Discus Systems PLC - IT Support Company in Birmingham West midlands
0800 880 3360
 


Posted by Damien Biddulph on Mon 8th Feb 2016

2015 was a year of ransomware.

Although these offending programs surfaced about 10 years ago, it wasn’t until 2013 that their mass distribution commenced along with fake antivirus scanners, from which file-encrypting malware actually evolved. In 2014, the trend continued, and in 2015, ransomware grew into the prevalent computer threat on the loose.

The campaigns started with targeting end users and are now steadily moving to the realm of organisations, hitting businesses, police departments, even NGOs, and governments. Obviously, these organisations have more data and hence more to lose; furthermore, they have more money at their disposal.

Ransomware variants range from moderately harmful browser lockers to real disasters that encrypt files with strong RSA encryption using 2048-bit keys. Not only do these plagues employ intimidation tactics based on the risk of losing data, but they may also blackmail victims by threatening to put sensitive files online for everyone to see unless the ransom is paid.

The security industry is discovering new variants of ransomware virtually every day. Cybercriminals leverage popular business models, including affiliate schemes and the so-called Ransomware-as-a-Service.

In 2016, computer users need to be particularly watchful to avoid these threats. Data backups are vital in these circumstances, but they are still rarely utilised by the average user. It’s ransomware that is teaching us to make backups.

With plenty of these strains out there, there are three particularly widespread and dangerous ransomware samples that have caused huge financial losses to individual and enterprise users.

СryptoLocker

This sample appeared in September 2013. It accommodated all the characteristics inherent to ransomware: the ability to infect computers by means of phishing and via malicious links, the use of a crypto algorithm to lock a victim’s files, and a notification holding the ransom instructions. The buyout can be done through Bitcoin or a prepaid voucher – either way, the payment is practically impossible to track down.

CryptoLocker reportedly brought its authors several million dollars within a very short period of time. The original build of CryptoLocker is now defunct. It was thoroughly dissected by researchers who came up with a decryption tool and was ultimately taken down by law enforcement.

Regretfully, the cybercriminals were able to share their knowledge and tactics, which resulted in the appearance of new versions along with a number of copycats. The present-day breeds have a different code than CryptoLocker, but they act the same way. For some reason, the fraudsters like to name their new products after this infamous infection, and the difference cannot be determined without in-depth analysis.

New incarnations of this pest are widely present among the most heavily distributed ransomware. The extortionists apparently found the use of spam emails and spear-phishing emails with rogue attachments to be the most effective distribution model. The recent builds are highly sophisticated. To thwart interception by email scanning solutions that can follow hyperlinks, the virus requires would-be victims to visit a rogue site and type a CAPTCHA string before the payload is executed.

TeslaCrypt

TeslaCrypt, which was first detected in February 2015, is currently the most active ransomware. It has since evolved to version 3.0. People may also know TeslaCrypt as the .vvv file virus because one of its variants would encrypt its victims’ files and append them with .vvv extension.

Computer help forums are full with requests to help with decrypting .vvv files. As security researchers are constantly busy looking for vulnerabilities in the ransomware code and sometimes successfully decrypt files encoded by TeslaCrypt, the criminals in their turn improve the code to patch those flaws. TeslaCrypt originally targeted gamers, making them pay to unlock the respective data. Along with documents, therefore, it was also after files related to popular video games.

A popular vector of contaminating computers is via the Angler Adobe Flash exploit. Meanwhile, multiple cases of distribution through spam emails with rogue attachments have been reported as well.

СryptoWall

As with all the most successful and thus dangerous threats of its kind, CryptoWall has gone through four iterations to date. We have CryptoWall 4.0 now. As per approximate estimates, this infection has earned its makers more than $300 million since it went live.

It took the bad guys about a year to get from $20 million to the above amount, which demonstrates how rapidly this underground business is growing. Geographically, the primary targets are the USA, UK, and Japan, followed by Australia and Canada. Other countries are on the list too.

Distribution techniques include the use of spam emails, misleading advertisements, and compromised web pages. CryptoWall payloads mainly arrive with catchy emails that contain ZIP attachments masqueraded as PDF documents. Exploit kits are known to be also involved in the propagation of this threat.

Having intruded on a computer, CryptoWall scans the hard disk, removable media and network shares for a specific array of file extensions. All detected data gets encoded with RSA encryption. The Trojan then obliterates the original files beyond recovery. The most recent variant encrypts the filenames along with the files proper, thus making it very problematic to even figure out what needs to be recovered.

The ‘pay or not’ dilemma

Trusting the criminals is a bad idea, therefore it’s advised to refrain from paying the ransom. The scammers may not decrypt your files at the end of the day. If you pay, this will prove to the offenders that it’s worth moving on with their business.

Thankfully, security professionals have created decryption tools that can recover data locked by several ransomware variants. These services have already done the restoration trick for thousands of people. Search Internet forums for such utilities.

Prevention

As far as prevention goes, it’s very easy. Here are several simple tips that will help you stay on the safe side:

The rule of thumb is a backup, backup, and once again backup. It’s not enough to just say it once, so we need to shout out loud how important backups are these days. Make copies of your important files in several locations that aren’t connected to your PC. Store backups offline on an external hard drive and online on cloud services too.

Never open attachments or embedded links in emails unless you know with 100 per cent certainty that they are safe.

Use reliable anti-malware capable of detecting harmful links before they reach your inbox. Remember security suites featuring behavioural detection are more effective than signature-based ones.

Do not fail to keep all of your applications up to date.

Stay away from suspicious websites. Do not visit pages that look too good to be true or host shady software.

Source: itproportal.com
 
corner spacer corner
 


Posted by Damien Biddulph on Wed 3rd Feb 2016

The defeat by a computer of a human champion at the game of Go has caused much excitement. But computers used to be human themselves, writes Trevor Timpson.

"Computer" comes from the Latin "putare" which means both to think and to prune. Virgil's Georgics - depictions of country life - speak of tidying vines by pruning (fingitque putando).

The playwright Terence left one of the most famous Latin quotations - I am a man and I think nothing human foreign to me (humani… nihil alienum puto).

The link in sense seems to be tidying, setting to rights, balancing an account, reckoning up. The historian Tacitus wrote "if the number of soldiers is counted" (si numerus militum putatur).

Computare (com- means "together") also meant calculate - Pliny's Natural History tells how the breadth of Asia should be "rightly calculated" (sane computetur).

And English has used "compute" for centuries. In 1660 Samuel Pepys wrote of a morning "computing the 30 ships' pay… and it comes to £6,538. I wish we had the money."

A "computer" used to be a person who did calculations. In 1731 the Edinburgh Weekly Journal advised young married women to know their husbands' income "and be so good a Computer as to keep within it."

It was very common for companies and government departments to advertise jobs as "computers", right up to the time when the word was used for early electronic devices.

One was the Atanasoff Berry Computer constructed at Iowa State University between 1939 and 1942. In his paper proposing the machine, John Atanasoff actually used "computer" in both senses.

The Atanasoff Berry computer. Inventor John Atanasoff used "computer" in both senses in the same paper
He noted that "an expert computer" takes eight hours to complete one set of equations. But he also discussed the different mechanical parts of "computers" using the decimal and binary systems.

Of course, the word had always been available to apply to calculating devices.

In 1922 the New York Times described the "target computer" and "battery computer" designed to find the range for firing on enemy ships "and figure out factors quicker than [the] brain can work".

Some internet searches intriguingly point to a use of "computer mecanique" in the Pall Mall Gazette in 1869.

In fact unfamiliar type and automatic spell-checking are to blame. The article turns out to be about an early Paris taximeter, the "compteur mecanique".

But hang on. "Compter" in French, and our word "count" also come from computare. Essentially "compteur" really has the exact same ancestry and meaning as computer.

Etymologists call pairs like this "doublets". And anagrams, of course.

Source: bbc.co.uk
 
corner spacer corner
 


Posted by Damien Biddulph on Wed 3rd Feb 2016

A man from Ceredigion has successfully sued Apple after his watch broke - forcing the company to change its product description.

Gareth Cross, 32, from Aberystwyth, paid £339 last July for his Apple Watch Sport, but spotted a crack in the glass face 10 days later.

The technology giant said work to fix the watch was not covered by warranty, despite its official claim it was scratch-resistant.
Apple has been asked to comment.

Mr Cross took the company to the small claims court in Aberystwyth for breach of the Sale of Goods Act, and has won the case after a six-month fight.

The company was ordered to refund the cost of the watch and pay £429 costs.

Mr Cross said: "I went for the sport version because I am prone to knocking things about a bit and it said it was impact resistant.

"I hadn't even been doing anything strenuous, just sitting around watching TV. When I got to work the hairline crack had got bigger and bigger so I called Apple up to get it repaired."

Mr Cross told the BBC the case did begin to become stressful.

"I couldn't understand why they would want to go to court over the issue, but ultimately I wanted [to] stand by my consumer rights," he said.

"The case did start to become a little stressful, especially toward the end with the prospect of having to attend court to defend my claim against what was the most valuable company in the world."

Mr Cross added he had been relieved when the judge ruled Apple had breached the contract of sale by refusing to fix the watch.
"I plan to buy another Apple Watch, as for the 10 days I had it, I really liked it," said Mr Cross, "but I may wait until the next model is out."

Source: bbc.co.uk
 
corner spacer corner
 


Posted by Damien Biddulph on Wed 3rd Feb 2016

 MASTER Microsoft's latest operating system with these SEVEN handy tips, tricks, fixes and tweaks.

7 top tips to make Windows 10 even faster

The new Microsoft OS was installed on a staggering 110 million devices within the first 11 weeks of its release, the Redmond firm revealed at its annual hardware refresh.

But the free upgrade process has been far from painless.

Users have reported frustratingly slow boot-up speeds, trouble with wifi connections, privacy concerns and issues with child safety features following the jump to Windows 10.

If you have managed to get your version of Windows 10 up and running smoothly – here are SEVEN top tips to master your new operating system.

Turn Off Helpful Tips

If you have been using Windows 10 for a little while, chance are you have already been pestered by notifications on how to use your new operating system.

Microsoft has included a number of prompts and tips which appear at regular intervals from the new unified Notifications tab.

But if you would prefer to work distraction-free – or simply discover the quirks and hidden features in your OS on your own – then here's how to disable the notifications.

Navigate to Settings within your Start Menu, click System and look for the Notifications and Actions tab.

Click on the Notifications and Actions tab and find the switch that reads Show Me Tips About Windows, then turn it off.

Microsoft decided to create an entirely new internet browser to bundle with its new operating system.

Unfortunately it's been a rough few months for the unpopular new browser – which still lacks the customisation and useful add-ons available on the competition.

Luckily its fairly easy to pick another default browser in Windows 10. Launch the Start Menu, then choose Settings.

From the list of available options choose Default Apps.

On the right hand-side find the Microsoft Edge app, which should be underneath the Web Browser heading.

Once you click on it, Windows will prompt you to pick a replacement app.

Windows 10 comes with a slew of flashy new animations that while pretty can quickly become annoying.

If you'd rather strip back the operating system of its shiny new tricks, here's how to do it.

The quickest way to access the Settings is through the Cortana search bar.

Type the word Animations into the search bar, which is next to the Start Menu button in the bottom left hand-side of the screen.

Scan through the virtual assistant's results until you see Turn Windows Animations On Or Off.

Click on the option – and then toggle the option to Play Animations In Windows to Off.

If you are using Windows 10 on a laptop and there is no plug in sight – this is a great way to squeeze as much juice as possible out of your device's battery.

The Battery Saver mode is found under the Battery/Power icon in your Windows Taskbar, in the bottom right-hand corner, next to Date/Time.

Tap the icon and then choose Battery Saver.

You can also pick the battery forgiving mode form within the Settings panel, which can be launched by pressing Windows + I then navigate to System > Battery Saver.

Windows 10 Battery Saver mode will only appear when you are running on battery power.

If you are still running low on power, Windows 10 has additional Energy Saver settings under its advanced power settings, found within the Settings app.

Anyone who has previously used Windows 8 will be familiar with this shortcut.

Right-click the Start Menu icon, in the bottom left-hand corner of your screen, to reveal shortcuts to all of Windows 10's essential admin tools.

Alternatively, you can summon the same Settings panel by pressing Windows Key + X.

Using God Mode

Windows 10 splits its plethora of settings and options across two main panels, Settings and the Control Panel.

This can be a little confusing – as it's never quite obvious which setting option is where.

Luckily Windows 10 has a handy little hack which brings all of settings available for the operating system into one useful window.

It's called God Mode.

To access the hidden settings menu, create a new folder on your desktop by Right-Clicking and tapping Create A New Folder.

Then rename the folder with this code – GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}

Windows will then change the standard folder icon to a science-fiction panel.

Tap your new icon to access the swiss army knife of Windows 10 options.

For some reason, Windows 10 strips out support for watching DVDs.

However those who took advantage of the free upgrade are eligible for a free download of Microsoft's Windows 10 DVD Player app.

The barebones app – which could charge you a subscription fee at a later date – is not a worthy replacement for the now-dead Windows Media Player.

But it does allow you to play DVDs and CDs on your Windows 10 machine.

You can use Cortana to search for the app too, which is found in the Windows 10 Store.

Source: express.co.uk
 
corner spacer corner
 


Posted by Damien Biddulph on Wed 3rd Feb 2016

MICROSOFT has stepped up its next-generation operating system to a "recommended" update for all Windows 7 and Windows 8.1 users. The 3GB installer file will now download automatically to your machine.

As promised, Microsoft has upgraded its Windows 10 operating system from an "optional" to a "recommended" update for all Windows 7 and Windows 8.1 users.

The Redmond technology firm first announced the change, which rolled out across Windows Update this week, back in October.

Microsoft is getting increasingly aggressive with its plans to get users to upgrade.

Terry Myerson, Executive Vice President of Windows and Devices Group, posted in the company blog: "As we shared in late October on the Windows Blog, we are committed to making it easy for our Windows 7 and Windows 8.1 customers to upgrade to Windows 10.

"We updated the upgrade experience today to help our customers, who previously reserved their upgrade, schedule a time for their upgrade to take place"

So what does the change to an "recommended" update really mean?

Microsoft uses a number of pop-up and banners to advertise Windows 10 to users on older operating systems

Depending on your Windows Update settings, this change could cause the Windows 10 upgrade process to automatically start on your device.

Microsoft will start to download the 3GB installer to your PC with your input, so that it's ready for whenever you chose to commit to Windows 10.

This is a hefty sized file, and could cause issues with users who have a download limit attached to thier monthly broadband contract.

Fortunately, before the upgrade completely changes the operating system on your machine, you will asked to choose whether or not to continue.

Microsoft has enjoyed enormous success with its latest operating system, Windows 10
And if you do upgrade from an older version of Windows to Windows 10 – intentionally or accidentally – there is a months grace when you can rollback to your previous OS without hassle.

"If you’re already running Windows 10 – thank you!" Mr Myerson published.

The news comes hours after Windows 10 became the world's second most popular desktop operating system, behind Windows 7.

Windows 10 is also the Microsoft operating system with the fastest adoption rates, with some 200 million activations across the globe by December 2015.

Microsoft is currently hard at work on its next blockbuster Windows 10 update, dubbed Redstone. The US firm has reportedly shelved some features planned for its next major operating system update.

Microsoft has previously stated an ambition to get one billion devices across the globe running Windows 10 within two years of the operating system's release.

Express.co.uk was impressed with the new operating system, in our review we said it marked "a brilliant start to the next chapter for Microsoft Windows."

But the new OS has not been without issues.

Users have reported frustratingly slow boot-up speeds, troublesome wifi connections, fees for basic functionality included in earlier versions of Windows, privacy concerns and issues with child safety features following the jump to Windows 10.

Windows 10 is currently a free operating system upgrade to customers running genuine versions of Windows 7, Windows 8 and Windows 8.1.

Source: express.co.uk
 
corner spacer corner
 


Posted by Damien Biddulph on Wed 3rd Feb 2016

BT has apologised after "several hundred thousand" UK customers had their broadband services cut off.

Down detector, a website that monitors internet failures, reported thousands of cases, including in Glasgow, London, Birmingham and Sheffield.

At about 23:00 GMT BT said it was confident services had been "fully restored" but that some customers might need to reboot equipment.

The company said a faulty router was to blame for the problem.

BT phone services were unaffected by the outage, which began about 14:30 GMT.

A spokeswoman added: "Most customers will be able to access their broadband without taking any action but some may need to reboot their equipment."

Hundreds of people took to social media to express their frustration using the hashtag #BTdown, which began trending on Twitter.

BT acknowledged that "large numbers of customers" were "experiencing temporary issues with their broadband services".
It did not initially give details of what may have caused the issue but said: "There is no evidence at this stage to suggest that we were subject to a malicious attack."

Its website had also crashed for a time and some users reported that its customer service line was down.

Source: bbc.co.uk
 
corner spacer corner
 


Posted by Damien Biddulph on Mon 1st Feb 2016

The Economist estimates that by 2020 approximately 80% of adults around the world will carry at least one super-mobile computer device that enables them to connect to the Internet, using services such as electronic payment, real-time social networking, and information sharing. Gartner estimates that around 90% of businesses will support "Bring Your Own Device" practices at the work place by 2017. By 2018, devices carried by employees themselves will double the amount owned by the company. This marks the beginning of the global Internet age.

Here are the eight most frequent issues faced by small to medium corporations when establishing and using a wireless connection.

1. Wi-Fi Dead Spots

Dead Spots often cause trouble for users, and sometimes even affect customer satisfaction with the provider. The design of traditional access points could not reach distant areas and the walls degrade Wi-Fi signal quality. Smart Antenna technology is one of the solutions to beat this challenge. Smart Antenna solution eliminates the dead spots, relying on the antennas’ full 360 degree coverage, dynamic patterns, and situational awareness to optimize Wi-Fi experiences.

2. Slow and Unstable Connection

Even when connected to the Internet, many users commonly experience unstable or slow connection speeds with their wireless connections. This is especially severe in areas where multiple access points are installed. Signal interference is one of the reasons for unstable connection. The interference is resulted from the various equipment of Wi-Fi environments coupled with different electromagnetic waves. Wi-Fi signals are the most easily affected, which poses another challenge for providing a high quality wireless connection.

3. Efficient Bandwidth Usage

One of the greatest challenges in managing a wireless connection is ensuring that every user within the same environment is satisfied with their connection speed and usage stability. With the more usages on bandwidth-hungry applications, bandwidth optimization and efficiency have become key factors that determine the quality of the user’s experience. This is especially true in business environments.

4. Connection Safety and Cyber Security

Apart from efficiency, connection safety and cyber security has also become one of the key concerns for many in the virtual world, especially regarding cyber security of personal privacy and rights. Related issues tend to make headline news due to their severity, which also makes it one of the frequent issues that keep CTO/CEO's awake at night. As a result, connection safety and cyber security is one of the key points of consideration when designing a wireless network.

5. IT Investment Assessment

Increasing management efficiency and seeking continued growth are primary targets for all profit-seeking enterprises. The underlying cost for Internet system renewal adds to the burden of operation costs, which has also become a key concern for managers. Not only do managers have to consider the cost to upgrade the system, they also have to think about how to prevent usage expenses from rising when increasing efficiency.

6. Internet Management and Deployment Efficiency

Internet management is the daily work of all IT personnel. Traditionally speaking, managing the connection system topologically has been the norm. However, this method is extremely time-consuming and prone to mistakes that cause management issues or even incomplete job handovers.

Moreover, when establishing or upgrading new systems, IT personnel must be on their toes, hoping that the assembly will be completed on time or otherwise risk affecting the normal operation of the Internet system. Hence, an optimizing management tool which could provide management and deployment efficiency is a very important key factor that determines work performance.

7. Easily Blend-In Product Design

Wireless access points should be installed in high locations (for example, close to the ceiling) for better coverage. Enterprises that place an emphasis on the office environment, or ones that emphasize interior design, such as hotels, restaurants, and conference centers, must also consider whether the product matches the interior design of their environment in addition to the product’s efficiency.

8. Eco-Friendly Quality

As environmental, public construction, and regional safety regulations become increasingly stringent, quality demands such as function optimization, usage safety, eco-friendly and energy saving design, interior flame-retardant, and poison-retardant materials have become important considerations in product procurement.

Source: zyxel.com
 
corner spacer corner
 


Posted by Damien Biddulph on Mon 1st Feb 2016

E-books are increasingly being used in classrooms by children as young as three - and they are making a big difference to the reading habits of boys. But there are concerns the expansion of electronic devices in schools may undermine the position of traditional paper books.

E-books, where stories are loaded onto a tablet or laptop, are used in about two-thirds of schools across America, says the School Library Journal.

But their use in English schools is sporadic.

The National Literacy Trust has been conducting research over the past year to understand their impact.

At 40 schools across the country, 800 children were encouraged to use e-books and share their feelings.

Physical thing'

The average project ran for four months. But over that period on average boys made 8.4 months of reading progress using them, compared to just 7.2 months of progress among girls.

Reluctant readers also made good progress, with a 25% increase in boys reading daily.

Perivale Primary School, in west London, took part in the research.

Summit, who is 11, said: ''If you really want a book, you can just get it online. It's so easy and it's made me read more. I probably read every day now.''

10-year-old Hebah disagreed. ''I've always been a real bookworm,'' she said. ''Personally I still prefer paperbacks, because I get more of the feel of the real book.''

''We're just trying to create a bigger library,'' explained Jordan McNamara, who teaches using E-books in his classes. ''The children get to choose the books themselves. We're just after more reading, so anything we can do to get the kids to read more is great.''

Award winning children's poet and author Michael Rosen has reservations.

''It's really important to hang on to picture books,'' he said. ''We can pass them about, we can flip them, we can share them in ways that's quite difficult with tablets. That physical thing of sitting with a picture book in a classroom is important.''

'Adaptability'

He added: ''Something special goes on when our thoughts engage with print and picture. Words and pictures go together but they're not the same thing. It's like there's another story being told in a different way.

Boys in particular benefit from using e-books, research suggests

''With books for older children, text only books, it's less important. But picture books are very important for inspiring younger children and we cannot lose that.''

Researchers are now embarking on further studies to try and understand why boys in particular respond so well to E-books.
Irene Picton, from the National Literacy Trust, said the findings so far suggest electronic books have a part to play in lessons.
''In focus groups children said the adaptability of E-books gave them more confidence to read. The text can be enlarged and the screen colour can be changed.''

Young readers also liked having books on their mobile devices so they could play games and socialise, but also read.
She added: ''I'd describe E-books as a tool in the toolbox for anybody who knows a child who doesn't seem to like reading very much."

Source: bbc.co.uk
 
corner spacer corner
 


Posted by Damien Biddulph on Mon 1st Feb 2016

The Computer Science for All initiative will help kids get tech-savvy.

The White House isn't just relying on legislation to make computer science education a priority in the US. President Obama has launched a Computer Science for All initiative that gives states $4 billion in funding to expand computer science in K-12 schools through a mix of better course materials, partnerships and teacher training. The move also sends another $100 million directly to school districts, unlocks $135 million in funding from government organizations and gets further cooperation from both local governments as well as tech leaders.

Some of those leaders include companies that have already promised support for the President's educational initiatives. Apple, Cartoon Network, Code.org, Facebook, Microsoft, Salesforce and Qualcomm are all widening their education efforts, investing in programs or both to help improve computer science in the country.

Throwing cash at a problem won't make it go away, of course, and there aren't any guarantees that the money will make a difference. However, the effort at least tackles one of the core issues head-on: getting computer science into schools in the first place. Roughly three quarters of schools go without any CS programs, and 22 states don't accept these classes as credit toward a high school diploma. If the extra funding works as planned, it'll get CS courses into more schools and help create a generation of kids that know how to code before they reach college.

Source: engadget.com
 
corner spacer corner
 


Posted by Damien Biddulph on Mon 1st Feb 2016

Mobile network Three has defended its decision to end a popular "all you can eat" phone contract.

Thousands of customers currently paying £17 a month for unlimited data and calls have been told they will be moved onto a new £30 tariff if they do not opt out within 30 days.

The company has notified customers by post and said it would also text them.

Three said the more expensive plan was the closest remaining deal offering unlimited calls and data.
It stopped offering the £17 monthly deal to new customers in 2014 and said it was phasing out "legacy" tariffs, but the BBC understands hundreds of thousands of customers still use the tariff and will be affected by the switch.

'Inevitable' change

One mobile industry analyst told the BBC the demise of unlimited data plans was "inevitable".

"Consumer data usage is growing exponentially," said Ben Wood from CCS Insight.

"The networks are seeing huge growth in data consumption as people watch more video content at ever-higher resolutions on their smartphones. At some point certain all-you-can-eat tariffs become uneconomical."
While the network does still offer plans with unlimited data and calls, Three says its average account holder consumes just 4.9 gigabytes of data per month.
The firm had 8.8 million customers in 2015, according to its website.
Some have posted their anger at the tariff change online, ironically tagging their posts #MakeItRight - the hashtag Three uses in its advertising campaign.

"That's how you lose brand loyalty," tweeted software engineer Joseph Longden.

"Stop forcing loyal customers like myself into new plans which are almost double the price," wrote Nathan McLean.

Three's advertising campaign says "the mobile industry sucks" but pledges to "make it right"
In a statement, Three said: "In March 2014, we introduced new price plans giving customers more options in the size of their data and voice bundles, as well as limits and alerts to prevent bill shock.

"We have a lot of tariffs that we no longer sell and moving customers to one of the new plans will ensure they can enjoy the benefits of these plans."

Source: bbc.co.uk
 
corner spacer corner

Veeam Specialist Microsoft Small Business Specialists Birmingham Microsoft Gold Certified Partner Birmingham Siemens Solution 1 Reseller Birmingham Sonicwall Specialists Birmingham Business Link Approved Birmingham Fujitsu Primergy Certified Partner Birmingham Facebook Follow us on Twitter ESET NOD32 VMWare
IT Support
IT Services
IT Solutions
Get Support Now
Sitemap
© 2018 Discus Systems plc. All rights reserved. Content Management by Verve Digital