T 01772 664 200
  • Get managed support 24/7 and 365 days a year
  • Telecoms, phone systems and networks
  • From strategy to implementation
  • Professional IP network installation
  • Cloud and on premises IT and telecoms
  • Complete IT support for your business
  • High availability internet - stay connected
17 + 18 =

Matt's Blog

Micro business setup


If you are a start up or Micro business cash is often tight but you need to be competitive in trems of how your business operates.  Often you want to portray an image of being larger than you are - maybe you are in a situation where you are trying to build a new business whilst continuing another career.

How can technology help me do this???

Nowadays you can access telecoms & IT resources without the need to have your own phone system OR in house server.

In a lot of cases you can operate your telecoms & IT whilst out and about.  access to widespread 4G & public wifi networks have made this possible.

(full article)

Hello again!!


It was a strange time in 2016/17 for ICT UK.   We came across some amazing opportunities which dominated our workload but nor for 17/18 we are re focussing on our core business!

Expect to see plenty more updates on the website moving forward which will include new products services & ideas to help you run your business better with IT.

We've got big staff changes on the way too which we hope will be a positive move forward for us & will enable us to offer a broader set of services.

In 16/17 we'd been engaged to perform a set amount of work for a client which kept us on our toes for the whole year.  That period has now finished & although we hope to pick up further work of the same kind in this financial year we are trying to structure the deal differently so that we can continue to develop the rest of the business in conjunction with the extra workload.

We've got some exciting Cloud & hybrid cloud solutions which we already have in place with some of our clients which we will be looking to roll out to existing customers but also to new clients as well.

We're on the look out for new business so if our existing clients & contacts know of businesses that could do with additional IT support / assistance then please help us get in touch - referral business is historically how we've grown.  We have clients across a wide variety of sectors & organisation sizes but we are strong in:-

  • healthcare - both private & NHS clients
  • Charities
  • Distribution
  • automotive
  • Education
  • Hospitality - hotels & restaurants
  • Food
  • Manufacturing
  • Creative

We deal with a wide variety of size of organisations - our top value customers are NHS trusts where we provide IT resource into them for a variety of projects & ongoing support contracts but our core business remains SME's with a user base of 5-100 users typically.

If you are an existing client / potential new client looking for help with your IT & telecoms please contact myself Matt on 01772 664210 or email matthew.bateman@ictuk.net  I'll be more than happy to help.

(full article)

CEO Fraud - What is it? How to protect against it!


Cyber criminals have become very clever over the past few years & they've developed some very cunning little tricks to dupe one such trick is CEO fraud.  It's a very real threat which according to the FBI costs the average targeted business $120,000 & has cost in excess of $2.3Bn over the past 3 years.

As with all IT Security warnings, most figures we see are very Americanised but CEO fraud is a very real threat to UK businesses too with over £32million reportedly being lost to this kind of attack. Worryingly it's likely that the true figure is far greater as firms may not report the loss to authorities OR may not even realise they have lost the money yet.

So what is it - well it's so called CEO fraud as the attack is one where an attacker purports to be a senior member of staff (maybe the CEO), attacks are often carried out using phone calls & email.  The attacker makes numerous contact with their "target" and builds up the picture of a "deal" before they actual make the request for the money to be transferred, this means that the targeted member of staff is expecting the request to be made to transfer funds to an account - when the attacker makes the request it doesn't seem out of the ordinary & the target complies.

These kinds of attacks work better in larger organisations as there are more likely to be senior staff involved whom the targeted staff member may never have met.

It's common for the attacker to use gmail, yahoo or other generic email accounts to communicate BUT some highly sophisticated attacks have been reported where the attackers have spent months learning the target organisation, hacking the mail system & actually monitoring the communications between certain individuals, learning the kinds of words, deals etc... that are discussed. Once a big enough picture has been built up the attacker will then choose the moment very carefully about when to send a message containing their bank details - they may even be clever enough to simply alter a legitimate message that was sent so nobody knows there is anything wrong - except when the money that has been sent never arrives with the legitimate recipient.

This kind of attack is very difficult to guard against 100% as they can take many different forms but our top 5 tips for avoiding CEO fraud are:-

  • If a new Senior member of staff makes contact with you - Verify that they really do work for your organisation!
  • Always double check the email address that sent you a request for payment - if it's come from a known person but a new email address that they haven't used before, alarm bells should be ringing - ask them if it's legitimate (preferably face to face)
  • Discuss the deal with other senior members of the corporation to ensure it is a legitimate deal
  • Make sure that your email system is secure & cannot be compromised
  • Always double check before you send money to an account that you've not sent to before

A major part of protection against this kind of fraud is with education - make sure that your staff are in tune with the kind of scams that they could be vulnerable to.  If they haven't been educated into some of the threats that are out there then they can't really be held accountable of they are tricked.

Attackers & fraudsters are using very sophisticated methods to take your money from you - don't make it easy for them!

(full article)

Very exciting (geeky) new technology!


I do always get excited about new technology - not every piece of technology will excite me but where I can see this as a game changer OR something unique, I do get excited.

We've been looking for ways to improve our ability to fail over servers in the event of a disaster or network outage.  We have been able to fail servers over for quite some time however due to our current network configuration, we'd need to change the servers IP addresses (OK I know this post is geeky but please bear with me) which takes time & causes complications so we avoid failing servers over!  If there was ever a situation where things were so bad that we wouldn't be able to bring the original server(s) back online for a long period of time then we would have no choice but to perform the failover & change all of the IP addresses.

So in looking to improve this failover capability we began asking questions of our datacentre provider & carriers as to whether they would be able to give us an ability to create a connection which would enable us to run our VLAN's flat across 2 sites. This was possible we were told by giving us a dedicated link between the datacentres which would basically act as an extremely long network cable - this got us excited as it would mean we would simply be able to fail a server over to a different location, & bring it online without the need to make any IP address changes, this would be a massive breakthrough for us & would give us vastly improved failover capabilities.

We then started looking into the possibilities of running this without a dedicated link/carrier - we thought that if we were in control of the link that this would be more beneficial to us.

We found a technology which enabled us to create an encrypted link across the public internet which makes both sites appear as one.  So much so that the machines at the second site don't even see a gateway(router) local to them, they only see a gateway at the primary site.  When the machines go onto the internet the internet traffic etc.. is all going out through the router at the primary site.

We have done a lot of testing with this technology & are implementing this live into our network this week.  This is not only going to give us better fail over capabilities but it's also going to mean that we can change the way we deploy network services into our customers, which will reduce cost, improve control & deliver more advanced solutions.

We are incredibly excited about this new technology & the capabilities it is going to enable for us.

We are expecting a whole host of new IT Security & network services to be on offer very soon as well as being able to perform more seamless systems fail over for our existing cloud customers.

Watch this space!

(full article)

Increase in ransomware


If you’ve been following this blog for a long time, you will have seen our previous reports on Mobile RansomwareCryptoLocker, CTB-Locker and CryptoWall.

Like all of those ransomware programs, once on your machine, Locky encrypts data and asks for a ‘ransom’ payment in return for a decryption key. Locky asks for the bitcoin equivalent of £885.

Usually Ransomware is hidden in executable files disguised as documents. Often these are labelled as invoices or purchase orders in emails.

Locky, however, was hidden in the encryption in macros for Microsoft Word. It’s also been known to be hidden using attachments written in Javascript.



(full article)
© ICTUK 2016   Website by
ICTUK Unit 5C, Barnfield Way, Ribbleton, Preston, PR2 5DB