MS Lists App now available for iPhone users

Microsoft has released the Lists app for iOS iPhone owners.  The app allows users to create and share lists, keep track of team events & projects, and track issues.

Microsoft trailed the Lists app at its Build 2020 conference in May.  Since then it has rolled out the List app for Microsoft Teams and the web version for Microsoft 365 (Desktop) customers across the world.  Now the Lists app is available from the Apple App Store.

You can use the Lists app instead of a spreadsheet or physical clipboard for things like managing students’ progress or keeping track of visitors.  It is designed to work with Microsoft 365 apps, including Excel, SharePoint, Power Apps, Power Automate and Power BI. Lists is an updated take on Sharepoint lists, which can consist of people, links, pictures, dates, and more.

The iOS app should help users manage and create lists while on the move.

Microsoft says users can track and manage lists, see recent and favourite lists, view lists offline, edit lists, add pics with QR codes, share track lists, view ready-made templates, and customize views using sort, filter and group.

Additionally, the app has dark mode support and can be used in landscape mode.  There’s also Intune device management support with mobile device management (MDM) and mobile app management (MAM) policies for use in enterprise environments.

And that’s the catch!  This is an enterprise app and organizations need an Office 365 commercial subscription that includes SharePoint to use it.

Microsoft is planning on delivering improvements designed for Lists usage on the iPad soon. It’s also working on a Lists app for Android phones but there is no firm indication when that will be available.

To find out more about this or any other Microsoft 365 product for your business please contact us today!

“Recall Message” warning!

Did you know that the ‘recall message’ function in Outlook rarely works as you would expect it to?

The recipient must be a member of your organisation and part of Exchange/ Microsoft 365 and also using Outlook.

It also won’t work if they have opened or moved the message.  So please make sure you check the recipient list (don’t click “reply all” unless you mean to!) and content before you send an email!

If you’ve found this useful please follow us on LinkedIn or twitter and Subscribe to our Newsletter.

We hear a lot about “Phishing” but what is it?

Phishing has become a very popular method for hackers to use to try to attack us because it is so easy to attempt.  It is also, unfortunately, one of the easiest hacks to fall for.

One successful Phishing attack can provider a hacker with everything they need to access your personal or work accounts, including emails, bank details and more.

A Phishing attack is usually carried out over email, although there are variants (see definitions below) that use other methods.  The goal will be to get you to hand over passwords, alter your bank details, make payment: basically, to trick you to do what the fraudster wants.

Phishing is also a way for hackers to deliver malware.  They try to get you to visit a link, download a document or watch a video that will secretly install malicious software.

There are even “Long Con” phishing attacks that use fake social media accounts to entrap a victim over weeks or months.

How do I spot a phishing attack?

Many of the less professional phishing operators still make basic mistakes in their messages.  So if you see an email message that is supposed to be from a reputable organisation (like your bank) with obvious spelling, grammar or punctuation errors then you should be very concerned.

Often, the attack will encourage you to click a link.  Usually, if you hover over a link embedded in an email, the destination will be displayed.  If the destination looks strange- don’t click!

In fact, that’s probably the simplest and most effective advice that we can give when it comes to links in emails- treat all of them as suspicious!

Another simple thing to look out for is the senders email address.  It’s easy to change an email “Display Name” to anything you like.  But the actual sending email address will often give you more information.  So if it looks as if your boss has just sent you an email asking him to pay a bill but the sending email address is an unusual gmail account then beware!

These few paragraphs are really the “tip of the iceberg” on this subject.  So if you need any help or advice on any aspect of IT security for your business, please do not hesitate to contact us.  It’s not easy to put a figure on how much this sort of fraud costs businesses around the world every year but in the US alone, the FBI estimates the cost to be around $5bn.

Oh, and here are the definitions we promised!

Vishing: a phishing attack carried out by telephone.

Smishing: a phishing attack carried out by Social Media

Spear Phishing: a phishing attack that is targeted to an individual or group of individuals

Security Vulnerability Discovered in some ZyXEL Firewalls

A team of security researchers from the Dutch company EYE have found a serious security vulnerability in certain Zyxel firewalls.

If you have a Zyxel USG, ATP, VPN, ZyWALL or USG FLEX you should update the firmware on the device to the latest version immediately.  Moreover, you may wish to consider replacing older devices.

You can find the full list of affected devices here and the original Zyxel advisory notice here.

Zyxel is a well-known brand of firewalls aimed at the small to mid-market.  The use of firewalls VPNs has increased dramatically in recent months due to the explosion in home working so it is very important that they are kept secure.

We find that businesses who do not have efficient IT support in place often do not realise how important it is to update the firmware in hardware devices.  Outdated firmware has often been shown to introduce security vulnerabilities.

At Labyrinth Technology we automatically check and update firmware for all our client devices at least every three months.  Consequently, this ensures that they are protected by the latest advances in technology, functionality and security.

If you need help or advice with any aspect of IT support or security for your business, please do not hesitate to contact us.

Lightning Cable Problems?

An old problem that we still see from time to time is an Apple Lightning cable that will only work when it is plugged into the device a certain way.  Most usually this problem affects charging, but it can affect data transfer as well.

There are a couple of ways to solve this problem: both involve simply cleaning the dirty contacts.

The “low tech” way is to use a pencil eraser.  It takes a bit of patience and some hard work but usually after a few minutes of scrubbing, the dirt will come off and the cable will be as good as new.

If that doesn’t work (or if you don’t like the idea of scrubbing away with an eraser) you’ll need to switch up a gear.  This requires some slightly more specialised equipment though- some contact cleaner and a fibre glass brush will do the trick in a few seconds.

Adobe Flash Player Reaches “End of Life”

Adobe Flash player, the browser plug-in that was originally released in 1996, has reached End of Life.  (A plug-in is a small app that adds to the functionality of your internet browser).

The plug-in enhanced web pages with animation and interactivity in a way that had not been seen before.  Much of what we take for granted on the modern web was brought about by the changes started by Flash player.

Back in 1996, by far the majority of internet users were still connecting by dial-up modems.  Typically, these were achieving speeds many times slower than our broadband connections of today.  Despite this, Flash Player’s technology allowed web designers to deliver content relatively quickly.

However, modern web technologies, have far superseded Flash player, and Adobe have announced that the product will be made end-of-life.  No more security updates will be released for the software, which means having it installed now presents a significant security risk.

Adobe have provided instructions on their website for how to uninstall the software (on windows) here.

If you still have concerns about this or any other aspect of IT security for your business, please do not hesitate to contact us.  Labyrinth Technology has been supporting and advising businesses in the London area for nearly 20 years.  We can assure you of simple, friendly and honest advice!