Windows 7 – End of Support

Microsoft made a commitment to provide 10 years of product support for Windows 7 when it was released on October 22, 2009. This 10-year period has now ended as of January 14th 2020, and Microsoft has discontinued Windows 7 support.

If you continue to use Windows 7 , your PC will still work, but it will increasingly become vulnerable to security risks and viruses and the riks of lack of support as you will no longer receive software updates and support, including security updates, from Microsoft and so not advisable.

ITP and Microsoft strongly recommend that you use Windows 10 to avoid the above security risks and the situation where you may need service or support that is no longer available.

It might be possible to upgrade your current Windows 7 or Windows 8 PC to Windows 10 depending on the software it’s running and it’s current specification or you will need to replace the PC with a Current one Running Windows 10

ITP are well versed in helping with the transition. Please feel free to get in contact if you would like us to either take a look at your existing machine for the possibility of an Upgrade or to replace the PC and migrate the data.

Happy New Year from ITP

ITP would like to wish all of our clients a Happy New Year! We hope you all enjoyed the break and are ready for 2020.

We have hit the ground running with several large projects to get us started into 2020, including a full IT refresh and a new VOIP phone system being installed.

Please feel free to get in touch if you would like help with any of your technology needs.

Business Continuity Testing

As per recommended practices ITP recently performed a proactive Disaster Recovery / Business Continuity test for one of our Legal Services Clients.

We were succesfully able to verify that they could work in the event of a datacentre failure . We tested:

  1. the speed of spinning up the redundant protected servers in the cloud
  2. the dissemination of connection details to the test users located at their homes
  3. the ability/speed of the users to connect to the alternate DR environment independently
  4. the usability and responsiveness of critical line of business application and processes

ITP were able to implement additional procedures for processes that needed faster responses and update end user manuals that will be kept with off site pc’s.

The end user was very pleased with the results.

Sutton Business Awards

At a glittering Awards Gala, ITP ‘s awesome team won 2 Awards including Business of the Year 2019 & Best SME, a further Commendation for Innovation and Growth and were finalists in 2 more. Thanks to our team, clients and partners for the amazing journey.

Intel vulnerability – Meltdown

  • It has recently come to light that there is a vulnerability with Intel processors which could potentially give access to sensitive information on your machine via the use of malicious software. This information includes personal details and passwords. Intel processors are in around 80% of machines which can include laptop and desktop PC’s, Mac’s and some mobile devices.

At this moment in time there is no evidence that any malicious software has been written and distributed that can take advantage of this vulnerability, however it’s not something that can be ruled out and ITP would recommend taking the following precautions:

  • Make sure all your Windows / Mac OS updates are installed. There is a patch to be released this Tuesday for Microsoft Windows which should stop the vulnerability and it should be downloaded straight away. If any help is needed with this then please feel free to contact us.
  • Make sure you have Antivirus software which is in subscription and up to date. This is also something we can help with if you’re unsure.
  • Be vigilant when opening email attachments or website links. Always make sure it’s something you trust and if you’re unsure then don’t click it and delete any suspicious emails straight away.

As mentioned in the points above, Microsoft are releasing a patch on Tuesday to fix the issue. Some reports are suggesting that the patch could have a negative impact on the performance of Intel processors, causing anything from a 5% to 30% reduction in performance. Older machines are said to be the worst affected.

If you have questions or concerns about the Impact on your IT from this this or any other IT Matter, feel free to contact us.

Locky Ransomware

One of our Partners sent us over the information below:

On August 9, the first campaign of a massive, worldwide ransomware attack was detected—and 62,000 phishing emails related to the attack have been identified as of last week. This new Locky-variant continues to unfold, powered from more than 11,625 distinct IP addresses in 133 different countries (the top five being Vietnam, India, Mexico, Turkey and Indonesia). As an MSP, here’s what you need to know about this new Locky-variant ransomware and how you can ensure you remain protected against it.

Looking Out for Locky

Locky is a common type of ransomware that emerged in 2016 and has since been utilized in a wide range of cyber attacks. However, this new variant is one we have not seen before. So, how exactly does this variant work?

The main way this Locky-variant is spread is by social engineering. Through phishing emails, users are tricked or induced into opening a docx, pdf, jpg, zip or other file containing the ransomware called “IKARUSdilapidated,” after a phrase that appears in the code string. If the user follows through and opens the attached file, the ransomware then takes over.

From here, all files that match particular extensions are encrypted and filenames are converted to a unique 16 letter and number combination with the .locky file extension. After the files are completely encrypted, users are given instructions for downloading a Tor browser and directed to a site on the dark web where the cyber criminals demand a ransom payment of up to one bitcoin (which equates to over $4,000).

Many endpoint protection solutions have been updated to detect Locky ransomware, however, this variant is able to slip past certain tools because it is so new. Thus, as a new ransomware variant, it is read as an “unknown file” and is allowed entry by organizations not using a “default-deny” security posture (which denies entry to all unknown files until it is verified that they are safe to enter the IT infrastructure), making it more difficult to detect and remediate.

Due to this it is vital that you never open an email attachment unless you are positive you know where and from whom it has come from.


Unfortunately, no matter how strong your security solutions, attacks will continue to slip through the cracks. Therefore it’s very important that you have a proper, reliable backup and disaster recovery solution with online and offline backup solutions as the ultimate failsafe against successful attacks.

Please feel free to contact us regarding this and we’ll be more than happy to help.