Emily Barrett

St Christopher’s Hospice – Silver Business Partner 2017

We were very pleased to hear this morning, that we have been recognised as a Silver Business Partner to St Christopher’s Hospice Charity.

The Redinet team have been involved in several fundraising events this year to help raise money to support this fantastic charity. The fundraising events have included team bake-off’s, a Cyclothon endurance race around the Brands Hatch race course and a Christmas raffle. We’re delighted to know that our support helps St Christopher’s to continue providing specialist palliative care and family care services.

We look forward to supporting them further in the New Year.

Crown Commercial Service Supplier Announcement

Redinet are delighted to announce that we have been awarded a place on the Crown Commercial Service’s Technology Services 2 framework.

The new framework allows public sector organisations to access an accredited list of suppliers and enables them to achieve maximum commercial value when procuring common goods and services.

Within the Technology Services 2 framework, we have achieved:

Lot 3 – Operational Services

The services, processes and tools needed to manage the provisioning, capacity, performance, security and availability of the technology environment.

3a: End User Services

3b: Operation Management

3c: Technical Management

Managing Director, Gareth Cameron comments “Inclusion on Technology Services 2 demonstrates the high quality of managed services that we offer our public sector partners and assures them of the high standards we maintain.  With our continued investment in our public sector offering, including our earlier enrolment onto the G-cloud 9 framework, we’re looking forward to continuing to provide cost effective IT services in this area.”

For further information on our services, please contact a member of our team: sales@redinet.co.uk or call: 020 8249 7000

New Telephony Services!

Image result for gamma horizonWe are pleased to announce that we will now be offering telephony as a service.

We have chosen to partner with Gamma who offer a complete communications service ‘Horizon’. The service provides an extensive range of fixed and mobile telephony capabilities via an easy-to-use web portal. The service allows you, the administrator, to easily manage your environment whilst enabling your employees to maximise their productivity. You can quickly configure the system according to your organisation’s changing requirements, while your employees can manage calls easily and effectively.

The benefits of Horizon:

  • Features you can easily control
    • Complete control of your phone system and an extensive range of call handling and management features, all operated through an easy-to-use web interface.
  • Empower your staff with ‘one number anywhere’
    • Callers need only dial one number to reach your desk phone and mobile phone simultaneously; ongoing calls can be moved seamlessly from one device to another without hanging up and a single voicemail box can be accessed from any device.
  • An on-demand service with no hidden costs
    • As Horizon is hosted on your behalf, you only pay for what you need on a simple per-seat basis. As you’re not buying a PBX, there’s no major hardware investment and no financing costs to consider.
  • Lower call costs
    • Horizon offers all the cost benefits of IP telephony including free site-to-site calls and cheaper call rates.
  • Enables flexible working
    • Businesses can become more efficient by enabling flexible work environments through hot-desking, home working, and extending the service to mobile devices.
  • Number choice
    • You have total flexibility with the numbers you want to use. Extend your business reach and use any local area number no matter where you are located. I.e. you could chose to have a London number even if you were based in Leeds.
  • A business continuity solution
    • Unexpected events won’t disrupt your business. Because Horizon sits in the cloud, the service provides business continuity features that allow your organisation to carry on making and taking calls, whatever the circumstances.

G-Cloud 9 Agreement

Image result for g-cloud 9 supplierRedinet are pleased to announce that we have been awarded a place on the G-Cloud 9 agreement for the following services:

  • Software as a Service
  • Specialist Cloud Services
  • Infrastructure as a Service

G-Cloud 9 is the latest version of the framework agreement from the Crown Commercial Service (CCS) which supports the Government’s policy to manage the procurement of services and goods.

The G-Cloud framework can be used by organisations in the UK public sector such as; government, health, education, emergency services and not-for-profit organisations.

We are pleased that our accreditation on the agreement has continued from our previous G-Cloud 8 status and look forward to continuing our work in this space.

How to Protect Against Ransomware

Image result for ransomwareThe NHS has suffered a major cyber-attack that hit hospitals across the country, leading to patients being turned away from A&E.

The attack used a form of ransomware and targeted thousands of organisations in as many as 74 countries. Ransomware is a kind of cyber-attack that involves hackers taking control of a computer or mobile device and demanding payment.

Much like malware and viruses, ransomware can get onto your PC from nearly any source.

Below are some actions you can take to protect yourself from ransomware:

  • Beware of malicious websites, look at the logo, colours, is there anything suspicious about this website?
  • Opening emails and email attachments from people you don’t know, or that you weren’t expecting. If you’re unsure of the content, do not open it.
  • Clicking onto malicious links on social media sites such as; Facebook, Twitter, Instant Messenger chats such as Skype.
  • Often fake emails and webpages have bad spelling, or just look unusual. Look out for strange spelling and punctuation in company names/email addresses.
  • Ensure that no data is stored on your PC only, make sure that data is stored in a central server based location and backed up to external devices/cloud providers regularly. Data should be backed up daily, where possible. Your backups should also be checked and tested regularly.
  • Ensure that you have the latest Operating System (PC or Server) or at the very least having an Operating System which is supported by the supplier, and has security updates applied. Ideally, your OS should be Windows 7 or above.
  • Anti-Virus products are at the latest levels and frequently updated.
  • Users should only have access to the files that they need, ensure that permissions are set correctly.

If you would like to discuss ransomware and cyber-attacks further, please feel free to contact a member of our team on: 020 8249 7000

Redinet have been awarded a place on the G-Cloud 8 Agreement

Redinet are pleased to advise that we have been awarded a place on the G-Cloud 8 agreement for the following services: Software as a Service, Specialist Cloud Services and Infrastructure as a Service.

Image result for g-cloud 8G-Cloud 8 is a framework agreement between the government and supplier from which public sector organisations can invest in services without needing to run through a full tender or procurement process.

We as a supplier, must be of a certain standard of proficiency and economic credibility as well as be able to offer our customers contractual safeguards to be listed within the agreement.

Sales Director, Colin Bridle comments “We are very pleased with our recent inclusion in the G-Cloud framework, alongside our ISO 27001 accreditation.  Our IaaS, SaaS and Specialist Cloud Services offerings are ideal to expedite the process of using cloud services for government organisations and we are excited about the opportunity to start working in this space.”

Stay Safe Online this Christmas

With Christmas being one of the busiest times of the year for online shopping – Cyber criminals are taking advantage of this and looking for their next online victim.

Below are some helpful tips to help you stay protected online this year:

Image result for christmas online shopping1. If you receive an email from a shop you don’t know or trust, do not open the email or any attachments that may have been include

2. Don’t click onto any Phishing links that may be sent to you via text message or SMS app

3. Make sure your passwords are complex – a minimum of 12 characters and do not contain any dictionary words

4. When you are buying gifts online using your mobile phone, before inputting your payment details, ensure you switch your phone to cellular

5. Ensure that when you are in a public place, do not use public WiFi to make payments online

The Risks of Using a Public Wifi Hotspot

If you are accessing an insecure WiFi in a public place, you may be allowing unauthorised people to intercept what you are doing online. Your passwords, emails and personal information could be at risk.

Image result for public wifi hotspotsThis can happen if the WiFi connection is not encrypted or if someone has set up a fake hotspot which persuades you to believe it is the legitimate one.

You can tell that you are on a secure connection if the WiFi asks you to add in a ‘key’. Even by logging onto a internet access page within a hotel or cafe does not guarantee that the connection is encrypted.

Unless you are using a secure WiFi you should not send or receive private information when using public WiFi. Where possible, try to use commercial hotspots such as BT OpenZone or T-Mobile.


How to Create a Strong Password

With security breaches on the rise, it is crucial that you protect yourself from hackers by creating a strong password.

Image result for strong passwordThe below recommendations are key to creating a good and memorable password:

1) Try to make the password a minimum of 12 characters. Ideally, the password should be even longer than this but try to keep 12 characters as your absolute minimum.
2) By including a different combination of numbers, symbols, capital letters and lower case letters it will make your password harder to crack.
3) Try to not use dictionary words or a combination of dictionary words. For example, ‘house’ is a terrible password  or ‘red house’ is also bad.
4) Make sure that your password is not an obvious choice for you. For example, don’t use a family members name or your date of birth as this is easily guessable.


How to Recognise Phishing

Phishing can come in the form of email messages, websites or phone calls – they can email you, call you or convince you to download something from a website. All of these methods are designed to steal money.

Image result for phishing

Cyber criminals will often install malicious software onto your computer or steal personal information from you, so it is crucial to know what to look out for:

  • Spelling and bad grammar. Professional companies will often have staff or copy writers who would not allow a mass email to be sent with spelling errors.
  • Beware of links in emails. If you see a link in a suspicious email message, ensure that you hover over the link first (without clicking) and check to see if the hover text matches that of the link.
  • Threats. Cyber criminals will often use threats that your security has been compromised in order for you to action the email / phone call.
  • Spoof websites. Be aware of any fraudulent websites – website addresses that resemble names of well known companies but are slightly altered.

For further information, please feel free to get in touch with our of our cyber security experts: 020 8249 7000