St Christopher’s Hospice – Silver Business Partner 2017

We were very pleased to hear this morning, that we have been recognised as a Silver Business Partner to St Christopher’s Hospice Charity.

The Redinet team have been involved in several fundraising events this year to help raise money to support this fantastic charity. The fundraising events have included team bake-off’s, a Cyclothon endurance race around the Brands Hatch race course and a Christmas raffle. We’re delighted to know that our support helps St Christopher’s to continue providing specialist palliative care and family care services.

We look forward to supporting them further in the New Year.

Crown Commercial Service Supplier Announcement

Redinet are delighted to announce that we have been awarded a place on the Crown Commercial Service’s Technology Services 2 framework.

The new framework allows public sector organisations to access an accredited list of suppliers and enables them to achieve maximum commercial value when procuring common goods and services.

Within the Technology Services 2 framework, we have achieved:

Lot 3 – Operational Services

The services, processes and tools needed to manage the provisioning, capacity, performance, security and availability of the technology environment.

3a: End User Services

3b: Operation Management

3c: Technical Management

Managing Director, Gareth Cameron comments “Inclusion on Technology Services 2 demonstrates the high quality of managed services that we offer our public sector partners and assures them of the high standards we maintain.  With our continued investment in our public sector offering, including our earlier enrolment onto the G-cloud 9 framework, we’re looking forward to continuing to provide cost effective IT services in this area.”

For further information on our services, please contact a member of our team: or call: 020 8249 7000

New Telephony Services!

Image result for gamma horizonWe are pleased to announce that we will now be offering telephony as a service.

We have chosen to partner with Gamma who offer a complete communications service ‘Horizon’. The service provides an extensive range of fixed and mobile telephony capabilities via an easy-to-use web portal. The service allows you, the administrator, to easily manage your environment whilst enabling your employees to maximise their productivity. You can quickly configure the system according to your organisation’s changing requirements, while your employees can manage calls easily and effectively.

The benefits of Horizon:

  • Features you can easily control
    • Complete control of your phone system and an extensive range of call handling and management features, all operated through an easy-to-use web interface.
  • Empower your staff with ‘one number anywhere’
    • Callers need only dial one number to reach your desk phone and mobile phone simultaneously; ongoing calls can be moved seamlessly from one device to another without hanging up and a single voicemail box can be accessed from any device.
  • An on-demand service with no hidden costs
    • As Horizon is hosted on your behalf, you only pay for what you need on a simple per-seat basis. As you’re not buying a PBX, there’s no major hardware investment and no financing costs to consider.
  • Lower call costs
    • Horizon offers all the cost benefits of IP telephony including free site-to-site calls and cheaper call rates.
  • Enables flexible working
    • Businesses can become more efficient by enabling flexible work environments through hot-desking, home working, and extending the service to mobile devices.
  • Number choice
    • You have total flexibility with the numbers you want to use. Extend your business reach and use any local area number no matter where you are located. I.e. you could chose to have a London number even if you were based in Leeds.
  • A business continuity solution
    • Unexpected events won’t disrupt your business. Because Horizon sits in the cloud, the service provides business continuity features that allow your organisation to carry on making and taking calls, whatever the circumstances.

G-Cloud 9 Agreement

Image result for g-cloud 9 supplierRedinet are pleased to announce that we have been awarded a place on the G-Cloud 9 agreement for the following services:

  • Software as a Service
  • Specialist Cloud Services
  • Infrastructure as a Service

G-Cloud 9 is the latest version of the framework agreement from the Crown Commercial Service (CCS) which supports the Government’s policy to manage the procurement of services and goods.

The G-Cloud framework can be used by organisations in the UK public sector such as; government, health, education, emergency services and not-for-profit organisations.

We are pleased that our accreditation on the agreement has continued from our previous G-Cloud 8 status and look forward to continuing our work in this space.

How to Protect Against Ransomware

Image result for ransomwareThe NHS has suffered a major cyber-attack that hit hospitals across the country, leading to patients being turned away from A&E.

The attack used a form of ransomware and targeted thousands of organisations in as many as 74 countries. Ransomware is a kind of cyber-attack that involves hackers taking control of a computer or mobile device and demanding payment.

Much like malware and viruses, ransomware can get onto your PC from nearly any source.

Below are some actions you can take to protect yourself from ransomware:

  • Beware of malicious websites, look at the logo, colours, is there anything suspicious about this website?
  • Opening emails and email attachments from people you don’t know, or that you weren’t expecting. If you’re unsure of the content, do not open it.
  • Clicking onto malicious links on social media sites such as; Facebook, Twitter, Instant Messenger chats such as Skype.
  • Often fake emails and webpages have bad spelling, or just look unusual. Look out for strange spelling and punctuation in company names/email addresses.
  • Ensure that no data is stored on your PC only, make sure that data is stored in a central server based location and backed up to external devices/cloud providers regularly. Data should be backed up daily, where possible. Your backups should also be checked and tested regularly.
  • Ensure that you have the latest Operating System (PC or Server) or at the very least having an Operating System which is supported by the supplier, and has security updates applied. Ideally, your OS should be Windows 7 or above.
  • Anti-Virus products are at the latest levels and frequently updated.
  • Users should only have access to the files that they need, ensure that permissions are set correctly.

If you would like to discuss ransomware and cyber-attacks further, please feel free to contact a member of our team on: 020 8249 7000

GDPR – Top Tips

Image result for gdprGDPR was introduced in April 2016 with a 2 year transition period, due to commence in May 2018. The new EU ‘General Data Protection Regulation’ has set new standards and rules for how consumer data can be used. The consequences of ignoring the new data security procedures, can result in serious fines. If your company has its data breached – it can expect fines of up to 20 million Euros or 4% of its global annual turnover.

We can help your organisation to prepare for GDPR by ensuring that your company has a secure IT setup, data storage, security solutions and ongoing managed IT support. Read on for our top tips on preparing for the new regulation:

  • Train and test your users. Phishing attacks are becoming more common than ever – it is important that your staff are trained on security awareness, to help identify a phishing attack.
  • Protecting the server is not secure enough, you also need to consider;
    1. A well configured firewall
    2. Endpoint security software
    3. APT Blocker (to protect against advanced threats, such as Ransomware)
  • Ensure staff have strong passwords – a minimum of 12 characters, a combination of numbers, symbols, capital letters and lowercase letters. Try not to use dictionary words also.
  • Have a detailed plan in the event of a data breach, what steps you will take as a response.
  • Test for vulnerabilities with regular scans

If you would like to speak with one of our team about this new regulation, please contact a member of our team on: or call 020 8249 7000

Redinet have been awarded a place on the G-Cloud 8 Agreement

Redinet are pleased to advise that we have been awarded a place on the G-Cloud 8 agreement for the following services: Software as a Service, Specialist Cloud Services and Infrastructure as a Service.

Image result for g-cloud 8G-Cloud 8 is a framework agreement between the government and supplier from which public sector organisations can invest in services without needing to run through a full tender or procurement process.

We as a supplier, must be of a certain standard of proficiency and economic credibility as well as be able to offer our customers contractual safeguards to be listed within the agreement.

Sales Director, Colin Bridle comments “We are very pleased with our recent inclusion in the G-Cloud framework, alongside our ISO 27001 accreditation.  Our IaaS, SaaS and Specialist Cloud Services offerings are ideal to expedite the process of using cloud services for government organisations and we are excited about the opportunity to start working in this space.”

Hackers Predicted to Take Ransomware to the Next Level in 2017

The arrival of new methods of Ransomware such as Locky and Cryptowall has caused experts to title 2016 as the year of ransomware. Professionals are now predicting that ransomware will continue to grow in sophistication in 2017.

Image result for ransomwareA recent CSO online article featured predictions on what to expect from ransomware in 2017. In the article, Watchguard CTO, Corey Nachreiner, predicts that 2017 will see the first ever ‘ransomworm’ causing ransomware to spread even faster:

“Years ago, network worms like CodeRed, SQL Slammer, and more recently, Conficker were pretty common. Hackers exploited network vulnerabilities and tricks to make malware automatically spread itself over networks. Now, imagine ransomware attached to a network worm. After infecting one victim, it would tirelessly copy itself to every computer on your local network it could reach. Whether or not you want to imagine such a scenario, I guarantee that cyber criminals are already thinking about it.”

Read more about ransomworm in the full article here.

Stay Safe Online this Christmas

With Christmas being one of the busiest times of the year for online shopping – Cyber criminals are taking advantage of this and looking for their next online victim.

Below are some helpful tips to help you stay protected online this year:

Image result for christmas online shopping1. If you receive an email from a shop you don’t know or trust, do not open the email or any attachments that may have been include

2. Don’t click onto any Phishing links that may be sent to you via text message or SMS app

3. Make sure your passwords are complex – a minimum of 12 characters and do not contain any dictionary words

4. When you are buying gifts online using your mobile phone, before inputting your payment details, ensure you switch your phone to cellular

5. Ensure that when you are in a public place, do not use public WiFi to make payments online

The CEO Email Scam

CEO email attacks are becoming very well known now and there have been numerous recent cases reported in the media.

The emails are clearly being produced manually,  by individuals who are probably using Social Media to track when suitably high level persons within a department are away on holiday or otherwise. They are not automated attacks, but a manual, intelligent attack by a person doing a fair amount of research on the company. They will often find out the CEO’s name, email address and the names and email addresses of key people within the company. The CEO email is the key to this scam, it adds authenticity and authorisation to the fraudulent email.

So what do the attackers usually include in the email? The basic premise of the scam is where the attacker sends an email, pretending to be the CEO of the company or a high level person and requests sensitive information or money transfers. Attackers are known to fully interact with the targeted staff member with multiple emails flying back and forth before the scam is completed.

We work with providers such as Mimecast who are able to offer CEO protect services, TTP and URL protect. Please get in touch with us to find out how we can help to protect you and your business against CEO email scams.