Blog
Home >>
Telephone
01245 265100Telephone
01245 265100Home >> Blog
Welcome to April 2026 this month Microsoft has released patches for 167 flaws including 2 zero-day vulnerabilities. It’s a good idea to restart your PC today, and we may restart some of your servers overnight this week if a patch requires it. NEW THIS WEDNESDAY Overall Microsoft patched: 93 Elevation of Privilege Vulnerabilities 13 Security Feature Bypass vulnerabilities 20 Remote Code Execution Vulnerabilities 21 Information Disclosure Vulnerabilities 10 Denial of Service Vulnerabilities 9 Spoofing Vulnerabilities…
Welcome to Februrary 2026 this month Microsoft has released patches for 58 flaws, 6 of which are actively exploited zero-days. It’s a good idea to restart your PC today, and we may restart some of your servers overnight this week if a patch requires it. NEW THIS WEDNESDAY Overall Microsoft patched: 25 Elevation of Privilege Vulnerabilities 5 Security Feature Bypass vulnerabilities 12 Remote Code Execution Vulnerabilities 6 Information Disclosure Vulnerabilities 3 Denial of Service Vulnerabilities…
Welcome to the first Patch Tuesday of 2026. Microsoft’s New Year offering included patches for 8 critical vulnerabilities, including 3 zero-day flaws. It’s a good idea to restart your PC today, and we may restart some of your servers overnight this week if a patch requires it. NEW THIS WEDNESDAY Overall Microsoft patched: 57 Elevation of Privilege Vulnerabilities 3 Security Feature Bypass vulnerabilities 22 Remote Code Execution Vulnerabilities 22 Information Disclosure Vulnerabilities 2 Denial of…
Welcome to the last Patch Tuesday of 2025. Yes, it’s December already. Merry Christmas, Season’s Greetings, Happy Holidays and an excellent New Year to you all, I’m sure you’ll be delighted to hear what Microsoft has for your stockings this year – 57 flaws were patched including 1 actively exploited and 2 zero-day vulnerabilities. It’s a good idea to restart your PC today, and we may restart some of your servers overnight this week if…
Merry Christmas, Season’s Greetings, Happy Holidays and an excellent New Year to all. We’re open on Christmas Eve and on the 29th, 30th and 31st of December, when we will be running a skeleton service. We’ll do everything we can to make sure there’s no interruption to your services during these times, and that any emergencies are dealt with accordingly. We would kindly ask that during that time only major, system-wide or critical issues are…
Welcome to Patch Tuesday November 2025. 63 flaws were patched including 1 zero-day vulnerability and 4 critical vulnerabilities. It’s a good idea to restart your PC today, and we may restart some of your servers overnight this week if a patch requires it. NEW THIS WEDNESDAY Overall Microsoft patched: 29 Elevation of Privilege Vulnerabilities 2 Security Feature Bypass Vulnerabilities 16 Remote Code Execution Vulnerabilities 11 Information Disclosure Vulnerabilities 3 Denial of Service Vulnerabilities 2 Spoofing…
Welcome to Patch Tuesday October 2025, final updates for Windows 10, Office 2016 and 2019, and Exchange 2016 and 2019. 172 flaws were patched including 6 zero-day vulnerabilities. It’s a good idea to restart your PC today, and we may restart some of your servers overnight this week if a patch requires it. NEW THIS WEDNESDAY Overall Microsoft patched: 80 Elevation of Privilege Vulnerabilities 11 Security Feature Bypass Vulnerabilities 31 Remote Code Execution Vulnerabilities 28…
Welcome to Patch Tuesday September 2025, 81 flaws were patched including two publicly disclosed zero-day vulnerabilities. It’s a good idea to restart your PC today, and we may restart some of your servers overnight this week if a patch requires it. NEW THIS WEDNESDAY Overall Microsoft patched: 41 Elevation of Privilege Vulnerabilities 2 Security Feature Bypass Vulnerabilities 22 Remote Code Execution Vulnerabilities 16 Information Disclosure Vulnerabilities 3 Denial of Service Vulnerabilities 1 Spoofing Vulnerability There…
Welcome to Patch Tuesday August 2025. 107 flaws were patched including one publicly disclosed zero-day vulnerability. It’s a good idea to restart your PC today, and we may well restart some of your servers overnight this week if a patch requires it. NEW THIS WEDNESDAY Overall Microsoft patched: 44 Elevation of Privilege Vulnerabilities 35 Remote Code Execution Vulnerabilities 18 Information Disclosure Vulnerabilities 4 Denial of Service Vulnerabilities 9 Spoofing Vulnerability There was one publicly disclosed…
This is the final article in our Cyber Essentials 101 series. We’ve covered the questions you need to answer and why they are important for your business. Attaining a Cyber Essentials certificate is a great way to make sure you’ve covered the basics of protecting your data and your business. Often the most difficult elements are less around the technical areas – if hardware needs replacing, whilst it costs to do so, the process is…
Welcome to Patch Tuesday July 2025. 137 flaws were patched including one zero-day vulnerability. It’s a good idea to restart your PC today, and we may well restart some of your servers overnight this week if a patch requires it. NEW THIS WEDNESDAY Overall Microsoft patched: 53 Elevation of Privilege Vulnerabilities 8 Security Feature Bypass Vulnerabilities 41 Remote Code Execution Vulnerabilities 18 Information Disclosure Vulnerabilities 6 Denial of Service Vulnerabilities 4 Spoofing Vulnerability There was…
Welcome to Patch Tuesday June 2025. 72 flaws were patched including 6 critical and 2 zero-day vulnerabilities, both of which have been actively exploited. It’s a good idea to restart your PC today, and we may well restart some of your servers overnight this week if a patch requires it. NEW THIS WEDNESDAY Overall Microsoft patched: 13 Elevation of Privilege Vulnerabilities 2 Security Feature Bypass Vulnerabilities 25 Remote Code Execution Vulnerabilities 17 Information Disclosure Vulnerabilities…
Malware, such as viruses, is generally used to steal or destroy information. It’s often delivered via phishing attacks – obtaining information by confidence trickery, or social network sites which can be mined for information useful to a hacker to provide a focussed attack on an organisation. Anti-malware solutions (including anti-virus) are available from commercial suppliers, some free, but usually as complete software and support packages. Malware is continually evolving, so it is important that the…
All accounts with access to company data must require the user to authenticate. Where this is done using a password the following protections should be used: Passwords are protected against brute-force password guessing. Technical controls are used to manage the quality of passwords. People are supported to choose unique passwords for their work accounts. There is an established process to change passwords promptly if the applicant knows or suspects the password or account has been…
Welcome to Patch Tuesday May 2025. 72 flaws were patched including 6 critical and 2 zero-day vulnerabilities, both of which have been actively exploited. It’s a good idea to restart your PC today, and we may well restart some of your servers overnight this week if a patch requires it. NEW THIS WEDNESDAY Overall Microsoft patched: 17 Elevation of Privilege Vulnerabilities 2 Security Feature Bypass Vulnerabilities 28 Remote Code Execution Vulnerabilities 15 Information Disclosure Vulnerabilities…
All users need to have unique accounts and should not be carrying out day-to-day tasks like browsing the internet, invoicing or dealing with e-mail whilst logged on as a user with administrator privileges. Admin accounts allow significant changes to the way your computer systems work, doing day to day work logged in as an admin opens the door for any mistaken clicks on malicious software or attachments to cause significantly more damage. It’s also important…
This is the next article in our Cyber Essentials 101 series, if you haven’t yet read the first part covering why you should consider Cyber Essentials and how to answer the initial questions about your organisation you can find it here. Patching your devices is one of the most important things you can do to secure your data. For more on why take a look at our infographic about patching computers and our article on…
This is the next article in our Cyber Essentials 101 series, if you haven’t yet read the first part covering why you should consider Cyber Essentials and how to answer the initial questions about your organisation you can find it here. Questions in this section apply to: servers, desktop computers, laptops, thin clients, tablets, mobile phones, and cloud based software services. A5.9 – When a device requires a user to be present, do you set…
This is the next article in our Cyber Essentials 101 series, if you haven’t yet read the first part covering why you should consider Cyber Essentials and how to answer the initial questions about your organisation you can find it here. Computers and cloud services often aren’t secure on default installation or setup. An out-of-the-box set-up can often include an administrative account with a standard, publicly known, default password, one or more unnecessary user accounts…
This is the fourth article in our Cyber Essentials 101 series, if you haven’t yet read the first part covering why you should consider Cyber Essentials and how to answer the initial questions about your organisation you can find it here. A firewall is the software or a hardware device which provides protection between your network devices and the Internet. Your organisation will have physical, virtual or software firewalls at your internet boundaries. Software firewalls…
This is the third article in our Cyber Essentials 101 series, if you haven’t yet read the first part covering why you should consider Cyber Essentials and how to answer the initial questions about your organisation you can find it here. If you want to use the free insurance then you’ll need to answer all the questions in this section. The answers to these questions won’t affect the result of your Cyber Essentials assessment. It’s…
This is the second article in our Cyber Essentials 101 series, if you haven’t yet read the first part covering why you should consider Cyber Essentials and how to answer the initial questions about your organisation you can find it here. Scope of Assessment This is where you outline what parts of your business you want your Cyber Essentials certification to cover. The scope should be either the whole organisation or an organisational sub-set –…
Happy New Year! The first Patch Tuesday of 2025 was a whopper with 159 flaws patched including 8 zero-day vulnerabilities, 3 of which have been actively exploited. It’s a good idea to restart your PC today and we may well restart some of your servers overnight this week if a patch requires it. NEW THIS WEDNESDAY Overall Microsoft patched: 14 Security Feature Bypass Vulnerabilities 58 Remote Code Execution Vulnerabilities 24 Information Disclosure Vulnerabilities 20 Denial…
A top tip for the winter season – the cold weather makes under-desk and fan heaters a popular way to stay nice and snug. But computers don’t like to be too hot! A small heater left pointing towards your PC for a couple of hours will be enough to make it warmer than it’d like to be. Overheating can cause slow running, running errors, component wear, a reduction in lifespan of hard drives or even…
The Microsoft monthly security update release is published on the second Tuesday of each month. It’s a good idea to restart your PC on the following Wednesday – today. We may well restart some of your servers overnight this week if a patch requires it. NEW THIS WEDNESDAY This month’s Patch Tuesday included security updates for 71 flaws including 1 actively exploited zero-day vulnerability. Overall Microsoft patched:: 27 Elevation of Privilege Vulnerabilities 30 Remote Code…
If you Have Any Questions Call Us On 01245 265100
Blog by Ontraq Chelmsford is a valuable resource for businesses and individuals looking to stay informed about the latest trends, solutions, and best practices in IT support and technology management. Ontraq, a leading provider of IT services in Chelmsford and beyond, uses its blog to share insights drawn from years of industry expertise, ensuring that readers have access to practical and relevant information.
A hallmark of the blog is its focus on **modern IT challenges** and how businesses can overcome them. Topics include network security, cloud computing, data management, and strategies for handling cyber threats. These articles provide actionable advice, making it easier for businesses to implement effective IT policies and improve overall system performance.
Another feature of the Ontraq IT Support Blog is its emphasis on emerging technologies. From AI-powered tools to advanced cybersecurity measures, the blog highlights how businesses can leverage cutting-edge solutions to stay competitive. The team at Ontraq also shares insights into the latest software and hardware developments, helping readers make informed decisions when upgrading their IT infrastructure.
The blog is particularly useful for small and medium-sized enterprises (SMEs), offering targeted advice tailored to their unique needs. It explores cost-effective IT solutions and guides readers through complex technical issues in a straightforward manner.
Additionally, the blog emphasises the importance of customer-centric IT support, illustrating how proactive and personalised services can enhance business operations. Case studies and success stories from Ontraq’s own experiences add a layer of credibility and relatability to the content.
Overall, the IT Support Blog from Ontraq Chelmsford is a must-read for businesses aiming to optimise their technology landscape. Its mix of technical know-how and strategic advice makes it a standout resource in the competitive field of IT support.
