Windows 7 was released by Microsoft in 2009, on the 14th January 2020 support for Windows 7 will come to an end, here we explain what this means and what you should do to ensure your business is secure.  

Implications

Windows 7 will continue to work as normal and you will probably notice no significant changes, but one thing that you’re likely to get fed up with is the marketing pop-ups from Microsoft encouraging you to upgrade to Windows 10.

From January 2020 however, some important changes will take place under the bonnet of Windows 7.  There will be no further security updates to Windows 7, already there are a number of known unprotected bugs and backdoors in Windows 7, this is likely to increase and any new ones will not be patched or fixed,making your PC vulnerable to attack. 

Your Antivirus and other Security programs will provide some protection, however, the effectiveness of these solutions will decline rapidly over time as the makers of these solutions shift their focus to Windows 10, which manufacturer is going to invest in patching old software? 

You should also note that a large number of software packages such as Microsoft Office and Customer Records Management solutions that now require Windows 10 to run their latest updates, we know that some of the Software vendors that we deal with are pushing our clients to upgrade to Win10 as their software will have issues with Win7, in this situation no one can support it.

You can learn more here:

https://www.microsoft.com/en-gb/videoplayer/embed/RE3nFuK?pid=player-container1-oneplayer&postJsllMsg=true&autoplay=false

Windows 7 End of Support Pop up
Windows 7 End of Support Pop up Message

Solutions: 

There are two potential solutions open to businesses, UPGRADE or REPLACE, which solution is most appropriate for you? It’ll be dependant on the age and specifications of your current computers. We should be able to upgrade your Windows 7 Computer to Windows 10 from £75, but given the typical age of a Windows 7 computer, it may be more cost-effective investment to purchase a new Business class Windows 10 PC. 

Welgo can provide audit, advice and support in making your decisions and can provide both replacement Business class Computers and upgrades where appropriate, spread the cost, ask us about leasing your equipment. 

To arrange a quote or discuss your options please call the Welgo Office, or complete our Enquiries form here:

https://sites.ziftsolutions.com/google.ziftsolutions.com/8a9982a86f858be6016f85f4f3cd1d2e

Picking a Good Password is an important aspect of computer security. A poorly chosen password may result in unauthorized access and/or exploitation of systems and resources. All users, including clients, contractors and vendors with access to Welgo systems, are responsible for taking the appropriate steps, as outlined below, to select and secure their passwords.

When Picking a Good Password, try to create passwords that are both secure and can be easily remembered. One way to do this is create a password based on a saying, song title, affirmation, or other phrase.

For example: “This May be 1 Way 2Remember”

This password is long, uses Upper and Lower Case characters, Numbers and punctuation (spaces) and uses these in a non-natural or grammatically incorrect manor. It can be remembered easy and typed quickly and naturally making it harder for people to catch by looking over your shoulder and even if someone guessed it they would still need to know exactly how you have typed or modified it. You could also use a variant of this such as:

 

“THIS may be1 way2 REMEMBER”

“TmB1w2R3m3mb3r!”

“Tmb1W>r3meber~”

“This£May $e 111 Way 2 R3m3mb3r”

or some other weird and wonderful variation, the weirder the better!

(NOTE: Do not use either of these examples as passwords!)

 

Refresh Periods

 

All passwords should be changed on at least a quarterly basis.

When Picking a Good Password remember, Length beats complexity every time however the strongest passwords have the following characteristics:

Contain at least three of the five following character classes:

Lower case characters
Upper case characters
Numbers
Punctuation
“Special” characters (e.g. @#$%^&*()_+|~-=\`{}[]:”;'<>/ and space etc)
Contain at least twenty (20) alphanumeric characters.

 

Weak passwords or Passwords with the following characteristics are prohibited:

  • A password containing less than twenty (16) characters.
  • A password which contains a word found in a dictionary (English or foreign) unless it is a combination of at least 4 such words constructed in such a way so as to meet the minimum standards set out above.
  • The password is a common usage word such as:
  • Names of family, pets, friends, co-workers, fantasy characters, names of celebrities or other persons of note, sports team names or player’s names, etc.
  • Computer terms and names, commands, sites, companies, hardware, software.
  • The words “Ramsay Information Technology “, “Ramsay”, “Ramsay.it” or any derivation or derivation of and clients name.
  • Birthdays and other personal information such as addresses and phone numbers.
  • Word or number patterns like aaabbb, qwerty, zyxwvuts, 123321,123456789 etc.
  • Any of the above spelled backwards.
  • Any of the above preceded or followed by a digit (e.g., secret1, 1secret).
  • Any dictionary word with numbers replacing characters in a predictable or formulaic manner such as “w00d”, “5p0rt” or “313ph4nt” etc.

Password Protection Standards:

  • Always use different passwords for each account / website and use different passwords from other non-Company accounts or personal accounts.
  • Passwords should never be written down or stored in on-line password managers.
  • Do not reveal a password in email, chat, or other electronic communication.
  • Do not speak about a password in front of others.
  • Do not hint at the format of a password (e.g., “my family name”).
  • Do not reveal a password on questionnaires or security forms.
  • Always decline the use of the “Remember Password” feature of applications such as web browsers.

 

If an account or password is compromised or you have any reason whatsoever to suspect it may have been compromised in anyway you must report the incident to your Managment team and to the Welgo IT Team.
Most importantly off all use Two Factor authentication where available and remember When Picking a Good Password, Length beats complexity every time.

 

It is also important to note that Google has never ever been hacked, however individual user accounts have been compromised multiple times by persuading users to reveil thier passwords. Google users are being targeted in this way because the Google System itself is secure.