Skip to main content

Woodstock IT Newsletter - February 2026

Page 1


Cyber resilience: It matters more than you think

Most businesses still picture cyber security like an old-school castle.

Big walls. Heavy gates. Keep the bad guys out and hope for the best.

But the modern workplace isn’t a castle anymore. Your team works from home, the office, coffee shops… your data lives in the cloud… and your systems talk to dozens of other services every day.

There is no wall now. And cyber criminals know it.

That’s why the big focus in cyber security has shifted from “stop every attack” to “be ready to bounce back fast when something happens”.

That’s what cyber resilience is all about. Because here’s the truth no one loves to hear: Even well protected businesses get hit. Someone clicks the wrong link. A supplier has a breach. A new AI-powered scam slips past a filter. It happens.

What matters is what happens next.

A cyber resilient business can spot trouble quickly, shut it down before it spreads, and get everything back on track with minimal fuss. It’s less “panic stations!” and more “okay, we’ve got this”.

A big part of that is having systems that constantly keep an eye out for odd behaviour. Things that look suspicious even if no one has pressed a big red alert button.

Modern tools (many using AI) are brilliant at this. They can catch weird logins, unusual file movements, or signs that someone is trying to sneak into a system.

And then there’s the safety net: Backups.

Not just any backups either. Proper, secure, tamper-proof backups that can’t be wiped or encrypted by an attacker.

When these are set up right, recovering from an incident can be surprisingly fast. Sometimes so fast your customers don’t even notice anything happened.

But technology is only half the story. The other half is people.

Your team needs to know what a dodgy email looks like. Leaders need a simple, clear plan for who does what in an emergency. And everyone needs to know that speaking up early is always better than hiding a mistake.

Cyber resilience isn’t about perfect systems. Cyber resilience is about being prepared, staying calm, and recovering quickly.

Does your business need help building a cyber resilience strategy? Get in touch.

DID YOU KNOW...

AI probably won’t attack you on its own

There’s been a lot of talk about AI being used to launch fully autonomous cyber attacks, but new research suggests that reality is still a long way off.

In tests, popular language models could create reliable malicious code on their own. While the models could generate scripts when pushed, the code often crashed, behaved inconsistently, or simply didn’t work. Especially inside cloud environments.

Even with newer models, guardrails stepped in and redirected harmful requests, making the output unusable for real attacks.

TechFacts

Before the iPad ever existed, Microsoft showed off its own tablet, way back in 2000. Bill Gates stood on stage with a pen-powered Windows tablet and confidently predicted it would become “the most popular PC in America”. Hint: It didn’t quite work out (the $2,000/£1500 price tag didn’t help), and the idea never took off. A decade later, Apple launched the iPad and stole the spotlight. 1

2

On 25th February 2010, Apple sold its 10 billionth song on iTunes. It was Johnny Cash’s “Guess Things Happen That Way.”

The lucky buyer, Louie Sulcer from Georgia, won a $10,000 iTunes gift card for clicking Buy. Even more impressive? It took Apple over five years to sell its first 5 billion songs… and only 18 months to sell the next 5 billion. Talk about hitting fastforward.

3

A Chinese humanoid robot recently walked its way into the Guinness World Records. AgiBot’s A2 robot travelled 66 miles (106 km) over three days without ever powering down. Thanks to hot-swappable batteries, dual GPS, lidar and depth cameras, it managed to navigate city streets, bridges and slopes all on its own. It’s a big leap forward compared to earlier robots that collapsed after a few steps.

Use guest chat in Microsoft Teams with caution

Microsoft Teams recently introduced a guest chat feature that lets anyone start a conversation with you using just your email address, even if you don’t normally use Teams.

Handy. But researchers have spotted a gap. When you join someone else’s Teams environment as a guest, you’re protected by their security settings, not your own. That means a malicious host could send phishing links or harmful files without your usual security tools spotting them.

It’s unlikely to affect most people but only accept Teams invites from people you trust. And be cautious with unexpected messages, no matter which platform they arrive on.

INSPIRATIONAL QUOTE OF THE MONTH

“Your most unhappy customers are your greatest source of learning.”
Bill Gates, American businessman and philanthropist.

JULIAN’S NEWS UPDATE

February is a good reminder that strong businesses are built on strong relationships. At Woodstock IT, our focus remains the same: keeping your systems secure, reliable, and quietly doing their job so you can focus on yours.

If you’ve got questions about security, resilience, or getting more value from your IT, we’re always happy to talk. You can book a 30 minute meeting with me by scanning this QR code - no obligation, no pressure. Just honest advice.

Cheers, Julian

Windows 11 is testing a new “resume from phone” feature that lets you continue what you were doing on your Android device directly on your PC.

If you open an online Word, Excel or PowerPoint file in the Microsoft 365 Copilot app on your phone, you can hand it off to your Windows PC with a single tap. Some phones can also pass browser tabs or Spotify sessions. It’s early days. Only a few Android brands support it, and it only works for online files, but it’s a promising step towards smoother cross-device working on Windows.

The AI browser flaw with a simple fix: Good habits

There’s been some talk recently about a technique called “HashJack” that can trick certain AI-powered browser assistants. Sounds dramatic, but don’t panic. This isn’t something the average business is suddenly at high risk from.

But it is something worth being aware of as AI becomes more common in everyday tools.

Some AI browsers now have assistants that help you summarise pages, explain content or answer questions. The research found that, in some cases, those assistants can be influenced by text hidden at the end of a URL (after the little # symbol you sometimes see in a link).

This hidden text never leaves your device, so normal security tools don’t spot it.

If an attacker crafted a very specific, very unusual link, the AI assistant could potentially misunderstand it and offer misleading guidance or try to perform an action you didn’t ask for.

Importantly, the actual website you’re viewing still looks completely normal.

Now for the reassuring part: This isn’t something you’ll accidentally stumble into. It requires someone deliberately clicking a suspicious link, and even then, only certain AI assistants behave this way. And many vendors have already patched their tools.

The same good habits that protect you from phishing attacks work here too.

• Stick to links you trust

• Check the address bar before logging in anywhere

• Keep your browser, devices, and security tools up to date

• And if something feels off about a page or the assistant’s response, close the tab and start again.

You can add an extra layer of safety by keeping strong security software in place and making sure firewalls and filters are up to date. But you don’t need anything complicated.

Stay aware, stay updated, and you’ll stay safe.

Creative Pebble V3 Minimalistic Desktop Speakers

If you want great sound on your desk without spending a fortune (or filling your workspace with giant speakers), the Creative Pebble range is a brilliant pick.

These compact little spheres deliver surprisingly rich, deep audio. Far better than you’d expect for the price. They’re perfect for Teams calls, focus music or a bit of background LoFi while you work. Plus, they take up hardly any space and look stylish on any desk. A small upgrade that makes a big difference. £27.46 from Amazon.

Q: How do I know if our cyber security tools are working?

A: Good security tools should give regular reports, alerts and logs. We can review these with you and check whether anything looks unusual or needs improving.

Q: What’s the difference between a backup and a disaster recovery plan?

A: A backup saves your data. A disaster recovery plan gets your whole business running again quickly after an outage. You need both.

Q: How can we tell if one of our suppliers is a security risk?

A: Ask whether they use multi-factor authentication, encryption, and regular security audits. We can help you assess their risk level.

Business gadget of the month

Turn static files into dynamic content formats.

Create a flipbook
Woodstock IT Newsletter - February 2026 by woodstockit - Issuu