Get in Touch

As you may be aware, Apple launched iOS 11 last Tuesday, 19th September, 2017

However, there is a bug in the latest iOS which affects the native Apple Mail app ( on your iPhone or iPad which will prevent you from sending or replying to emails.

You might see an error message that says "Cannot Send Mail. The message was rejected by the server."

This will affect you if your email account is hosted by Microsoft on or Office 365, or an Exchange Server 2016 running on Windows Server 2016 you will have this issue.

Although, Apple and Microsoft are trying to resolve this issue - there has been nothing released yet.


You have these immediate options:

  1. Delay upgrading to iOS 11
  2. Too Late ?
    1. Install the Microsoft Outlook app from the app store (it doesn't have this issue)


B. Rollback to a previous version of iOS

Call us if you are stuck and still having any issues on 1300-SENSIBLE (736-742)

Emma loved tweaking photos on her Android phone.

She’d heard rave reviews from her friends with iPhones about Prisma, a new iOS app for image editing. So when she heard Prisma would soon be released for Android, she logged in to the Google Play Store to see if it was there yet.

To her surprise, she found one that looked just like what her friends were describing. Delighted, she downloaded and started using it. Meanwhile, the app—a fake—was busy installing a Trojan horse on her phone.

When she got to work the next day, she connected her phone into the company wi-fi network as usual. The malware jumped from her phone to the network. Yet no one knew. Not yet, but that was about to change…

Now, this isn’t necessarily a true story (at least, not one we’ve heard of—yet…), but it absolutely could have been. And similar situations are unfolding as you read this. Yes, possibly even at your company…

Fake apps exploded onto iTunes and Google Play last November, just in time for Christmas shopping. Apple “cleaned up” iTunes in an effort to quell users’ concerns, but hackers still find workarounds. Unfortunately, these fake apps pose a real threat to the security of your network. Especially if your company has anything but the strictest BYOD (bring your own device) policies in place. And the more your network’s users socialise and shop on their smartphones, the greater the risk of a damaging breach on your network.

Fake apps look just like real apps. They masquerade as apps from legitimate merchants of all stripes, from retail chains like Iconic and Footlocker, to luxury purveyors such as Christian Dior. Some of the more malicious apps give criminals access to confidential information on the victim’s device. Worse yet, they may install a Trojan horse on that device that can infect your company’s network next time the user logs in.

So what can you do?

First, keep yourself from being fooled. Anyone can easily be tricked unless you know what to look for. Take the following advice to heart and share it with your team:

Beware of Fake Apps!

In case you weren’t aware, one of the latest and most dangerous Internet scams is fake apps. Scammers create apps that look and behave like a real app from a legitimate store. These fake apps can infect your phone or tablet and steal confidential information, including bank account and credit card details. They may also secretly install on your device malicious code that can spread, including to your company network.

Take a moment and reflect on these nine tips before downloading any app:

  1. When in doubt, check it out. Ask other users before downloading it. Visit the store’s main website to see if it’s mentioned there. Find out from customer support if it’s the real McCoy.
  2. Check the Spelling. Many fake apps are made in haste, often where English is not a native tongue. Many have broken English grammar. Users should pay attention to spelling and grammar in any app descriptions if they have any doubts about its originality.
  3. Check the reviews. If you do decide to download an app, first check it’s reviews. Apps with few reviews or bad reviews are throwing down a red flag.
  4. Check the Developer’s Name. Users need to check for the name of the developer in the corresponding category, and avoid downloading apps that have a wrong or misspelled developers’ name
  5. Never, EVER click a link in an e-mail to download an app. Get it from the retailer’s website, or from iTunes or Google Play.
  6. If in doubt, directly type in a store’s website in your browser. and look for an icon or button that reads "Get our app." This will take you to the App Store or Google Play store where you can download the correct app.
  7. Offer as little of your information as possible if you decide to use an app.
  8. Think twice before linking your credit card to any app.
  9. Check the Deal. If it sounds too good to be true – it probably is.

Most importantly, get professional help to keep your network safe. It really is a jungle out there. New cyberscams, malware and other types of network security threats are cropping up every day. You have more important things to do than to try and keep up with them all.

Also, ask your IT professional about implementing a best practice BYOD policy for your organisation.

“We live in a world where information equals power. With the influx of online file-sharing solutions, distributing information has become easier than ever. As a result, it is now easier for information to fall into the wrong hands intentionally or unintentionally.” -Terri McClure TechTarget.

Bring-your-own-device (BYOD) policies and an increasingly mobile workforce are putting new pressures on IT and changing the requirements for how workers want (and need) to access corporate data.

Dropbox has become the predominant leader for mobile file access. Unfortunately, what works for family pictures does not work with corporate files. In most cases, Dropbox’s quick to install, easy-to-use, consumer-grade services present unacceptable security, legal and business risk in a business environment.

Here are the top 5 reasons we now recommend only SensibleSync for businesses .

  1. Data Theft. Business owners are simply unaware when an instance of Dropbox is installed and are unable to control which employee devices can or cannot sync with a corporate PC. Use of Dropbox can exponentially increase the chance of data being stolen or shared with the wrong parties.
  2. Data Loss. When managers cannot manage and monitor file sync activities across an organisation, they risk losing critical data. Any employee may adopt Dropbox and starts using it to sync and share sensitive files without proper oversight. You cannot manage data sprawl, initiate remote wipes in the case of lost devices, and are unable to guarantee that files are properly shared with only the right people.
  3. Lawsuits. Dropbox gives carte blanche power to employees over the ability to permanently delete and share files. This can result in the permanent loss of critical business documents as well as the sharing of confidential information, which can break privacy agreements in place with clients and third parties.
  4. Compliance Violations. Many compliance policies require that files be held for a specific time and only be accessed by certain people (or have to stay in Australia). In these cases, it is imperative to employ strict control over how long files are kept and who can access them. Since Dropbox has loose (or non-existent) file retention and file access controls, businesses that use Dropbox are risking a compliance violation. (Dropbox doesn’t disclose where its data is stored).
  5. Loss of Accountability. Managers whose employees use Dropbox do not have access to detailed reports and alerts over system-level activity. As a result managers don’t have control of or visibility into how files have been edited, shared, or deleted. Business-grade, admin-controlled file sync services allow managers to view a comprehensive audit trail that details who touched or modified a file at any given point and even restrict which devices can be used.
  6. Loss of File Access. Dropbox does not track which users and machines touched a file and at which times. This can be a big problem if you are trying to determine the events leading up to a file creation, modification, or deletion. The best way for business to handle this is to deploy a company-approved application that will allow IT to control the data, yet grants employees the access and functionality they need to be productive wherever they are. Employees whose companies provide them with a secure, easy-to-use file sync service will see no need to bring Dropbox into the workplace.
  7. Productivity Losses. Businesses need to be as productive as possible. Consumer-grade file sync services do not enable corporate file servers to be synced to the cloud. Users have to double-handle files they need to share (from central server into/out of dropbox) or they have to use cumbersome VPN methods or even work on the wrong version of a document. By deploying SensibleSync, managers can authorise network documents to be automatically synced for both Head Office and remote workers.

If you would like more information on SensibleSync :

Phone: 1300-SENSIBLE (736-742)


As end users of Google’s suite of productivity enhancing tools, we all  have a right to know that the company is doing everything in its power to protect its billions of users - whether they are working from a desktop, browsing while they are on the go, or working remotely. But what measures do Google have in place to keep all its thousands of users safe and secure in the face of rising cyber crime? How can you be sure that, no matter what device you are using, you stand the best chance of protecting yourself from attack?

With more than one billion people using Google’s search engine on their desktops, and over a billion more accessing it through mobile devices, it is clear that security is – or should be - paramount. Google already claims to protect desktop users with its Safe Browsing segoogle-logorvice, but what about its mobile users?

With cyber threats ranging from the annoying, such as adware, to the unsavoury – hello spyware - and the downright terrifying (ransomware - we’re looking at you), mobile device users are increasingly demanding to know that they are being adequately protected when using Google’s products, tools and services. Therefore,  so as to protect the mind-bogglingly large number of people who are using Google on their smartphones, laptops, notebooks and tablets, Google recently unveiled plans to extend its Safe Browsing service to mobile users - or at least to those who are using Chrome on an Android device.

Whether you regard this as a blatant ploy to get users to switch to Android is something we’ll let you decide for yourself, but the fact is that Google is taking steps to protect its users. Back in August 2014, the company bolstered its Safe Browsing warnings with messages alerting users to unwanted software programs trying to sneak onto their computers by attaching themselves without warning to a legitimate download. In addition, both the Android platform and the Google Play Store have security measures in place to weed out potentially dangerous apps.

However, not every cyber security threat comes from an app or installation so, while Google is doing the right thing by guarding against threats in these areas, there are other issues that require a different means of protection. Enter social engineering, and phishing in particular, which can cause untold harm – such as data or identity theft - to a business or individual.

In order to protect against social engineering, an up-to-date list of malicious websites needs to be stored upon the device – this enables Google to send an alert to the user before they get ambushed. But there are problems with this which Google has had to overcome, not least of which is how to keep the list updated in the face of new threats. Compounding this issue further are factors that are unique to mobile browsing: mobile data speeds can be slow and connectivity patchy, depending where the user is. A fast, stable connection is crucial when the timing of an alert is paramount. Not only that, but using mobile data costs the end user money!

Bandwidth (and battery) limitations mean Google has had to find a way to ensure the data they send to users is as small as possible. Protecting their customers is crucial – but so too is not sapping battery life and data plans. Because this boils down to connectivity and speed factors, a device’s location is now taken into account. For example, if a known phishing scam is only affecting certain locations, only devices that are in that part of the world receive a warning.

Google also prioritises data by sending information on a need-to-know basis - in other words, bigger threats take precedence over more minor issues. They have also designed the software to limit network traffic, and to be as light as possible on memory and processor usage.

Since its announcement in early December, Google is now protecting all Chrome users on Android devices as default, making Safe Browsing part of their Play services from Version 8.1 onwards. Chrome Version 46 is also the first app to initiate Safe Browsing.

How do you know whether you are protected by Safe Browsing mode? Go to your settings in Chrome, and check your Privacy menu.

Google are obviously trying to improve their game, which is great. However, we believe that businesses need as much protection as possible - now. This is why we are constantly researching and  testing extra tools and practices that do assist.

How do you know if your small or medium-sized business stands the best chance of survival in the face of a cyber attack or phishing scam? Talk to us today and we’ll be more than happy to share our up-to-date knowledge with you.

Published with permission from Source.

A picture is worth a thousand words - and now a selfie may even be worth more. Later this year, MasterCard plans to jump into the facial recognition-based trend of online security with an app that allows users to verify online purchases with a selfie. But is this technology secure? Will it replace traditional passwords for good? Here’s what you need to know.

At the beginning of spring this year, MasterCard acquired the help of 500 customers to test out a new application that enables people to verify their identity and authenticate online transactions with a facial scan. What does this mean? Instead of using a traditional password at the online checkout, MasterCard wants to give you the option to snap a selfie instead. According to the credit card giant, they’ve partnered with every smartphone company in the business to make this mode of identity verification possible.


A quote from Ajay Bhalla, security expert at MasterCard, suggests this is an attempt by the credit card giant to appeal to a younger crowd of digital natives. "The new generation, which is into selfies...I think they'll find it cool. They'll embrace it," Bhalla recently said.

An example of the new "selfie" technology

That said, the “cool” appeal to youth is likely not the only reason for this change. The firm is likely attempting to make online purchases both more secure and more convenient.


To use this technology, users will have to download a dedicated app, which they can then use to take a photo of themselves at checkout. But how does MasterCard prevent a thief from using a photo of you to fake your verification? Simple - the app requires you to blink to prove that you’re a living, breathing human being.

However, it’s been noted by critics that, in today’s technological world, even a blink can be animated on a static photo. This leaves those of us with security concerns wondering whether MasterCard will make this app more secure before it’s released.

Note as well, though, that MasterCard is not getting rid of traditional passwords completely. Users will still have the option of the more conventional method of verification, as well as the choice of fingerprint scanning to check your identity.


With the release due later this year of a similar Windows 10 security application to identify users using biometrics, it appears that this is where the future of online security is headed. And with ever more applications and online services requiring a password, it is becoming increasingly difficult for the average web user to create one that is both unique and secure for each individual service. So whether it’s facial recognition, a fingerprint scan or some other technology that’s yet to be perfected, it seems as though some sort of more advanced security solution is inevitable.

Want more of the latest security news? Looking to implement new security to protect your IT infrastructure from cyber threats? Get in touch with us at Sensible today. Call 1300-SENSIBLE (736-742)

Published with permission from Source.

Nowadays, smartphones are filled with all sorts of personal data including contacts, schedules, photos, videos, documents, and more. Whether you're selling or giving away your old phone, you'll want to both save this personal data and prevent others from gaining access to it.

Here are a few steps to prepare your iPhone or Android phone for its new owner:


  1. Back up the data on your smartphone using iTunes – iCloud users may be able to skip this step.
  2. Deactivate apps which lock your phone to your online identity, such as iMessage and Find my iPhone.
  3. Remove your sim card to protect your contacts and call logs.
  4. Perform a factory reset to return your device back to it's original state. Within settings, go to “General" and then "Reset.” Next, select “Erase all Content and Settings.”


  1. Make sure your contacts, calendar entries, documents and settings are synced with your Google account. You can also use an all-in-one backup software of your choice.
  2. Back up your photos and videos to your own computer or a cloud storage service such as Dropbox, Flickr, or Microsoft OneDrive.
  3. Back up your text messages and call log using the app of your choice, or the option supplied by your service provider.
  4. Deactivate any apps which lock your phone to your online identity, such as Android Device Manager.
  5. Remove your sim card to protect your contacts and call logs.
  6. Remove any memory cards which may otherwise contain sensitive information.
  7. Enable encryption (usually found in Settings under "Security") to ensure that no-one can recover any data from your device after you perform the following step.
  8. Perform a factory reset to return your device back to it's original state.

Once you've reset your old phone to its factory settings, you may want to unlock it. Unlocking a smartphone allows it to be used with various service providers. If you don't unlock your phone, it will be tied to your service provider and may be harder to sell.

Some older smartphones (like Blackberries) also have separate mini-SD storage cards used to store photos, etc. Ensure you remove this card or delete the data on this storage device as well

Leading technology companies have filled the market with tons of tablet options. Here are some key considerations when figuring out which model is right for you.

Intended Use

When shopping for a tablet, first ask yourself "What will I be using this for?" Are you planning on using a tablet for just surfing the web and checking your email? Will you be using it for work or school? Will your new tablet replace your old laptop?

Once you've determined how you plan to use your new tablet, you can figure out which features will work best for your needs.

Operating System

The operating system is the single largest factor when shopping for a tablet. The main players, in order of market share, are Google's Android, Apple's iOS and Microsoft's Windows.

Android supports a large variety of hardware with numerous screen sizes and features. It's the most customisable operating system. On the other hand, iOS tablets have carefully planned screen sizes and limited features that have been rigorously tested.

If you work on a PC, a Windows tablet may be the best choice for extensive work involving document creation and manipulation. The advantage is you get to use the business programs you already know. Plus, its keyboard/cover combination has yet to be beaten. Microsoft's new SurfacePro 3 is a tablet that is almost a full blown laptop replacement.


The respective app stores for each tablet operating system are also an important consideration. Google's Play Store currently contains the most number of apps, over 1.3M. The apps in the Play Store tend to be relatively cheap, with up to 80% being free.

In comparison, Apple's App Store offers over 1.2M apps and is by far the most well-maintained. This makes finding apps easier, and the apps themselves tend to be of higher quality, but a bit more expensive on average.

Microsoft's Windows Store is still in its infancy with the total number of apps around 170,000.


Tablets come in a range of sizes and weights. Smaller, lightweight tablets are optimal for commuters and students. Larger models with generous screens enhance work productivity, especially in lieu of a laptop. The best approach is to simply go to a local store and get your hands on a few different models. If you don't have that opportunity, be sure to check weights and measurements online.


Before making a purchase, check if there are similar models on the market that might be cheaper. In addition to the price of the device itself, you should also weigh the costs of accessories such as cases, styluses, and keyboards. 4G access also requires a monthly data plan, so that should be added into the other financial considerations too.

While these factors may not cover every angle of tablet shopping, they will certainly help you narrow your focus. Contact us for more help when comparing the latest in devices and technology services.


Unfortunately, most tablets are still not full replacements for laptops for business use — but they are getting a lot better. e.g. Microsoft SurfacePro 3

Also keep in mind that there are now a number of very lightweight laptops available that offer full business capability (we especially like Toshiba).

However, you still pay a premium for the lightest and most powerful. If you are unsure, contact Sensible on 1300-SENSIBLE to see what fits you best.

Every year smartphone batteries increase in capacity. Yet, at the same time, it seems new phone models last less and less time before they need to be plugged in. This frustrating cycle leads many smartphone owners to wonder the same thing. Why can't their latest iPhone or Android device stay on longer than a few hours, despite claims of a much larger battery?

The answer is that newer phones can do more things, beyond streaming cat videos, taking photos, and browsing the web. They also have bigger screens, louder speakers, faster data speeds, more sensors, and so on. These improvements not only take more battery power, but lead to increased usage of smartphones.

So what can you do to increase battery life? While the specifics depend on the exact phone you're using, here are some things that will help right away:

Turn On Automatic Screen Brightness

Most phones have an option to automate the screen's brightness based on ambient light levels. This will help keep screen brightness down when it isn't necessary, and save battery life.

Turn Off GPS, Wi-Fi, Bluetooth, and Other Networks and Sensors

Just having these on is considerably draining to the battery life. Turn them off when not in use to make your phone last longer.

Browse Only on Wi-Fi

When possible, turn off 4G connectivity and use Wi-Fi networks to browse the web. Wi-Fi antennas use less power than 4G, and will extend the life of your phone.

Use a Case That Blocks the Wake Button

Most people don't realize how often they bump into the unlock button while their phone sits in their pocket. Every time they do, the screen lights up and steals a little bit of battery life. Using a case that secures this button can go a long way for people whose phones live mainly in their pockets.

ANDROID: Turn Off Auto Sync

Unlike iOS, Android apps update and sync individually, and every time they sync they have to power on the phone's data radio. Turning on the radio takes a lot of power and drains your battery. Instead, keep auto sync turned off and instead, sync your phone manually every half hour or hour.
iOS: Turn Off Active Background, Background Motion, and Background App Refresh

These features, many of them introduced in iOS 7, are visually stunning. They're also a major drain on battery resources.

Sensible Business Solutions © 2022 All Right Reserved
Privacy Policy