Focus Tech Insider – March

This month we’re focusing on something simple but important.

Stronger passwords.
Smarter awareness.
And better identity protection.
The small habits that prevent big problems.

Inside this edition:

  • What we’re seeing right now across Lancashire and Merseyside
  • Why phishing emails are becoming more convincing
  • A look at Operational Technology and why passwords still matter
  • Our secure password and passphrase generator
  • Practical steps you can take straight away

No drama. Just clarity.

Contents:

Did one of these fool you last year?

You’re not imagining it. Scam emails are getting harder to spot.

Phishing attacks are becoming more convincing, more targeted, and more frequent.

Phishing is when criminals trick you into clicking a link, opening an attachment, or logging in to a fake website.

Sometimes they pretend to be Microsoft or another big brand.

But increasingly, the email comes from a real company account that has already been compromised.

That is what makes modern phishing so dangerous.

It might look like a genuine supplier.
A real invoice.
A legitimate contact.
Because technically, it is coming from a real mailbox.

Security researchers noticed a big spike in phishing towards the end of last year. That makes sense. People are busy, inboxes are full, and there’s a lot going on with shopping, renewals, year-end tasks, and even job hunting in January.

Scammers know this and time their attacks carefully.

What makes things more worrying is how realistic these messages have become. Criminals now use AI to create fake login pages and “security alerts” that look almost identical to the real thing.

Some attacks don’t just steal your password, but also grab the extra security codes you use to log in, allowing attackers straight through the front door.

So how do you stay safe?

The most important habit is to slow down. Any email or text that claims there’s an urgent problem with an account should immediately raise suspicion.

Instead of clicking, open your browser and go directly to the company’s website yourself to check. If something feels off, it probably is.

Extra protection matters more than ever.

Multi factor authentication adds a second step when logging in, usually a code sent to your phone or generated by an app. That alone blocks a large number of attacks.

But increasingly, businesses also need to think about Identity Threat Protection.

Identity Threat Protection monitors how accounts behave. It looks for unusual logins, impossible travel activity, suspicious behaviour and compromised credentials. It helps detect when an identity has been hijacked, even if the password and code were entered correctly.

 

Because modern attacks are not just about guessing passwords.
They are about stealing identities.

Did You Know...

Technology Update

Windows 11 will get faster, friendlier, and smarter

Microsoft is working on a big upgrade to Windows 11. It will make new laptops faster, more efficient, and better at using AI, with longer battery life too.

They’re also improving everyday features, like a cleaner dark mode and a taskbar calendar that shows your upcoming meetings.

And in Microsoft Teams, new updates will make hybrid working easier by automatically recognising when you’re in the office.

Team Update

We’re pleased to share that Niall Colbenson has joined our Service Desk team.

Niall will be working alongside the team to help manage requests and ensure everything runs smoothly.

You may receive emails or calls from Niall. These are genuine communications from our team.

He will also be part of our on site support, so you may see him during future visits.

If you have any questions, just contact us in the usual way.

Free Secure Password Generator​

Weak passwords are still one of the biggest causes of small business security issues.

Not sophisticated hacks.
Not Hollywood style cyber attacks.

Just simple passwords that are easy to guess.

Use the tool below to generate a strong, random password instantly.
It runs in your browser and does not store anything.

Simple. Secure. Done.

Focus Technology Solutions Limited logo

Secure Generator

Generated in your browser using secure randomness. Nothing is stored or sent anywhere.

Strength
Not generated
24
Passwords are locked to 24 characters for strong protection.
6
Passphrases are easier to type and remember. We add a two digit number and a symbol at the end for extra strength.
Passwords include uppercase, lowercase, numbers and symbols.
Tip: use a different password per system and store them in a password manager.

Six Years of Focus

This month marks six years of Focus Technology Solutions.

Six years of supporting businesses across Lancashire and Merseyside.

Six years of upgrades, migrations, urgent fixes and long term planning.

But more importantly:

Six years of relationships.

We’ve seen local businesses:

  • Expand their teams
  • Move into larger premises
  • Shift fully to cloud systems
  • Navigate uncertainty
  • And grow with confidence

The biggest shift we’ve noticed in six years?

Business owners don’t just want IT Support that fixes things.

They want clarity.
Consistency.
And someone thinking ahead.

That’s what we’ve been building toward year after year.

So whether you’ve worked with us from the early days or only recently joined us, thank you.

We genuinely appreciate the trust.

When Weak Passwords Put Operations at Risk

Machines start up. Systems talk to each other. Processes run automatically.

For many businesses, this technology isn’t just helpful.

It is the business.

Behind all of that sits something called Operational Technology, often shortened to OT.

Unlike office systems like email or file storage, OT controls physical processes. It tells machines what to do, when to do it, and how to do it safely.

  • Production lines.
  • Control panels.
  • Sensors.
  • Monitoring systems.

All of it relies on secure access.

The challenge is that many of these systems were installed years ago.

They were built to be reliable.

They were built to be safe.

But they were not always built with modern cyber security in mind.

And one of the biggest weak spots is still surprisingly simple.

Passwords.

In operational environments it is still common to see:

  • Shared logins
  • Passwords written down
  • Accounts that haven’t changed in years

That may have worked when systems were completely separate from office networks.

But today, operational systems and office systems are often connected.

If someone gains access to a standard office account, they may be able to move further into systems that control physical processes, especially where passwords are reused.

This is why it matters.

Because attacks on operational systems do not just affect data.

  • They can stop production.
  • Delay orders.
  • Damage equipment.
  • Create safety risks.

The good news is that improving password security is one of the simplest and most effective steps you can take.

Longer passwords are much harder to guess.

Using different passwords for different systems prevents one issue spreading.

Adding a second step to log in, such as a code sent to a phone, can block access even if a password is stolen.

Operational systems are designed to run quietly in the background.

When everything works, no one thinks about them.

But the systems that keep your business moving deserve the same attention as your office technology.

Getting password policies right may not be glamorous.

But it is one of the simplest ways to protect your people, your operations, and your business continuity.

Operational security starts with the basics. Strong passwords still matter.

FAQs

What is phishing in simple terms?

Phishing is when someone pretends to be a company you trust and tries to get you to click a link, open an attachment or enter your login details.

The message usually looks normal at first glance. That’s why it works.

Criminals now use more realistic designs and better language. Some even use AI tools to copy legitimate login pages and security alerts.

They rely on people being busy and reacting quickly.

Act quickly.

Disconnect the device from the internet if possible and contact your IT Support provider immediately. The sooner it is checked, the easier it is to limit any potential impact.

Yes.

A randomly generated passphrase made up of several unrelated words, plus a number or symbol, can be extremely strong and often easier to use than a complex short password.

The key is that it must be random and unique.

For business systems, we recommend at least 16 to 24 characters.

Longer passwords are dramatically harder to crack than short ones.

Multi factor authentication adds a second check when logging in, usually a code sent to your phone or generated by an app.

Even if someone steals your password, they still cannot get in without that second step.

Because modern office systems and operational systems are often connected.

If one account is compromised and passwords are reused, attackers may be able to move further than expected.

Strong, unique passwords reduce that risk.

No.

Passwords and passphrases are generated directly in your browser and are not stored or transmitted anywhere.