance issues to pop up. This is because as a device runs, it can accumulate temporary glitches such as memory leaks. Furthermore, a device that has been on for a long time may be more likely to overheat. Power cycling can resolve both of these issues by giving your computer a quick break.

Generally speaking, power cycling should be one of your first steps for troubleshooting an issue. Processing issues can be caused by factors such as stuck processes – more specifically, when a system is being slowed down or has crashed because of too many processes happening at the same time, but there’s more to it than that. Power cycling is a versatile solution that can address a wide range of common issues.

  1. Speed boost. A simple reboot can clear any ongoing applications and processes that might be slowing down your device, taking up valuable RAM (essentially the device’s short-term memory) space, and helping to improve overall performance.

  2. Resetting settings. It’s possible that you may have inadvertently changed several configuration settings in the system or a program, causing your device to perform less efficiently or stop responding. By power cycling, these configurations may be reset back to normal, allowing you to get back to regular performance.

  3. Software updates. It’s possible that your device is slowing down because it’s trying to install an update. Many software updates require a reboot to take effect, which can in turn enhance your device’s functionality, performance, and security.

  4. Network connection problems. Perhaps the issue isn’t to do with the device’s performance, but its network connection. Power cycling can effectively reset your connection and restore stability.

In many cases, power cycling can be a quick fix to issues such as frozen screens, programs not opening, or devices not being able to connect. Being able to confidently power cycle your devices is a key part of integrating technology into your business, allowing you to save valuable time by fixing what may be a simple issue by yourself instead of calling for a technician or waiting for remote support. Furthermore, by power cycling, you mitigate any potential long-term risks to your device’s performance by nipping small issues in the bud before they develop into more significant problems, such as taking up hard drive space, overheating causing damage to internal components and making them perform less efficiently, or in rare cases, data loss or corruption.

Did you know? Even huge companies such as NASA use power cycling as a simple solution to their tech problems. In 1971 during the Apollo 14 mission, the landing radar was unable to lock onto the moon’s surface to safely land. Mission control told the astronauts aboard the spacecraft to turn off the radar and turn it back on, allowing them to land safely just in time.

There are some cases where power cycling may not be the right solution. Power cycling isn’t a magic solution to every tech problem, as most of us have probably experienced before, it doesn’t always work perfectly. Furthermore, power cycling can cause you to lose unsaved data, or in rare cases, cause damage to system files by not shutting off the device correctly. If possible, it’s always best to turn off your device through the start or home menu, rather than forcing it off by pressing the power button or disconnecting the power. You may also find that it helps to wait for several minutes before restarting your device.

So, next time you reach for the phone to call for support, remember the simple solution of turning it off and back on again that you can easily try for yourself. It may also help to try this several times or try power cycling other connected devices such as the power supply, Bluetooth devices or your internet router.

At Pearce IT, we provide a range of IT support options. 90% of issues can be resolved remotely, so by getting in touch with us, you’ll be saving time and getting your business working again with minimal disruption. We provide assistance with issues relating to internet connectivity, data loss, hardware and software performance, and printing and copying. As always, we are always here to help with your IT problems and will gladly offer advice or assistance regardless of your problem.

You can always log an IT support ticket with us, whenever you need it, whether or not you are a client, and whether or not it’s within office hours, we’ll do our best to get you back on track as soon as possible. https://shorturl.at/lAHY0.

Top Tips for Keeping Your Data Secure

Data loss can have a severe impact on small businesses. Unitrends reports that 94% of companies that suffer severe data loss do not survive for longer than a year. Furthermore, loss of data can damage the trusts your clients have in your business. It’s of paramount importance that your business’s data is kept as secure as possible.

It's not just large, national-scale businesses that are targeted by cyber-crime, however: in December 2021, Gloucester City Council suffered from a ransomware attack that damaged network and online services from Russian hacking group Conti. The incident was estimated to have cost the council £800,000. An attack like this could be a death sentence to your company.

At Pearce IT, we offer cyber security solutions to ensure you will never have to worry about having valuable data stolen. Here are some 4 steps you can follow to make sure your data stays as secure as possible.


1 - Encryption

Encryption is a way of protecting your data so that it can’t be viewed by anyone except for the intended recipient, such as a specific email address, IP address, or the user of a particular device. Sensitive data, such as about your clients and partners, needs to be stored securely.

At Pearce IT, we provide business grade encryption for your hard drives and portable storage to help your business’s data stay safe.

2 - Anti Malware

Perpetrators of cyber-crime use a range of malware (viruses) to target your data. For example, ransomware is used as a threat to make public or permanently delete or encrypt sensitive information, usually demanding a ransom fee to recover the data. Worms are a type of self-replicating malware that spread through a network, often causing damage to multiple systems, often becoming very expensive to put right.

At Pearce IT, we are partnered with Bitdefender, an award-winning cybersecurity provider designed to keep your data safe from malware. We also offer advanced email filtering that identifies malware in the form of phishing links and malicious programs, eliminating them before they reach your inbox.

3 - Data backups

One of the best ways to protect your data from being stolen or destroyed is with regular backups. Backing up your business’s data is absolutely essential in today’s age, not only protecting it against cyber criminals, but also ensuring your data is kept safe in the event of hardware failure, theft, or destruction such as fire.

Our online backup service is easy and simple to set up, while being ultra-reliable. You can work on files in the cloud 24/7, using any device able to connect to the internet, and what’s more, our hosting servers are encrypted so that none of your valuable data can be accessed by cyber attackers. Business grade backup doesn’t need to be expensive, which is why we offer solutions for as little as £3.50 per month.

4 - PASSWORD PROTECTION

Enabling password protection and two-factor authentication on your devices adds an extra level of security, preventing your data from being accessed by anyone outside of approved users. Using secure passwords longer than 15 characters and containing lowercase, uppercase, numerical, and special characters protects your business accounts or devices from being compromised through a brute force attack. Two-factor authentication ensures that only you can access your account or device, even if someone does get hold of your password.

Our friendly staff team have decades of experience and expertise regarding cyber security. If you’re looking to upgrade your security or need some help setting up two-factor authentication, get in contact with us today, either by giving us a ring on 01452 222000, or using the contact portal on our site https://shorturl.at/lAHY0.


Using all four of these steps ensures that your data is as safe as possible, meaning you can rest easy knowing your data won’t be stolen any time soon. We also offer cloud support, helping us resolve your IT security issues remotely, reducing your downtime and letting you focus on your sales or services.

If you’re looking to improve your business’s security with one or more of our security solutions, contact us today and we can let you know how we can help.

What does Bristol's Isambard-AI mean for the future of AI research?

Isambard-AI represents a quantum leap in the UK's pursuit of AI research and innovation, firmly establishing Bristol as an epicentre for AI technology development and application. This visionary project aligns seamlessly with the UK's ambition to lead the way in AI.

In a monumental leap towards advancing artificial intelligence (AI) research and innovation, the UK government has chosen Bristol as the home for the groundbreaking AI Research Resource (AIRR), which will soon be known as Isambard-AI. With a substantial £900 million investment commitment, this initiative is set to catapult the South West into the global forefront of AI research and development.

Isambard-AI, named in honour of the legendary engineer Isambard Kingdom Brunel, is poised to emerge as one of the most potent supercomputers, not just in the UK, but among the leading computational hubs in Europe. This powerful AI research facility, slated to open its doors at the National Composites Centre (NCC) in Bristol next year, is primed to make significant strides in the realm of AI. The new facility is destined to become a national resource, fostering collaboration among researchers and industry experts while driving innovation in AI and scientific discovery. Its applications span a wide array of fields, from automating drug discovery to advancing climate research.

Already a burgeoning hub for AI research and scientific computing, Bristol is uniquely positioned to host this ground-breaking supercomputer. The impending installation of the Isambard 3 supercomputer, slated for later this year, will provide crucial support for AI and machine learning research. Adding to this, the University of Bristol already hosts the UKRI Centre for Doctoral Training in Interactive Artificial Intelligence, cementing its status as a leader in AI research. Isambard-AI is envisioned as one of the world's most expansive open AI supercomputers, building upon the University of Bristol's rich legacy of managing cutting-edge computational facilities.

This substantial investment holds the promise of elevating Bristol and the broader West of England to the international stage, solidifying their positions as hotbeds of innovation and collaboration in AI and high-performance computing (HPC).

The National Composites Centre, part of the High Value Manufacturing Catapult, will be the proud host of Isambard-AI. Katherine Bennett, CEO of the High Value Manufacturing Catapult, says, “This investment in Isambard AI is hugely exciting and paves the way for pioneering research with transformational potential.”

In addition to this landmark initiative, the UK is gearing up to host the world's first AI Safety Summit on November 1 and 2. This global gathering will bring together stakeholders from across the world to discuss the risks and rewards of advanced AI systems and chart a course for their responsible development and application.

For us at Pearce IT, Isambard-AI represents an exciting opportunity for collaboration and growth. As AI continues to permeate the IT and telecoms industry, we are excited to see how developments in AI impact technology, and we will closely monitor further developments in AI to find ways to deliver more efficient solutions to your business. We are also eager to hear your thoughts.

Do you love or hate AI?

Is AI diminishing jobs or creating jobs?

There have been lots of developments in the IT and Marketing sector in the last 12 months with the introduction of AI assistants. However, there are roles gaining momentum including prompt engineers, AI content creators, machine learning and deep learning engineers, data scientists, AI chatbot developers, and professionals with model tuning and AI model integration expertise.

There have been worries that AI is going to replace jobs, but currently, there is a need for engineers to support the AI computers.

Upwork is a freelancing platform based in San Francisco that has been monitoring the developing possibilities of AI in business. AI is now the fastest-growing category on Upwork in the first half of 2023, as measured by the total number of individuals hired.

“We’re seeing that businesses are looking for independent professionals on Upwork with expertise in AI tools like ChatGPT, DALL-E, Midjourney, Stable Diffusion, Jasper, and more,” Dave Bottoms, who leads marketplace organisation on Upwork said. “These job posts are up 230% in Q2 2023 compared to Q4 2022.”

There seems to be a love-hate relationship with AI for all types of companies.

 Advantages of AI (job creation):

•             New job roles created by AI

•             Enhanced productivity and efficiency in existing jobs

•             Opportunities for upskilling and reskilling

•             Innovation-driven economy

Disadvantages of AI in the job market:

•             Potential job displacement due to automation

•             Inequality in access to new jobs created by AI

•             Ethical concerns regarding job replacement by machines

 

If used as a tool for brainstorming and improving productivity within companies, then it should be celebrated! However, there is a threat to certain jobs such as copywriting and threats in the education sector due to AI. For example, schools now need to have the tools to check that essays are not being produced by AI.

As some jobs maybe be in decline from AI taking over, there are others appearing, such as prompt engineers and integration expertise.

What do you think about the advancements of AI?

What to look for in an IT services provider

Finding the right IT professionals is crucial in today’s technology-driven world. It’s like finding the perfect recipe for a dish – you want to make sure you have all the right ingredients in the right proportions. Don’t settle for just any IT team. You need professionals who are skilled, experienced, and qualified to handle your specific IT needs. With the right team in place, you can be confident that your systems are secure, reliable, and running smoothly. So, take your time and do your research. Ask for references, check certifications, and don’t be afraid to ask questions. Your IT team is an investment in your business, and a good one will pay off in the long run.

Word-of-mouth recommendations

It's always reassuring to receive a recommendation from someone you trust when searching for a company to work with. Nothing beats having a satisfied customer recommend a company to you - it's the ultimate marketing technique! What's great about these recommendations is that they offer an unbiased opinion of the services provided by the company.

At Pearce IT, we're proud to say that we receive a lot of our new business from word-of-mouth referrals. This is a testament to our excellent track record of providing our customers with outstanding service, and we're delighted that they're happy to recommend us to others.

Experience and qualifications

When choosing an IT services provider, it's crucial to do your research on their credentials and experience. Don't hesitate to enquire about their reputation and current qualifications. Given the fast-paced nature of the IT industry, it's imperative that these companies stay current with the latest advancements. So, be sure to select a provider that demonstrates a commitment to staying up-to-date.

Service levels and response times

Having a dependable service provider is a must for any business. It's essential to choose a provider that's accessible and flexible in case of any issues. When server downtime occurs during working hours, a quick resolution is crucial. Therefore, it's vital to select a service provider that's responsive and easy to contact.

To ensure you make the right choice, it's worth checking out customer service reviews. Google Reviews, Trustpilot, and Facebook Reviews are all great sources to consider. If there's a consistently large number of positive reviews, it's usually a reliable indicator that customers are satisfied and willing to give kudos. So, take the time to do your research and make an informed decision that will benefit your business in the long run.

Understanding your business

Does your IT company understand the needs of your business? At Pearce IT we take time to understand our clients to create bespoke services to fit their company’s needs. The worry is that if your IT company does not understand your business you may end up getting overcharged and overcompensated for extra IT Services you don’t need.

 

Price!

Did you know that bigger support providers can charge up to 25% more? But don't worry, we're a local Gloucestershire Company that values building relationships with our customers and businesses. This is why we offer competitive pricing for our bespoke IT solutions that will seamlessly improve your business operations. Plus, with all your technology needs provided under one roof, you'll save time and money compared to juggling multiple services from different companies. Why not simplify your life and go to an IT one-stop shop?

Our all-in-one IT services provider is easy to handle and will give you peace of mind knowing that your technology needs are taken care of.

If you would like to get in touch to find out more about the IT services we offer, check out our website. Alternatively, you can contact us on 01452 222 000 or hello@pearceit.co.uk

Is your Small Business Cyber secure? And what can happen?

Is your Small Business Cyber secure? And what can happen?

Even if you’re a small business you are still at risk…

Small businesses are 3 times more likely to be attacked by hackers than larger ones.

Barracuda Networks found that employees at small companies saw 350% more social engineering attacks than those at larger ones.

The main attack is Phishing causing over 80% of breaches.

 

A local example is in fact the Gloucestershire County Council.

What was the cyber-attack on Gloucester City Council?

The initial cyber-attack took place in December 2021

 

Benefit payments, planning applications and house sales were all delayed when Gloucester City Council was hit by hackers in 2021. A council report has now revealed the Museum of Gloucester is still being affected by the cyber incident.

In fact, in 2022 it was released that Gloucestershire is one of the least cyber-secure counties in the southwest.

Gloucestershire has been named as one of the least cyber-secure counties in the southwest, with over 24,000 cyber-attacks in the last 12 months.

Gloucestershire fell victim to 24,472 cyber-attacks in 2022 with 23,570 of those aimed at micro to small businesses and 903 aimed at medium to large businesses in the county.

The issues we often come across with Cyber security :

Small companies spend less on Cyber security as they juggle expenses. An antivirus programme isn’t enough to over your business. Even small businesses now store data on the cloud so the antivirus application on your computer is just one small layer. You need several more for adequate security measures.

“But it’s only me that runs the business why would they hack my company?”

If you have customers, you hold data such as Credit card numbers, SSNs, tax ID numbers, and email addresses are all valuable. Cybercriminals can sell these on the Dark Web. From there, other criminals use them for identity theft.

Some examples of data they are after are:

•             Customer records

•             Employee records

•             Bank account information

•             Emails and passwords

•             Payment card details

 

Small businesses can also be a way of access to larger businesses as we all have our wider connections in one way or another. Whether it is through digital marketing services they offer to larger companies, accounting services, or website management.

Often, we find that small businesses are just very unprepared for ransomware attacks. In 2022 about 63% of small business owners actually paid the ransom hoping they would get the key to decrypt the malware from the attackers. But this often either significantly and financially hits the business back or makes them bankrupt.

If you are a small business that is run by employees, you often won’t have time or money to train the employee in cybersecurity procedures. This is where phishing emails often catch out businesses as their employees open them without the correct training knowing what to spot.

Simple procedures such as not clicking links that aren’t trusted or password best practices are simple steps that are sometimes missed in training procedures.

We hope that we have outlined the threats that can arise for your business, and so that we can help you avoid these. We offer an all-in-one IT service consultancy to improve your business’ security to accompany your IT support and disaster prevention.

If you are concerned if your business is safe from cyber-attacks, get in touch and we can create a security and disaster prevention plan, ensuring all your hardware and data are safe. Call us on 01452 222 000 or email us at hello@pearceit.co.uk.

Why do I need 2FA?

Passwords have been the traditional form of account security from around the early 90s, however having one singular method of protection on its own is often inadequate.

Many people still choose to use publicly available information about themselves in part of their password. Information like this can often be found on public social media pages or gathered through methods like innocuous looking online quizzes. Are you guilty of using a pet’s name or an old family name as your password?

Because we all increasingly live our lives online, many people have tens - or even hundreds - of accounts. With different combinations of security and password information, it can be difficult to keep track without dedicated software assistance. The daunting task of tracking all this information means people often resort to using one password for multiple accounts. If someone with bad intentions finds this information, they might have access to a greater and more damaging number of accounts than they would otherwise.

There are a few tried and tested methods of making a password more secure. Making them longer and substituting with special characters can lower the risk your password can be guessed by someone. No matter how secure your password is though, it does little to defend against data leaks or sophisticated cyber-attacks on the services that hold your information. Computer Weekly estimated there were approximately 878 million data records breached in January of 2021 alone.

A better failsafe option, that we like to advocate for, is implementing two-factor authentication, often abbreviated as 2FA. 2FA is being increasingly deployed by organisations that hold sensitive information to stop accounts being accessed in the event of a data breach.

In short, 2FA is an extra layer of protection used to confirm the identity of anyone attempting to access an online account. Most types of 2FA fall into one of three categories;

Information

  • An extra question at time of login, usually regarding personal information or answers to secret questions

  • A PIN number

An item

  • A physical item the owner of the account has in their possession.

  • A smartphone, to which a verification code is sent

  • A fob, like those commonly used for online banking

You

  • Biometric security, checking something physically about the person attempting access

  • Fingerprints

  • Iris scan

  • Voice print

These methods can provide a much greater level of security for your accounts than using passwords alone. A growing number of organisations, especially those dealing directly with finances, like online banks or cryptocurrency traders, are implementing some form of two-factor authentication for the invaluable protection it can provide.

There are a variety of tools and methods for employing 2FA, like SMS text codes or software tokens via an app installed on your mobile or desktop. The security benefits mean it’s always worth talking through which options can be effectively implemented. If you want some help deciding the best method for you and your business, contact Pearce IT today, call 01452 222000.

Is your business prepared for the analogue switch off?

Analogue signals and digital signals are both forms of communication that are used to transmit and receive data. Originally, most businesses used analogue signals, but in the modern age, digital signals were developed and became faster and more efficient in carrying information, mitigating data loss during transmission and ensuring transmitted data is accurate.

 

Before the end of 2025, the UK will switch off analogue services for phone lines. This is because analogue equipment is expensive, difficult to maintain and inaccessible compared to digital equipment. It's most likely that your business is using digital lines already for phone communication, but many other functions such as security systems, fire alarms, CCTV and card payment systems may be using an analogue line and could potentially stop working when the analogue services are retired in 2025.

 

If all this sounds confusing or you want to check that your services need to be switched over to digital before the analogue switch off, get in touch with Pearce IT today. Call us on 01452 222 000 or email us at hello@pearceit.co.uk. We are currently offering a free business telecoms review, so contact us to find out more.

Were you affected by the 3CX security threat?

On Wednesday 29th March, 3CX Phone System suffered a security incident where a third party exploited a vulnerability in 3CX products.

If you have been affected we can help!

Get in touch to find out more!

01452 222 000

Since the attack, 3CX have declared that they will be open and transparent in sharing details of the attack and taking action to ensure this will not happen again.

You can read more about 3CX's statement here: https://www.3cx.com/blog/news/security-incident-updates/

In short, 3CX recommends several steps for its users to take to ensure the security of their data and devices:

1. Uninstall the 3CX Electron Desktop Application from all Windows or Mac OS systems.

2. Continue AV scans and EDR solutioning for malware in your organisation's networks.

3. Until further notice, use the PWA Web Client rather than the Desktop App.

4. Subscribe to 3CX's RSS feed where they will provide regular updates to this incident

5. Follow 3CX on social media for updates and security alerts in the future

6. Use 3CX's dedicated support forum if you have any queries or concerns relating to this incident.

 

In appreciation for their customers' and partners' support, 3CX are extending all customers' subscriptions by 3 months, free of charge. Details of this extension will be provided in an email to all customers.

If you are concerned about the security of your devices, get in touch with us for a review of your telecoms and security.

Do your staff members use ChatGPT?

A recent emerging technology in the IT industry is the increasing use of artificial intelligence (AI). For the past few decades, competent, reliable AI has only been a figment of science fiction, but with the recent release of ChatGPT, a model launched by OpenAI in November of 2022, AI has suddenly become much more powerful and accessible to everyone.

The launch of ChatGPT has the potential to revolutionise a vast range of industries by improving productivity. One such example of a way in which ChatGPT can support a business is through customer support. Many companies including Nike and eBay have deployed AI-enabled chatbots to improve the customer experience by instantly answering frequently asked questions in easy-to-understand terms. Using AI in this way can help companies reduce costs and provide a more consistent customer experience especially in industries such as financial services and e-commerce.

However, many people are concerned about industries' increasing reliance on AI models such as ChatGPT. One such reason for this is that it may put many people out of jobs that can easily be allocated to ChatGPT and completed far more effectively and efficiently than a human ever could.

Another major point of concern in the IT industry particularly is how AI could be used in harmful ways. For example, programming them with bias to produce harmful, deceptive or misinformative content.

There are also significant concerns about potential cybersecurity threats that are posed by these technologies, as attackers could potentially exploit weaknesses in security systems using AI.

One of the biggest risks associated with ChatGPT is the exposure of sensitive information. ChatGPT is trained on vast amounts of data, including proprietary information, personal identifiable information (PII), and intellectual property. Once this information is inputted into the system, it becomes part of its knowledge bank and could potentially appear in other people’s answers.

To minimise these risks, companies must implement strong security protocols and guidelines for the use of ChatGPT at work. This includes clearly defining what types of information can and cannot be inputted into the system, ensuring that all data is encrypted both in transit and at rest, and limiting access to the technology to only those who need it.

As technologies such as ChatGPT continue to advance and improve in efficiency every day, it is important to consider the potential risks and take proactive steps such as extensive testing and guidelines to ensure that new technology is developed and used in a safe and ethical manner, to enable us to reap the benefits of AI, while staying wary of potential threats.

What do you think about the new emergence of Chat GPT and OpenAI?

If you have any concerns on this subject within your business don’t hesitate to contact us!

Call or Email us at 01452 222 000 | hello@pearceit.co.uk