Vorboss launches Simply Connected to simplify connectivity, IT and cybersecurity management

Imagine arriving at work tomorrow to find all your files gone.
Not just missing—but encrypted. Locked away by cybercriminals demanding a hefty ransom to release them.
This isn’t a hypothetical. It’s ransomware. And it’s escalating.
In the first quarter of 2025 alone, ransomware attacks surged by 84% compared to the same period last year.
It’s no longer a question of if your business will be targeted, but when.
In fact, two-thirds of businesses have already been hit in the past two years. It’s a sobering statistic—and a wake-up call. Is your business prepared?
Here’s the good news: there’s a highly effective way to protect your data—immutable backup storage.
But before we get to that, a quick reminder of what ransomware is: a cyberattack where criminals infiltrate your systems, encrypt your data, and demand payment to unlock it.
It’s brutal. And it’s evolving.
Today’s attackers don’t just go after your live data—they target your backups too. Research shows that 96% of ransomware victims in the last two years had their backups compromised.
That’s why immutable backup storage is so critical.
“Immutable” means unchangeable. Once your backup data is written, it can’t be altered, deleted, or overwritten—not even by someone with admin rights.
So even if attackers breach your systems, they can’t touch these backups. It’s like locking your most valuable data in a vault—one that only you can open when needed.
Traditionally, this meant using air-gapped, offline storage. But now, cloud-based solutions offer the same level of protection—without the hardware headaches.
So why isn’t everyone using it?
Despite 81% of IT professionals agreeing it’s the best defence against ransomware, only 59% of businesses have adopted it. That gap is worrying.
Security hardening—firewalls, antivirus, access controls—is essential. But if ransomware gets through (and it often does), your backups are your last line of defence.
They need to be untouchable.
It’s about adopting a “breach mentality”—assuming an attack will happen, and planning for recovery, not just prevention.
Investing in immutable backup storage is one of the smartest moves you can make. When the worst happens, being able to restore your data quickly—without paying a ransom—could be the difference between a bad day and a business-ending disaster.
Need help getting started with immutable storage or reviewing your backup strategy? My team and I are here to help. Let’s talk.
Would you like this adapted for a specific format—like a blog post, email campaign, or internal presentation?
How many times have you tried searching for a file, only to forget what you called it?
You know it’s there. You remember writing it, maybe even roughly when.
But Windows search just stares blankly back at you. Or worse, throws up ten random web results and a document from 2019 that has nothing to do with anything.
Sound familiar? So annoying.
It’s a common pain point, especially for teams juggling multiple files, folders, and projects.
Well, get your hands ready to applaud: Microsoft is finally doing something about it.
A new update for Windows 11 promises to make search feel a lot more like a conversation. Instead of needing to remember exact file names, you’ll be able to type something like “find the notes I made for the July project meeting”. Or “show me pictures of the team at the summer BBQ”. And your PC will understand what you mean.
It’s called natural language search, and it’s a big step forward. But only if you’re using what Microsoft calls a Copilot+ PC.
These Copilot+ PCs are Microsoft’s new breed of AI-powered computers. They come with a special chip called an NPU (Neural Processing Unit). This is designed to handle AI tasks locally, right there on your computer, without needing the internet. It’s not just faster, it’s also more private. It powers new features like this smarter search and taps into Microsoft’s Copilot assistant.
Copilot’s built into Windows 11 and Microsoft 365. It can help with everything from drafting emails to generating images. And now, even finding files with vague descriptions.
The feature’s still in testing, but it’s showing up in preview builds of Windows 11 for Copilot+ devices. That means it’s likely not far off from a full rollout. It even works with cloud files in OneDrive, so if your business uses that, you’ll get an even smarter experience.
Of course, if you’re not using a Copilot+ PC, you won’t see this update. At least not yet. But if you’re thinking about refreshing your hardware this year, this might be one of those features worth keeping an eye on. It’s exactly the kind of everyday improvement that saves time and frustration. And gives your team one less thing to wrestle with.
Curious about whether a Copilot+ PC is a smart move for your business? My team and I can help you weigh up the pros and cons… and make sure you’re getting tools that work for how you work. Get in touch.
Cybercriminals are smarter than ever—and a single weak password could give them access to your sensitive data, financial systems, or even full control of your network.
They use automated tools to guess millions of passwords in seconds. So if you’re still using “Password123” or “CompanyName2025,” you’re making their job easy.
What’s at stake?
- Data breaches
- Financial loss
- Identity theft
- Reputational damage
How to build a strong password: Think of it like a secret recipe—only you know the ingredients. A strong password should:
- Be at least 14 characters long
- Mix uppercase, lowercase, numbers, and symbols
- Avoid common words or personal info
Better yet, use a passphrase: something like “Coffee&CloudsAreGreat9!” is both secure and memorable.
Avoid these common mistakes:
- Using personal info (names, birthdays, company name)
- Reusing passwords across accounts
- Simple sequences like “123456”
- Writing passwords on sticky notes
Need help remembering them all? Use a password manager. It creates and stores strong passwords securely—so you only need to remember one master password.
And don’t forget MFA (Multi-Factor Authentication). Even the strongest password can be compromised. MFA adds an extra layer of protection with a one-time code or app-based verification.
If you manage a team, set a clear password policy:
- Unique passwords for every account
- Regular training on password best practices
- Mandatory MFA for critical systems
- Routine checks for compromised credentials
Making password security a priority helps protect your business from costly cyberattacks.
Need help tightening your security? Let’s talk.
You trust your team, right?
They’re smart, capable, and they know better than to click on suspicious links or open unexpected attachments.
They already know that phishing emails look trustworthy on purpose. To trick them into giving away sensitive data or downloading malicious software.
So, they’re not the type to fall for it.
At least, that’s what they think…
Here’s the problem: Just because someone’s confident they could spot a phishing attack, it doesn’t mean they can. It’s a false sense of security – and it’s exactly what cyber criminals count on.
New research has found that a huge 86% of employees believe they can confidently identify phishing emails… yet over half of them have fallen for some form of scam in the past.
Think about that for a second.
These are people who knew about phishing, felt sure they wouldn’t be tricked, and yet still got caught out. That’s because cyber criminals aren’t just sending out the obvious “foreign prince” emails anymore. They’re using sophisticated tactics like:
- Emails that look like they’re from your bank or suppliers.
- Fake invoices that appear totally legitimate.
- Messages that seem to come from your own colleagues.
Because phishing scams have evolved, they’re much harder to spot. And when someone thinks they’re too smart to fall for one, that’s when they’re most at risk.
Overconfidence in cyber security is a classic case of the Dunning-Kruger effect – a psychological phenomenon where people tend to think they know more than they do.
What’s the problem with being too confident?
Well, when people believe they’re invincible to scams, they don’t take the necessary precautions. Instead of double-checking links or questioning unexpected emails, they just assume “I’d never fall for a scam” and carry on clicking. This is how cyber criminals end up accessing business systems and data.
So, what’s the good news?
You can lower the risk of getting hit by a phishing attack. But it starts with a shift in mindset. Instead of assuming your people know what they’re doing, make sure they’re properly informed. Regular phishing awareness training can make a massive difference, helping your staff to recognise newer and more subtle scams before it’s too late.
Training alone isn’t enough, though. Your employees also need to feel comfortable reporting anything suspicious, or they might stay quiet about a potential scam. And that gives cyber criminals the upper hand. Creating a workplace culture where security concerns are welcomed (not criticised) is just as important as education.
Cyber security isn’t about intelligence; it’s about vigilance. Even the most tech-savvy employee can be caught off guard by a well-crafted scam. The key is to assume a threat is real, remain cautious, and never rely on confidence alone.
The moment someone thinks “I’d never fall for that” is often the moment they do.
Think Your Cyber Security Is Locked Down? Think Again.
Just when you feel confident about your cyber security setup, a new threat emerges to shake things up.
Right now, a fresh scam is making the rounds—and it’s catching out businesses like yours. The most alarming part? Cyber criminals don’t even need your password to break in.
It’s called device code phishing, and it’s gaining traction fast. Microsoft has already flagged a surge in these attacks, and more are expected.
Unlike traditional phishing—where attackers trick you into entering your credentials on fake websites—this method is far more cunning.
How It Works
Attackers send a convincing email, often posing as someone from HR or a colleague, inviting you to a Microsoft Teams meeting. You click the link and land on a genuine Microsoft login page. Everything looks normal.
Then you’re asked to enter a short “device code” provided in the email. It seems routine.
But here’s the twist: by entering that code, you’re not logging yourself in—you’re logging the attacker into your account. And because the login uses legitimate Microsoft infrastructure, it can even bypass multi-factor authentication.
Once inside, attackers can:
- Read your emails
- Access sensitive files
- Impersonate you to deceive others
It’s like handing over your office keys without realising it.
Why It’s So Dangerous
- You’re on a real Microsoft site—not a dodgy clone.
- You didn’t enter your password into a suspicious form.
- Everything looks above board… but it’s not.
Even worse, traditional security tools may not detect this. And if the attacker captures your session token, changing your password won’t necessarily kick them out.
How to Stay Safe
- Pause before entering any code: Ask yourself—did I request this? Is it from a trusted source?
- Verify requests: Use a separate channel (like a phone call or internal messaging) to confirm legitimacy.
- Know the signs: Real Microsoft logins don’t involve someone else giving you a code to enter.
- Disable device code login: If your business doesn’t use it, your IT team should consider turning it off.
- Train your team: Awareness is your best defence. The more your people know, the safer your business will be.
Need help reviewing your security setup or training your team? Let’s talk
Have you ever sat in a Teams meeting and found yourself gritting your teeth every time someone said, “next slide, please”?
Me too.
And if your business runs a lot of online meetings or webinars, you’ll know the frustration of clunky handovers and awkward pauses when switching between presenters.
Well, there’s good news. And it’s about time.
Microsoft is rolling out a small but mighty update to Teams that’s going to make a surprisingly big difference to how your meetings run.
First, if you’re not too familiar with Teams, let’s quickly cover the basics. It’s Microsoft’s all-in-one communication platform. Video calls, chat, file sharing, and collaboration tools are all combined in one place.
Whether your team is remote, hybrid, or all under one roof, it helps everyone stay connected and productive without needing to jump between lots of different apps.
Back to the update. Microsoft’s introducing a feature that will let multiple people control the presentation slides during a Teams meeting or webinar.
Right now, if you’ve ever tried to co-present in Teams, you’ll know that only one person has control of the slides. Everyone else is stuck asking the presenter to move things along. That’s not only frustrating, but it also breaks the flow of the meeting.
This new feature will let the meeting host hand over slide control to more than one person.
That means if you’ve got a few people presenting different parts of a deck, each of them can take control of the slides when it’s their turn, without stopping the meeting or awkwardly calling out instructions. It sounds like a small thing, but in practice, it’ll make meetings feel much more natural and professional.
This feature has started to roll out already, beginning with the Windows desktop version of Teams. It’ll likely involve the host selecting co-presenters when setting up the meeting. Hopefully, the setup will be as smooth as the presentations will be.
To me, this is one of those updates that should have been added years ago. But hey, better late than never, right?
Alongside other recent improvements like real-time text messaging during calls (great for those who prefer typing over talking), it’s clear Microsoft’s working hard to make Teams more flexible and intuitive.
Need help getting the most out of Microsoft Teams or other tools in Microsoft 365? That’s what my team and I are here for. Get in touch.
Latest from the press room


As companies grow, so does the technology behind them. Connectivity, IT and cybersecurity often end up spread across multiple suppliers, contracts and support models. Simply Connected brings it all together under one provider, making it easier to manage, easier to support, and clearer to understand costs.
At the heart of it is Vorboss’ own fibre network spanning over 750km across London, built, owned and operated in-house, with the same team designing, installing and managing the full setup end-to-end.
“Office technology has become overcomplicated,”
said Rhod Morgan, Chief Operations Officer at Vorboss.
“Many businesses have the right services on paper, but the experience feels disjointed. We wanted to remove the grey areas. Customers manage one relationship, have access to local support and receive one predictable monthly bill. The same team that builds the solution runs and supports it day-to-day.”
Simply Connected includes modular services that flex around each business and scale as it grows:
- Dedicated internet connectivity from Vorboss
- Fully managed office networks
- Managed IT and hardware provisioning
- Cybersecurity
- Ongoing support delivered by local London experts

Vorboss is powering the ambitions of London’s businesses with blazing-fast connectivity, managed IT, and serious cybersecurity. As we grow, we are focused on building a team that reflects the diversity of the customers we serve.
This year’s gender pay gap results mark a clear step forward, with both our median and mean pay gaps in favour of women, placing us ahead of the UK benchmark.
We recognise that lasting change depends on improving representation across roles and levels, and we are taking deliberate action to support this through inclusive hiring, clear career pathways and ongoing development. We are proud of the progress made and remain committed to achieving gender parity across Vorboss by 2028.
Read the full report here.
.avif)

.avif)
