<![CDATA[Blog]]> https://www.thesilvercloudbusiness.com/blog/rss Our Blog en Mon, 15 Dec 2025 00:06:13 +0000 Did you know we now do phone systems? https://www.thesilvercloudbusiness.com/blog/did-you-know-we-now-do-phone-systems https://www.thesilvercloudbusiness.com/blog/did-you-know-we-now-do-phone-systems <p><strong>Cloud telephony system</strong></p> <p>As we approach the new year, we have decided to bite the bullet and expand our technology portfolio to include directly selling telephone systems so that we can sell reliable, low-cost telephony solutions to our customers instead of reselling someone else's offering, and because of this, we won’t tie you into excessively long contract terms, unlike other companies that are contractually bound to resell services at the suppliers terms.  </p> <p>We have put together a flexible platform using one of the industry leading cloud PBX (phone system) solutions, coupled with programmable handsets, both wired and wireless, and soft phones that can installed on computers and mobiles and be used anywhere, allowing businesses to have flexible communications both in and away from the office.</p> <p><strong>Why have we decided to do this?</strong></p> <p>The primary reason we have decided to provide our clients with telephony solutions is to cut out the 3rd party suppliers that can cause delay and issue because we were stuck in the middle, brokering support issues on behalf of our clients. </p> <p>By bringing it in house, we can support the solution directly, without having to broker support to a 3rd party supplier, we support and maintain the phone system directly for our clients, meaning we can make changes and updates for our clients without having to wait on others.  We manage it directly. </p> <p><strong>Would we use it ourselves?</strong> </p> <p>Yes, absolutely, in fact we already do.  We wanted to change our phone system, our old system, although good, was far too complicated, difficult to use and whilst it could do what we needed, it was very easy to break if we got any of the settings even slightly wrong. </p> <p>What is more, we were relying on a supplier to support it, we were at the mercy of their internal service level agreements, so if we had a problem, we would go into a queue and have to wait for it to be resolved. </p> <p>We don't like that. which is why we decided to find a solution we could support ourselves, one that had comprehensive functionality without it being so complicated that we would need to send people on weeks of training just to master the basics.  </p> <p>So we found a solution, one that is so good, and so comprehensive that we adopted it for ourselves and use it as our business phone system. </p> <p>And because we love the functionality so much and that we can comprehensively support it, we decided it was time to share it with you, our clients, to benefit from the same flexible, work anywhere phone system that we use.</p> <p><strong>How does it work?</strong></p> <p>I will try to put this in easy to understand terms.  For years telephony remained the same, it is only until recently that it has changed how it works.  Here is the boring potted history lesson, you can skip it if you want to but here goes... </p> <p><strong>In the past</strong>, telephony was pretty basic, for decades we used to rely on PSTN (public switched telephone networks), it was typically 1 phone number on one copper wire if you were a house.  If you wanted a second line they would string a second bit of wire.  For businesses they could use ISDN (Integrated Services Digital Network) lines, with two types on offer.  Either ISDN-2 or ISDN-30 lines. </p> <p>An ISDN-2 line could support 2 numbers and an ISDN-30 line could support up to 30 numbers. </p> <p>If you needed 5 numbers, you could get 3 x ISDN-2 lines into your office and connect them to your office PBX (private branch exchange) phone system. </p> <p>If you needed 100 lines, you would get 4 x ISDN-30 lines (you could have 3 x ISDN-30 + 5 x ISDN-2 to get to 100 but this would be constrained, typically you would have 4 x ISDN-30 to provide you with capacity for growth to flex up to 120 lines if needed).</p> <p>The PBX is the office switch board that allows you to transfer calls and make calls internally.  You can make as many internal (extension to extension) calls as you wanted concurrently, but inbound and outbound numbers are limited to the number of lines you had going into your PBX.  A company could have 100 staff but only 5 inbound / outbound lines so only 5 concurrent phone calls could me made either to or from the company at any one time.</p> <p><strong>Fast forward to modern times</strong>, as telephony and VoIP (voice over internet protocol) was introduced.  This allowed voice calls to be made over a computer network and made it easier to have more flexible phone solutions because of the internet protocol part of the VoIP name.  It meant you could use computer networks to connect your handset to the back end phone system.</p> <p>In conjunction with VoIP we also have SIP (session initiated protocol).  SIP is the protocol that is used to initiate, modify, and terminate communication sessions.  It is the layer that allows you to establish a telephone network, it is where you assign phone numbers and concurrent lines to a system and VoIP is your voice sitting on top of it when you make a call.  It is a bit like the old fashioned physical cable that used to run from the exchange to your handset, but it builds this connection virtually, over the top of the computer network, removing the need for physical connections.</p> <p>With the combination of VoIP, SIP and cloud based phone systems, it is now possible to have a phone solution for your business that gives you all the advantages of your own internal phone switch without needing a physical bit of hardware to run your phones, or physical wires from the exchange to your office. </p> <p>It lets you work anywhere, so long as your have an internet connection because it uses the internet to establish the connection between the cloud PBX and the handsets. </p> <p><strong>Our cloud PBX solution</strong></p> <p>Our solution leverages this, we use SIP trunks for hosting the numbers used in the business and we add one SIP channel to the trunk for each concurrent call that the business requires.  Think of it like this, one SIP channel = 1 phone line that can be used for inbound and outbound calls.</p> <p>If you business needs the ability to make or receive 4 concurrent calls, it would need 4 SIP channels.</p> <p>Every SIP channel we add to a phone solution includes a bundle of 2000 minutes each month that can be used for calling UK geographic numbers and UK mobile numbers.  </p> <p>You only need SIP channels for the number of concurrent calls you make, not the number of staff you have using the solution.</p> <p>Four concurrent lines would require four SIP channels, each having a call bundle so the business would get a shared pool of 8000 inclusive minutes to use that month by all of the users in the business.  The pool of minutes are shared across all extensions, rather than it being 2000 per channel, so if one person is making a LOT of calls, they could use the lions share of the pool without incurring additional costs.</p> <p>Our packages are very competitive as well, in fact we are confident we can beat your existing supplier and we aren't like other telephony providers that try to lock you into seven year contracts. </p> <p>We are different, our telephony contracts start at 12 month duration with the option of a 24 month contract with a call bundle discount.  We can do longer contracts with bigger savings, we just won't force you to!</p> <p>Our phone solution supports multiple inbound numbers, direct dial and geographic and non-geographic numbers, as well as freephone and premium rate lines.</p> <p>Our phone solution allows you to have:</p> <ul> <li>Desk phones - physical telephone handset extensions on the desk</li> <li>Wireless phones - physical portable wireless telephone that connects to the phone system over WiFi</li> <li>Soft phones - software application on your mobile or computer that is a virtual phone extension of the phone system</li> <li>Call recording </li> <li>System attendant (press 1 for sales, press 2 for accounts etc...)</li> <li>Voicemail with voicemail to email option</li> <li>Conference calling</li> <li>Geographic and non-geographic numbers</li> <li>Freephone and premium rate numbers</li> <li>Call routing and hunt groups</li> <li>Reporting and analytics</li> <li>Security and compliance</li> <li>Microsoft 365 integration</li> <li>Plus many more enterprise features, whatever your phone system can do, we are confident ours can as well</li> </ul> <p>If you would like more information or you would like to see it in action, call us on <strong>01722 411 999</strong> and we can show you how it works, how easy it is to use and provide you with a quote to see if we can beat your current phone system contract.</p> <p>We love our phone solution, it is feature rich, yet simple to use, and we are sure you and your staff will love it also.</p> Wed, 10 Dec 2025 00:00:00 +0000 Christmas is a time of giving, but don't accidentally give away too much! https://www.thesilvercloudbusiness.com/blog/christmas-is-a-time-of-giving-but-dont-accidently-give-too-much https://www.thesilvercloudbusiness.com/blog/christmas-is-a-time-of-giving-but-dont-accidently-give-too-much <p>I don't want to sound like the Grinch with the title of this article when I say don't give too much this Christmas, so let me explain a bit further.</p> <p>Christmas is a time of giving and more people are using electronic cards and email to send Christmas messages, which makes it a prime time for cyber attacks as hackers take advantage of this time of goodwill.  They are banking on the fact that people will be more willing to open emails, click on links and accidently infect their machines. </p> <p><strong>Remember, cyber criminals will be as active as Santa over the Christmas period so be careful.</strong></p> <p>They will use social engineering to find out people's contacts in various social networks, often focussing on old contacts that have not been in touch for a while, hoping it makes the recipient want to spark up a connection and open the email, or attachment, or click on a link.  They will use multiple ways of trying to compromise your security, they don't care about being on Santa's naughty list!</p> <p>So here are a few top tips for staying safe this Christmas:</p> <ol> <li><strong>Beware the ‘Phishmas’ grinches</strong> - Not every Christmas email brings good tidings! Cyber scammers dress up their messages to look like trusted retailers or even “Santa’s Helpers.” Watch out for suspicious links, odd greetings, and spelling that’s more tangled than a box of old fairy lights. Never click unless you’re sure it’s safe—don’t let phishing spoil your holiday spirit</li> <li><strong>Shop like a wise Elf</strong> - Stick to well-known online shops when searching for that perfect gift. Make sure you see a padlock (🔒) and ‘<strong>https</strong>’ in your browser—your clue that it’s safe to enter payment details. And remember: public Wi-Fi is for carols, not for shopping! Save your online purchases for your secure home connection rather than a public Wi-Fi hotspot, there are often fake hotspots (called an <strong>evil twin</strong>) that hackers use to intercept your details</li> <li><strong>Don’t let fake deliveries steal Christmas</strong> - With sleighfuls of parcels en route, you might get texts about deliveries. But beware: cyber crooks send fake notifications with naughty links. If in doubt, dash directly to the official delivery website or app to check your parcel’s journey - no reindeer required</li> <li><strong>Social Media: Watch out for festive fakes</strong> - Not every festive competition or charity appeal is real, even if it comes with cute reindeer emojis. Don’t overshare or click on links from unknown sources. Spread holiday cheer, not your personal info</li> <li><strong>Trust Your Festive Instincts</strong> - If a Christmas offer seems too sparkly to be true, or you get a message that gives you the holiday heebie-jeebies, pause! Double-check before you act, and don’t let the Christmas rush jingle-bell your judgement</li> <li><strong>Give Your Devices the Gift of Updates</strong> - Update your computer(s), phone(s), tablet(s) and apps so they’re wrapped up tight against cyber threats. Turn on automatic updates and let your devices become as secure as Santa’s workshop</li> </ol> <p><strong>Wishing You a Safe & Merry Christmas</strong></p> <p>By following these festive tips, you can sleigh the cyber criminals and enjoy a Christmas filled with joy, laughter, and peace of mind.</p> <p>Share the good word with friends and family, and have the happiest—and safest— techie Christmas ever.</p> <p>If you want help with any of the tips, call us on <strong>01722 411 999</strong> and we will be your jolly little helpers.</p> Wed, 03 Dec 2025 00:00:00 +0000 Christmas Opening Hours https://www.thesilvercloudbusiness.com/blog/christmas-opening-hours https://www.thesilvercloudbusiness.com/blog/christmas-opening-hours <p>Our Christmas opening hours are:</p> <ul> <li>Mon 22nd Dec 8:30 - 17:30</li> <li>Tue 23rd Dec  8:30 - 17:30</li> <li>Wed 24th Dec  8:30 - 13:00 (<strong>HALF DAY</strong>)</li> <li>Thu 25th Dec <strong>CLOSED</strong></li> <li>Fri 26th Dec <strong>CLOSED</strong></li> <li>Mon 29th Dec  8:30 - 17:30</li> <li>Tue 30th Dec  8:30 - 17:30</li> <li>Wed 31st Dec  8:30 - 17:30</li> <li>Thu 1st Jan <strong>CLOSED</strong></li> <li>Fri 2nd Jan  8:30 - 17:30</li> </ul> Mon, 01 Dec 2025 00:00:00 +0000 Tech Tip – How to use the immersive reader in Microsoft Outlook https://www.thesilvercloudbusiness.com/blog/tech-tip-how-to-use-the-immersive-reader-in-microsoft-outlook https://www.thesilvercloudbusiness.com/blog/tech-tip-how-to-use-the-immersive-reader-in-microsoft-outlook <p>There is a feature built into Microsoft Outlook called The Immersive Reader, which is primarily to help people with Dyslexia, but it is also a very powerful tool that anyone can use to process emails.  It is especially useful if you have long emails to get through or if you get emails written in another language.</p> <p>You can use the immersive tool to read emails aloud, allowing you to listen to them rather than read them and you can use it to translate emails in real time, allowing you to focus on the content of the email rather than getting lost in the text.</p> <p>To use the immersive email reader, do the following:</p> <ul> <li>Open Microsoft Outlook</li> <li>Browse to the email you would like to listen to rather than read</li> <li>Open the email and click on the three dots "more actions" menu that looks like (...) that is typically at the top of the message </li> <li>Select "Show in immersive reader"</li> <li>This opens a new window, with the text of the email in a dyslexia friendly format</li> <li>At the bottom of the screen, click on the play button (that is a right pointing triangle) to read the contents of the email aloud. </li> </ul> <p><strong>Note:</strong> You can click on the picture of a speaker to adjust the voice and the playback speed</p> <p>Give it a go and see how easy it is for Microsoft Outlook to read emails aloud for you rather than finding yourself adrift in a sea of words.</p> <p>If you would like more information about what the Immersive Reader can do, <span style="text-decoration: underline;"><strong><a title="click here" href="https://support.microsoft.com/en-gb/topic/open-immersive-reader-for-outlook-9249595c-4b9d-4f27-9f59-bc590a6152da#:~:text=From%20an%20email%20you%27re,an%20email%2C%20select%20that%20word." target="_blank">click here</a></strong></span> to go to Microsoft's website about this Outlook feature.</p> Thu, 27 Nov 2025 00:00:00 +0000 Tips on how to protect yourself from Phishing attacks https://www.thesilvercloudbusiness.com/blog/tips-on-how-to-protect-yourself-from-phishing-attacks https://www.thesilvercloudbusiness.com/blog/tips-on-how-to-protect-yourself-from-phishing-attacks <p>Phishing attacks are getting more sophisticated and are often either difficult to spot or the email just doesn’t raise any red flags or suspicions and get through.</p> <p>To get you thinking about how large the problem is, here are four headline statistics to think about:</p> <ol> <li>On average every 1 in 4 email messages received by people is either malicious or unwanted SPAM emails. </li> <li>20% of businesses experience at least one of their users mailboxes being compromised with an account take over each month. </li> <li>83% of malicious Microsoft 365 documents contain QR codes that redirect you to phishing websites. </li> <li>Half of all business still haven’t setup a DMARC policy, putting them at significant risk of email spoofing, phishing attacks and business email compromise. </li> </ol> <p>Source of the above stats is from Barracuda email security. </p> <p>Bearing all of this in mind, here are some tips you can use to protect yourself:</p> <p><strong>Check the email address and domain name carefully.  </strong></p> <p>A little while ago there were emails doing the rounds asking people to change their Microsoft 365 passwords, the email came from support@rnicrosoft.com which fooled a lot of people.  At first glance the email address looks legitimate, and a lot of people fell for it.  Did you spot the issue in the email address?</p> <p><strong>Look for anything that is a mismatch. </strong></p> <p>When you get an email, there are two elements to the sender.  The displayed name and the email address.  Phishers often use the display name to try to spoof a sender name whilst the actual email address is different to the display name.  Check that the contact information is consistent with emails that you have previously had and ensure that nothing is out of place.</p> <p><strong>Check the language to see if it is consistent with what you would expect to see</strong></p> <p>If you got an email from someone that you know, check the language.  A common theme is that the sender uses American phrases or terminology, that is out of alignment with what someone in the UK would typically use.  Examples we have seen include language like “Call me on my new cell number” or “could y’all give me an update on paying that invoice”, things that look out of place with communication you would expect to see.</p> <p><strong>Check the spelling and grammar</strong></p> <p>Phishing emails are often riddled with poor spelling, grammar and punctuation mistakes, often making them easier to spot.  Whilst AI is making this less of a thing, it is still something that occurs due to the context in the message being messed up in translation.</p> <p><strong>Be wary of urgent or threatening language</strong></p> <p>Phishers want things to happen quickly because they only have a small window of opportunity, so they will use urgent or aggressive language to try to make the recipient act quickly, without thinking about the consequences.  Phishing attacks often use social engineering to get information about senior people in the organisation, then they target someone, often in a junior post and spoof an email coming from the senior member of staff, often with an email with a payment request such as "Pay this invoice NOW!! It is urgent” and as it appears to come from a legitimate source, they often fall for it and pay the invoice to a phishing recipient.</p> <p><strong>Check links in the email and do not click on any if you don’t need to</strong></p> <p>Links in emails are a common means of phishing, so it is imperative that you are sure that the link in the email is valid rather than an attack site.  To check the validity of a link, move your mouse over a link but don’t click on it.  This will show the actual address that the link will take you to, rather than the text displayed in the link.  For example, this link here says “<strong><a href="http://www.google.com" target="_blank">www.microsoft.com</a></strong>” but if you hover your mouse over the words, the actual link <strong>www.google.com</strong> will show somewhere on the screen (bottom left corner in Microsoft Edge), this is because the display information and link are independent from each other, which is why it is so often used for deception in phishing attacks.</p> <p><strong>NEVER open unexpected attachments in an email</strong></p> <p>Email attachments are one of the most common mechanisms of getting malware, viruses or ransomware onto a computer so if you are not expecting an email attachment to get sent through to you, do not open it.  If you are unsure, ask your managed service provider for advice or for them to check it first on your behalf, which they should be able to do without risk to their infrastructure.</p> <p><strong>What should you do if you suspect it’s a phishing email?</strong></p> <ol> <li>Don’t open anything in it, like attachments. </li> <li>Don’t respond to it. </li> <li>Don’t click on any links in the email. </li> <li>Report it to your IT partner to check to see if the email is valid or malicious.</li> </ol> <p>If you want to find out how secure your email environment is and you use Microsoft 365, we can run a free security scan on it to check for any threats that may have got through.  Call us on <strong>01722 411 999</strong> and we can arrange a scan.</p> <p> </p> Wed, 19 Nov 2025 00:00:00 +0000 What is Microsoft Autopilot and why should you deploy it? https://www.thesilvercloudbusiness.com/blog/what-is-autopilot-and-why-should-you-deploy-it https://www.thesilvercloudbusiness.com/blog/what-is-autopilot-and-why-should-you-deploy-it <p><strong>What is Microsoft Autopilot?</strong></p> <p>Microsoft Autopilot is a cloud-based deployment and management solution for Windows devices, designed to simplify and streamline the process of setting up new computers for your business using Microsoft 365 and the correct Microsoft licensing to deploy it.</p> <p>In other words, Microsoft Autopilot allows a business or organisation to deploy a standardised computer or laptop, built to fulfil all the requirements for both the organisation and the user, giving users a standardised, consistent environment to work in that can, for want of a better description, self-heal as well should things go wrong.</p> <p><strong>How does it work?</strong></p> <p>The way it works is that a applications is pretty straight forward:</p> <ul> <li>Applications that you want to use in the business are packaged up and uploaded to Microsoft 365 in a portal called Intune </li> <li>Each application will be assigned to a group for deployment</li> <li>Computers are enrolled in Microsoft 365 using their serial number</li> <li>Users are added to each of the applications groups they need installed on their computer</li> <li>When the user switches on the laptop and logs in for the first time <ul> <li>The computer checks to see if it is associated with a Microsoft tenant, finds it is and runs the deployment script setting up the computer to work with the organisation right from first boot up, running through the user setup process using the autopilot out of box user experience script</li> <li>The computer prompts the user to login to the tenant and displays any tenant branding</li> <li>The user logs in and the computer then runs all of the application installations in the background, building the computer from scratch with all of the applications assigned to that user</li> <li>The computer deploys all configurations setup for the organisation, examples include: <ul> <li>Renaming the computer</li> <li>Installing applications such as Microsoft Office 365, Adobe, Chrome Edge, </li> <li>Deploying organisation branding such as wallpaper</li> <li>OneDrive sync and backup</li> <li>Wireless network settings</li> <li>Disk encryption and key management</li> <li>Security settings including firewall configuration</li> <li>Application updates</li> <li>Local administrator management</li> <li>Port management (USB lockdown)</li> <li>Enrolling the device in remote management and monitoring (RMM)</li> <li>Setting up templates and file usage</li> <li>Setting up SharePoint locations in Windows Explorer</li> <li>Setting up Printers and printer ports depending on location</li> </ul> </li> <li>Once built, the computer is enrolled in Microsoft 365 and the status of the installation is displayed in the Microsoft Intune portal</li> </ul> </li> </ul> <p><strong>Why should you use it?</strong></p> <p>The three S's, simplification, standardisation and security.</p> <p><strong>Simplification...</strong> whilst the above steps seem complicated, it really is introducing simplification because once it is setup, all computer installations are simplified.  They follow the same process whilst installing, meaning the process for the organisation and users is simple, the computer is assigned to the tenant and when the user logs into the computer, it self builds.  Simple! </p> <p><strong>Standardisation...</strong> the computers are all built using scripts and templates so they are all the same, they are standardised.  This doesn't mean the computers are all identical because different people need different applications and settings in an organisation, it means they are built to the same standards, however different users are added to different application deployment groups providing them with the applications they need to do their jobs. Users automatically get the correct applications when they login to a computer, if they use someone else's computer in the organisation, their applications will still be available because they are deployed for the user that is logging in.  This process is automatic so users can use any enrolled devices without needing to get the computer setup for them, it happens based on the standardised setup in the environment.</p> <p><strong>Security...</strong> computers that are enrolled in Autopilot and Intune are locked to an organisation's tenant, if a device is lost or stolen and someone finds it, then wipes the disk to install Windows on it, the next time the computer connects to the internet, it checks in with Microsoft and sees its serial number is associated with a tenant and will only allow the computer to login to that tenant.  It will also display the tenant branding, showing the person that is using the computer who the device belongs to.  This makes recovery of lost of stolen devices far more likely because the person recovering the device can't use it, it is always locked to the tenant meaning the computer is useless to anyone outside of the organisation.</p> <p>It also makes it far easier to get Cyber Essentials and Cyber Essentials Plus accreditations if the environment is standardised, secure and managed.</p> <p><strong>Faster turn around of faults</strong></p> <p>If one of your users were to suffer a loss of their device, either lost, stolen or it dies, getting them back up and running is a simple process and one that often doesn't even require anything other than shipping a new device to them.  The new device just needs to be enrolled in the tenant before it is shipped to them, the get the computer, connect it to the internet and log in.  It then builds itself and syncs up their data to look and feel like their previous device.</p> <p>Likewise is a computer has an issue that is software related, it can sometimes be beneficial to rebuild the computer from scratch, wiping the device and reinstalling everything, in the past this would result in a lot of downtime as the computer would typically be sent back to us to do the rebuild,  but with Autopilot and Intune, there is no need to ship the device to us to rebuild, instead we can trigger a remote wipe and because the device is tied to the tenant, it checks in with Microsoft when it  connects to the internet and then rebuilds itself, including all of the applications and data for the user, all automatically and all in situ.  The process usually only takes between 30 minutes to an hour, resulting in far less downtime than before, improving productivity for the user and organisation.</p> <p><strong>Faster application deployments</strong></p> <p>If you want to roll out a new application to some or all of your users, again this can be packaged up and deployed to users without any downtime or requiring "techies" to remote onto the computer to install it.  It can all be done from a central deployment in Microsoft 365 for the users that need the new package.  Again this saves time as once the application is uploaded to Intune, it can just be deployed using Microsoft groups and the users that need the new application are just added to the application group, the rest happens automatically in the background, with the user getting the application installed on their machine over the internet.  The computer will check in with Intune periodically and when it sees a new application waiting for deployment, it will download it and install it for the user.  What's more, and depending on the app, it can even automatically configure the settings you want for the users with the application, if the application supports this feature.</p> <p><strong>Demo and more information</strong></p> <p>If you would like to see Autopilot in action and see how easy it is to deploy applications in your organisation, please call us and we can show you a demonstration of Autopilot from start to finish.  From getting a new computer that boots for the first time connecting to the tenant and deploying all its applications.  Call us on <strong>01722 411 999</strong> to see Autopilot in action.</p> Wed, 12 Nov 2025 00:00:00 +0000