A Password Alone Isn’t Enough (And Hackers Know It)

Welcome to this month’s tech news. Here you will find:
- Your Password Alone Isn’t Enough: And hackers know it.
- Microsoft: What’s new?
- Tech Facts: did you know?
- Q & A: what everyone’s asking
- Quiz Time: test your team!
Enjoy the read, and remember to give us a call if you have any IT concerns – we’re here to help!

Your Password Alone Isn’t Enough
Would you leave your office door wide open overnight? No lock, no alarm?
Probably not.
If that sounds like a security nightmare, here’s the digital equivalent: relying on just a password to protect your business.
Cyber criminals aren’t breaking in — they’re logging in.
Passwords alone aren’t enough anymore. They can be cracked using software or stolen in phishing scams (you know, those fake emails pretending to be from trusted sources). All it takes is one wrong click, and suddenly someone else has the keys to your business.
Once they’re in, they can wreak havoc — stealing sensitive data, locking you out of systems, or demanding a ransom to give access back. No one has time for that.
That’s why Multi-Factor Authentication (MFA) is so important. It’s like upgrading from a basic lock to a high-tech security system. Even if someone gets your password, they’re stopped in their tracks by a second layer of security — a code sent to your phone, a fingerprint scan, or a tap on an app.
Simple for you. A nightmare for them.
Microsoft understands the stakes, which is why MFA is now mandatory for Microsoft 365 admin accounts — and we expect even broader requirements soon. Because it works.
The good news? MFA is quick and easy to set up. And once it’s in place, you’re not just protecting your own access — you’re safeguarding your team, your clients, and your reputation.
If you’re still relying on passwords alone, now’s the time to act.
Need a hand getting started?
We’ll help you lock those digital doors tight — before someone sneaks in. ns can help you make the right choice for your needs. Get in touch and we’ll discuss your options.

What’s new to Microsoft?
Microsoft Edge will get a bold new look
Browser wars are still alive in 2025. But while Google Chrome dominates, Microsoft has a new plan to attract people to Edge: Project Phoenix. This revamp aims to give Edge a modern, Windows 11-inspired design, including features like Split Screen (for viewing two tabs side by side) and Mica, which adds a dynamic, translucent effect to the interface. Phoenix will roll out in waves, letting Microsoft gather feedback and tweak improvements. With dynamic colour themes and a sleek new look, it might just win people over.
New to Teams: Pop out Chat, Copilot and Notes
Microsoft’s testing a new feature in Teams that lets you pop out Chat, Copilot, and Notes panes into separate windows during meetings. This lets you organise your screen for maximum productivity, especially on bigger displays. It’s currently in Teams Public Preview and Microsoft 365 Targeted Release. We expect a full rollout soon.

Did you know?

Tech Facts:
- American mathematician and computer scientist John McCarthy was the first to coin the term “artificial intelligence” way back in 1955. Artificial intelligence is the ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings.
- Globally, people watch, on average, more than 1 billion hours of YouTube content on their TVs every day.
- The Apple Lisa was the first commercial computer with a Graphical User Interface (GUI) and a mouse. Before its launch, all computers were text-based, meaning you had to type out commands from a keyboard. The name “Lisa” stands for “Logical Integrated Software Architecture” but was also the name of Steve Jobs’ daughter.
Cyber criminals are now hijacking Google Ads accounts to run fake ads.
The scheme is called malvertising (malicious advertising), and the ads look like the real deal but redirect people to fake websites designed to steal data or install malware. Popular tools are often impersonated, with convincing clone sites tricking people into downloading harmful software. To stay safe, only download software from official websites and keep your security tools updated.

Q & A
Q: Do we really need backups if we use cloud storage?
A: Yes, having a secondary backup makes sure your data is protected in case of accidental deletion or even a cloud provider issue.
Q: How can we make sure our teams use our tech tools effectively?
A: Provide training, encourage regular use, and integrate tools into daily workflows. Explaining the benefits to your employees can make them keener to use these tools too.
Q: What happens if my device is too old to run the latest version of our software?
A: Outdated software means you’re less secure against cyber attacks. If your device won’t run the latest version, it’s time to look at replacing it.


Time for a Tech Quiz!
- Computer Space, released in 1971, was the first example of what?
- A computer program that runs within a web page is called what?
- What’s the name of a malicious program which replicates itself to spread to other computers?
- A file labelled as .zip indicates what has been done to it?
- In 2004, Apple opened its first European store in which capital city?
See answers below
Until next time,
The GZD team
Quiz answers:
1. An arcade game. 2. Applet, or web application.
3. A worm. 4. It’s been compressed. 5. London.