We had some fun with the team this week and posed the question above to them.  It has sparked some really interesting discussions about what would be important in the this situation, so lets see what everyone would take with them and why.  We discussed the feasibility of electricity on the island, and decided that we had found a bunker which had hydro-electric generator!

Mark

I would take my old tech LW/MW/AM radio and a soldering iron, why? Because unlike a mobile phone the battery would last longer than a day, it can receive signal in most countries of the world, it can’t be tracked like mobile phones or laptops so nobody could find me.  I’m an RAF trained electronics engineer and its old tech so I could re-purpose it to transmit an SOS signal giving my location when I chose to do so, but not before I’d enjoyed the isolation with some enjoyable music.  I think I could do with some time on my own before calling for help. 😊

Craig

I would take an iPod/music player as you are never alone when you have music or a satellite GPS tracker…

via GIPHY

Ian

My piece of technology would be a fully loaded iPod (and headphones) with all types of music, so I could still hear other people’s voices, but still get to enjoy the peaceful surroundings.

via GIPHY

Colin

If I was stuck on a desert island, I would choose to have a solar-powered virtual reality system. This means that when I get fed up of the sunshine, I can in effect go back to the wind and the rain of home etc. It would have infinite uses so would be an effective virtual escape from the ennui of being stuck on an island.

I would also have my brick phone for the first 8 days, as that’s how long the battery lasts.

via GIPHY

Gareth

I would take my laptop with me, because there is a 1% chance I might have signal on the 4g sim on it to binge watch Netflix while working on my tan until I get rescued. 😂

via GIPHY

Marko

For me it would be simple – My mobile phone.

I’d make sure it is packed with useful offline apps to start with and it also has my whole music library to keep me entertained through the days and apps to keep me from getting too bored.

via GIPHY

Natalie

I’d take my GPS watch and mobile.  This way I could turn the heart rate monitor off (extend battery life) and walk/run for 30 mins each day with Live Track switched on in the hopes that my family could identify what island I was on to rescue me!  Bonus, I’d still get some running logged on Strava!

via GIPHY

Today, we are going to create a guide to the most common features you may want to use within Teams and highlight some of our most used and favourite ones within MJD.

To begin with, we’ll explain what Teams is and how it is setup.  Teams is an online communication tool created by Microsoft to allow groups of people, teams, to communicate and collaborate easily.   It also aims to do this all within one window for you, minimising clutter in your taskbar.

First off, you will need to setup your “Team”, you can have multiple Teams within the programme which can have different collaborators, so you may setup each department of your company as a Team for example.  Within each Team, you can have different channels.  So for example, within your Engineering Team you may have the following channels; Projects, Drawings, Workshop or you could have your company as a Team, then each department as a Channel.   This is where you can completely customise the setup to what will work best for your company.

When any new message or activity takes place within a channel, you will receive a notification and the channel will become bold with a red number next to it for how many new notifications in that channel.  You can set your notification settings differently for each channel.  When you are in the channel you wish to set your notifications for, click on the three left dots on the top right-hand corner and go to “Channel notifications”.  You can then chose to turn them off or have all notifications or set customised notifications.

To see all the most recent activity within your Microsoft Teams, you can use the activity section on the left-hand side.  This will show all the most recent activity within your own teams and you can navigate between the updates in the panel on the left-hand side.

To chat to an individual colleague in one of your teams, the chat section is where to do this.  You can then chose your colleague and chat/share files.  You can also share your screen to demonstrate or show your colleague something you are working on.  It can be really useful when showing a colleague how to carry out a task when we are now working from home.

In each conversation, whether that be with your team or an individual colleague, you will see there are a few tabs.  The Files tab will show you all the files you have shared within this conversation or channel and allow you to move, open, edit and work together on the files.

You can add tabs to each channel which allows you to collaborate on a variety of apps.  The most common one you may wish to add is OneNote to allow you to create a Notebook for that Team so that you can save notes that everyone may need to access, for example, meetings minutes, task lists etc.

Another useful feature to be aware of and make use of is your status.  This can be changed by clicking on your profile picture and then choosing a status from the menu.  It is worth noting that in the Do Not Disturb status you can setup whose notifications can still make it through to you.  This means you can still ensure any high priority messages get through to you, without general and lower priority messages disturbing you.

We can also get Teams to let us know when a team member becomes available, to do this we right click on the Team Member and chose “Notify when available”.  Teams will now tell us when their status changes to available by a notification in the bottom left-hand section of the screen.  Much like an email notification when you receive a new email.

Hopefully this will help you to get started in Microsoft Teams and get you confident to explore the features but any questions on Microsoft Teams please don’t hesitate to get in touch with the team here at MJD and we’ll be more than happy to help make IT work for YOU.

 

As it’s Halloween, we thought we’d look at a something a little scary in the IT world:  The Dark Web.

Lets begin by breaking down what is the dark web and the Internet which we all access everyday.   The Internet we all tend to access everyday through our favourite search engines is called the surface web, which lends nicely to imagining the Internet like an iceberg.  So everything above the water is the surface web.

Everything below the water of the iceberg is called the deep web and with some basic diving kit you could access some of the iceberg below the water’s surface. The deep web is unable to be searched using our favourite search engines.  Now, not everything within the deep web is malicious and much is legal and safe.  Within the deep web there are things such as databases which are publicly and privately accessible, but only within their database and intranets which you may have one within your organisations, but you can only access when logged into your company devices.  The deep web also includes any blog articles that have yet to be published, web pages that are in the process of redesign and even pages within your online banking account.  All these pages will have instructions written into them to tell search engines not to search them or they are hidden behind passwords and therefore not searchable.

via GIPHY

The dark web is specifically web pages and sites that are not indexed and you must have a specialised web browser to access.  It routes your path to these sites through multiple servers and uses encryption to make users as anonymous as possible.  It was originally created to allow US spies to communicate with the Department of Defence to protect their identities and their safety in the 90s.

The dark web is significantly smaller than the surface web, so could be considered the very bottom submerged tip of the iceberg in our analogy and would require specialist diving equipment and knowledge to reach, but would still be risky to do so even with the equipment and knowledge.  As such, the dark web is not something you can stumble upon in your day to day Internet usage.  So while it is something to be aware of and understand it exists, you would need to go out of your way to access it.  This is the part of the Internet where stolen user credentials, passwords and financial details are traded and sold.  It is an extremely dangerous area of the Internet to access and use.

As the dark web is not something we can stumble upon, what is more important is considering the dangers and safe usage of the deep web that is most appropriate for the majority of people.  The deep web can hold piracy sites and unsavoury content and as such this is possible to access and come across while using one of the common browsers and search engines.  Therefore, the best way to protect yourself in the deep web is to always be aware of the links you are clicking through to and what buttons or how you are interacting with a website.  Evaluate if you trust the website you are on and if the link or action you pursue on this website is safe and considered.  This will help to keep you safe on the Internet. If you have any further queries or need more advice on staying safe on the Internet, please just get in touch with the team here at MJD.

 

We often get asked this question when discussing backup solutions with clients new and old.  So today we are going to explore what a backup is, why it is important and the criteria to consider when determining the backup option best for your business or personal requirements.

First, lets consider the situations which could easily happen despite your best efforts to mitigate these circumstances:

  • Someone accidentally deletes a file(s) on your server/shared storage device
  • Someone internally with malicious intent deletes important files
  • A virus enters your network and begins to delete or encrypt data
  • A physical event, such as flood/fire/theft/drop means your devices no longer function or are not there anymore!

A backup is a second copy of your data which is stored separate to the original copy and would be used to restore the data/system in the aftermath of a data loss event.  With our reliance on our computer systems to run our businesses and equally our personal lives, a successful backup is the key element of a disaster recovery and business continuity plan.  Currently, without back up solutions in place and in the face of a data loss event, recovery and continuity are impossible and extremely costly.

There are 6 key criteria which we should consider when choosing your backup solution:

  • Comprehensiveness
  • Ease of use
  • Recoverability
  • Performance and Reliability
  • Affordability
  • Scalability

The solution that you chose should be comprehensive, by this we mean it should provide you with all the protection and functionality you’d require in a data loss event.  So whether this means a cloud based backup solution, as well as on-premise backup would be required or whether just one of these solutions would be sufficient.  This needs to be considered when deciding the requirements of your back up and recovery plan.

Your backup should be easy to use and implement, to minimise cost and time used and to ensure when the time comes you can quickly and easily restore your systems, minimising down time.

Recoverability; arguably this will be the most important deciding factor when choosing your backup solution.  How quickly and easily can you get your system up and running again?  Can you virtualise your system to allow you to get working almost straight away again while you rebuild the physical system and deal with the data loss event?  These are questions you should ask of your potential backup solution providers, to help you determine which solutions meet your needs.

While it’s all very well that your backup is quick to recover and get you running again, you still need this to perform and be reliable every day it backs up your system.  You also want to ensure that it is able to back up the system quickly when changes are made, so looking for incremental solutions can increase the speed of performance of your backup solution.

We began the post highlighting how essential a backup is to your business continuity plan, however, we understand this doesn’t mean there is a limitless budget for this.  We understand this can be a difficult decision to make, when weighing up monthly costs it is important to consider the financial impact of the downtime between the data loss event and being back to running your business again.  How many days could you survive with your cash flow without being able to access your systems and conduct your business normally?  This can then help to determine your budget for your backup solution.  In our personal lives, this can often be the deciding factor in the solution we use for our personal photos and files, and we would ask you to think of your most treasured photograph.  If you were to lose the digital file and unfortunately all the printed copies, how much would you have paid to save that photo?  This will help you to determine how important your digital files are and therefore what backup solution you should look to implement.

We need our IT solutions to grow and adapt with us, so it is important to consider how your chosen backup solution could adapt and grow with you.  If your backup is limited by size, but 6 months down the line you need to increase the size and this incurs high costs, this hasn’t been a feasible option.  Therefore, if you have planned growth you want to chose an option that will be able to grow with you and adapt to suit your needs.

When considering these factors, MJD recommend and work very closely with our backup partner Datto.  They provide a range of on-premise and cloud backups, and can have a combination of both to ensure that your backup solution covers all your requirements.  The team here at MJD are always happy to help and discuss your requirements and help you to choose a suitable backup option for your individual circumstances.  Just get in touch and lets make IT work for YOU!

Hello Hoomans!  Flora and Skye here.

We’ve decided to take over the blog for a week, show the hoomans how it’s done!  And to let you know how us two are dealing with the work from home situation.  For us, it has been a rather fantastic change of office environment.  We have all our own beds, as well as access to our hoomans beds and sofas for power naps to refresh the creative brain waves.  No more commutes, we can just trot through to our work beds to have our morning teams chat together to decide the plans for day.

Our daily Teams calls include discussions on the cutest poses for photos for optimal treat earnings, how best to get the hoomans attention in a video call to get our air time in the meeting and what the local gossip is from our morning walkies.  Got to keep up with the goings on even though we don’t see each other in the office anymore!  We might then remember to have a think about some barketing work we might be able to help with and discuss tactical motivational snuggles with the hoomans.

Deliveries are still sniff checked to ensure no intruders are present in the boxes, can never be too sure.  And we alert the hoomans to any door bells.  Then, it’s usually time for a quick power nap before any calls with our suppliers in the afternoon…Oops, is it now lunchtime, oh well time for a chew treat!

After a leisurely lunch and wee trip outside for a sniff about our gardens and stretch the legs its time to settle in for video calls with the suppliers and discuss the current quality of our dog treats…Oh, wait I mean computer hardware! We then dictate our fantastic barketing ideas to the hoomans who type them up and make them into the social media posts and blog entries for us, typing and working a mouse with a paw is frustrating.  Why do it yourself when you can have a hooman do it for you?

It’s then time for an afternoon snooze and then it’s almost the end of the working day and time to crack the whip to make sure our hoomans get all the work finished with plenty time to go on evening walkies!  Walkies are so much fun and so much sniffing work to do, but we also need to make sure our hoomans get fresh air and exercise outside the house right now, it’s an important and tiring job but someone’s got to do it!

To finish off our entry, myself and Skye would like to announce my promotion to Chief Barketing Officer and Skye has taken the position of Barketing Co-Ordinator so I can continue to show her the ropes and lead her to pawtastic success with our hoomans here at MJD!  Time to negotiate a treat raise for today’s work on this blog post and then time for our power nap!  Catch you next time folks!

 

With the increase of social engineering and successful phishing attacks which we are seeing every month, combined with the extremely high risk of a sensitive data breach or financial loss without Multi-Factor Authentication (MFA), we want to make sure you are aware and understand what this is and how it can help.

There has been a dramatic and unforeseen shift to remote working through out this year in response to COVID-19, the importance of turning MFA on has increased further.  MFA is the process of using two or more ways to verify the authenticity of a login attempt to a service.  Verifications are usually made up of a combination of your password, an authenticator app on your mobile or biometrics like your finger print or facial recognition.  We’ve included a great video demonstration to help explain the process within Microsoft 365:

 

  

With 365 the MFA feature is included with your 365 subscriptions, so there is no additional cost to your monthly subscription with Microsoft 365.  It is a simple way to add an additional layer of security to your security setup, to deter and minimise the threat of a cyber attack.  Trying to gain access to a 365 account with MFA is a great deal of work for a cyber criminal and can help to encourage them to move on to their next target.

While this does add an extra step to your login to access your 365 and can pose a potential problem should you forget your phone or even worse lose it!  However, when coupled with the fact that 60% of SMEs go out of business within 6 months of a cyberattack, it is a small inconvenience that very rarely occurs, can you really put security over convenience?  If this ever does happen, this is what MJD are here for to help you resolve the issue and get your IT working for you again.

What is important to keep in mind is that one of 365’s main advantages is that you can access it from any device, therefore it is important to remember that employees may use personal devices to check emails or work on documents for your business.  These devices may not have our RMAV package on them and potentially no anti-virus software, opening your business to threats.  With MFA, it means that to gain access to a 365 account they would also require the mobile phone with the authenticator app or your biometric data, alongside the password.

For such a small inexpensive step to add to your security system within your business, this is a function that you cannot afford to leave switched off.  As always, if you have any questions or would like any help setting up MFA please don’t hesitate to get in touch with the team here at MJD.

When considering cyber security we can often jump straight to considering how technology can protect us and completes our security package.  However, there are actually 3 pillars of cyber security.

As you can see from the Venn diagram each pillar is equally important to the overall cyber security of your network.  Your processes may already be in place but you had not considered them part of your cyber security.  Such as hierarchy of access to information, password policies, data control and data request processes.  But this may just require a culture shift to include the review and adaptation of processes and policies within you overall cyber security plan.

The element which has not had as much development over the years to match the speed of technological development is the people asset:  The Human Operating System (OS).

This is the most common area for weaknesses in a companies overall cyber security.  Now if we consider the fact that this year Webroot reports phishing URLs grew by 640%.  This highlights the  importance of gearing our three pillars towards reducing the inherent risk.

Now, under technology our SPAM filters can check links, quarantine potential risk emails and check links as they are clicked on.  Your processes may filter out requests for information, detailing who can have access to what and how someone can request information.  But the people pillar is arguably the most important to focus current investment due to the lack of investment in comparison to the development of the other two pillars in recent years.

So, how can we improve and strengthen the security of our Human OS in our organisation?  Training.

There are various options and plans of how to deploy training in your organisation.  Here at MJD we can offer dedicated training sessions with our Cyber Security Specialist, tailored to our client’s organisation.  We would also recommend implementing a continuous and random on the job training programme.  We can create training campaigns where fake phishing emails are sent to collect data on who clicked on links and how people interact with the email.  It then instantly provides a small training session for those individuals who do click on the link and enter information.

These campaigns allow you to analyse the statistics of how many times people click on the links, to identify individuals who may need more targeted training or equally to give people praise for continuing to ignore phishing emails or improve on their click rate.

The team at MJD can help you create a plan to keep your Human OS up to date, as well as managing your technology updates and IT security.  Get in touch and let’s make IT work for YOU!

Today we want to talk about phishing emails.  A phishing email is an email which has been sent to the recipient with the purpose of convincing you to provide them with your personal information or account details.  Once they have this information they may use it to create accounts in your name or to gain access to steal more of your sensitive data. Reports conducted for this year by Webroot show us that there has been a 640% increase in phishing URLs being sent.  This highlights the importance of being aware of how to protect yourself from phishing campaigns.  The key to protecting yourself against phishing attacks is a continuous training programme.  Statistics in this report also show that after 1 year of training, end users are 70% less likely to click through to a phishing attempt. The team at MJD can help to setup email training campaigns to help combat phishing attacks, so if after readying this article and encouraging your colleagues and peers to read this blog article you would like more training please just get in touch.

The key to remember is that most legitimate companies you conduct business or personal dealings with will not request sensitive information from you via email.  However, the cyber criminals behind the phishing emails are getting ever cleverer and more careful about the look and feel of their emails, making our daily job of determining genuine emails from dangerous more difficult in our already hectic work lives.  For this reason, we are going to dissect and exam a phishing email we recently received ourselves, to help you to understand the various warning signs and parts of an email to check before interacting with the information contain in the message in anyway.

The first point of call is to consider the supposed reason for receiving the email.  In this example, we are being told our email is limited.  So take a moment, and think am I experiencing an issue like this.

We currently don’t have any issues with this email account being limited, so already alarm bells are ringing.

Next, we consider who the email is coming from.  In this instance its coming from “Webmail Security”.

We don’t use webmail, so already this would not be someone we would expect to get messages about email issues from.  On top of that, the actual email address of @m5-domains.com is not a company we have our domain with, therefore again we would not expect them to know anything about any email problems.  So question do you interact with this company and use this company’s services?  Therefore, should they be getting in touch with you?

Within the body of the message you can see they use a term User Agent, which is like a fingerprint when you may have logged into a website or service through an Internet Browser.  It takes details of the browser you used to access the service or webpage.  Now, for a MSP we know what this is and straight away know we haven’t tried to log into our emails using these browsers.  However, this specialist terminology is used to try and confuse the recipient in the hopes they don’t know what it is.  This is another tactic all working towards encouraging you to act on the email and click their link.

At this point, we have already decided that this is a phishing email, but for the purpose of our blog post we will continue to question the remaining aspects of the email.  For the cyber criminal who has sent this email, the next part is the most important part of their email, the link to their web page.

 

When we hover over the link you can see the URL which this button would take you too.  In this case it lists a web page that has a different domain name, m4 domains rather than m5 domains, to the email address sending the email.  Another red flag.  Most likely this would lead you to a web page where it would ask for your username and password to “verify your identity”.  These would then be stored in a database and used to try and gain access to your account.  It is key that you should remember to NEVER enter your credentials anywhere other than when genuinely gaining access to your emails and you should NEVER share your credentials with anyone.

What you will also notice with this URL is the “link.edgepilot.com” at the start.  This is because of the SPAM filter we use and have setup with many of our clients.  This is an additional feature of the SPAM filter which, in addition to filtering out potential SPAM emails will check all links in emails if they are clicked on prior to taking the user to the site.  While this doesn’t mean you can get click happy, it does offer another layer of protection against phishing emails.

A time limit with a threat of losing access to your account, is another pressuring tactic to get you to take the wrong action.

If you are worried that there is potential the issue may be genuine, raise it with your IT department or your MSP/IT provider first.  They will always be happy you checked with them, even if it turns out to be a phishing or spam email.  The key is not to interact with the link or the sender of the email, any concerns ALWAYS contact your IT department or MSP first.

The final point to make is the small print.

First off, it’s in a lovely pale grey and small font to make it more difficult and off putting to read.  But once you do read it, the references to laws and legislation do not make sense or aren’t relevant to any of our actual UK legislation.  It also references a company, which hasn’t been mentioned previously, again providing us with further information that everything in this email doesn’t add up to a genuine warning from an email provider.

Hopefully, this will give you an initial check list of things to be mindful of when accessing emails and help you to identify emails that you need to be wary of and potentially ask your MSP for help to deal with.  The team here at MJD have a variety of tools and packages which we can implement on your network to carry out on the job training for your organisation.  If you’d be interested in developing a phishing email training programme for your organisation please don’t hesitate to get in touch with us.

 

Today, we want to explore the world of IP Phone systems to demystify the technical terms and provide you with the information to make a considered and informed decision on what is best for your business.

Let’s start with the term Voice Over Internet Protocol or VoIP for short. This allows you to make phone calls using the internet. Internet Protocol is where the ‘IP’ in IP Phones comes from. IP phones are connected either through a wireless connection or using an ethernet cable. We usually recommend ethernet cable for a more reliable connection. IP phones can take the form of your everyday desk phone, cordless and conference phones in the same way as a landline phone, it is merely the way in which it places the call is different. There are no noticeable differences for the users between an IP phone and an analogue phone. The main difference is in the transmission.

This difference in the transmission of calls is where the cost savings lie in switching to an IP phone system. As an IP phone converts your voice to digital signals this means it can be transmitted across the internet and requires your standard internet connection that you will most likely already have! Therefore, this eliminates the need for charges based on the physical infrastructure requirements of a landline that are charged by landline phone companies. As a result of using the existing internet network within your building you do not need to install copper wiring throughout to setup a telephone system, simply plug the IP phone into the internet where ever you need it to be and it’s good to go. We have seen some of our clients achieving cost savings in excess of 50% between conventional and IP phone systems!

The other major advantage to IP phone systems is that you can make unlimited simultaneous calls. Your only limited becomes the number of physical phones and people you have to make and answer calls!

An advantage that has become increasingly more popular and useful to business with the current COVID-19 pandemic is that IP phone can be used in any geographical location, so long as they have a connection to the internet. This means your remote team can be in different area codes and still be phoning out from your business number.

As the IP phone system is operated using the internet, this also means that changes to the setup and who receives which calls on what options the callers use can be changed without site visits required from your telephony provider. This means you can get quicker support and changes carried out as soon as they have an engineer available, rather than have to schedule site visits to make changes.

The main and clear disadvantage you may have been thinking about while ready this blog is if the internet goes down, then my phones go down? Which this would be the case unfortunately, but it is key to remember that if you have a fault on your broadband line which causes an outage, this may have also affected your landline in certain circumstances. If having phone lines open during business hours is mission critical, it is worth while exploring options of a backup 4G router kit and data only SIM which could be setup and connected to your network to provide temporary internet usage while your broadband line issues were resolved. We have installed many 4G setups for our clients for permanent and backup options for internet supply so we are happy to provide advice and costing on this option as well.

It’s now time to take a moment and evaluate how many times in the last year has your internet completely dropped out? And then consider for how long each time? Would this down time with no phones be enough to outweigh the monthly cost savings and flexibility that could be gained from having an IP phone system? The team here at MJD can help you with this evaluation and with our IP telephony partners provide you with costs and comparisons to your current landline bills to help you make an informed decision on whether IP phones would benefit your business.

If you’d like to discuss further an IP Phone system and your individual requirements, please don’t hesitate to get in touch with the team here at MJD. Let’s make IT work for YOU.

During lockdown many of us have turned to technology to keep us connected with our friends and family and to entertain ourselves. Some of the team here at MJD started online gaming together and it lead to the team reflecting upon the first computer games they ever played and we thought it might be a fun topic to share with you all.

Mark
Showing my age….. in the 70’s I can clearly remember my brother coming home with the first computer game I ever saw, it was called pong, more a video console than a computer game, playing Pong was a case of a simple controller or two twist dials to control the “rackets” at either end of the screen. The simple “Pong” noise as the ball hit a racket or side of the screen was distinctive, you could also play against yourself by effectively turning one end of the screen to a wall and the ball (cursor) would rebound just like a squash court. Considering graphics and games today, it was extremely basic but at the time was amazing to play. The next computer game would have been Space Invaders that was built into a glass table in a pub near RAF Cosford. I’m sure I got better as the night went on 😊 Again revealing my age at the time! A slightly more complex game with a few more sounds but still quite pixelated graphics by modern standards. A far cry from the real life POV games of today! My first real computer was an Atari 1040 STE, which I still have in the loft.

via GIPHY

Colin
I’m not much of a gamer, but I do remember being given a Sinclair ZX81 in the early 80s and thought, what’s this? I believe it only had 1K of memory! I do remember playing a golf game called Leaderboard which came out in 1986. So I must have had either a Commodore 64 or a Sinclair ZX Spectrum to be able to play it. The golf was fairly easy to play at the lowest level. Just pick your club and press a button and off it went on line and the right distance. However, when going for the pro option, you had to control the flight and the spin of the ball and take the wind into account. Even back then I found real golf a lot easier than the computer game so I opted for the real thing. Plus there is no 19th hole in a computer game!

via GIPHY

Ian
My 1st computer game was at aged 11 on the classic Sinclair ZX Spectrum in 1982!

The game was Football Manager and it came on a cassette tape…

In order to load the game onto the computer, you had to connect a tape recorder output/input via leads to the computer and then start playing the tape, and the game was loaded onto the machine via sound. The only problem with this was that you needed to set the volume just right on the tape recorder or the game would not load correctly & would have to start again – it took many hours of trial & error to get the right balance and the game finally loaded.

It was all text based, no fancy graphics by todays modern standards, but it kept me entertained for hours on end trying to get Liverpool to win the league!
(Never did though.)

Also, there were bugs in the game that stopped you from completing it, but back then, there was no internet or patches or software updates available to fix those bugs.

via GIPHY

Craig
The first game I remember was Horace Goes Skiing on a ZX Spectrum.

The problem was before you could play the game you had to first load the tape and let is run. You could tell if it was a good day if it loaded first time or if you had to turn the tape and try again before you could play the game.

If you did manage to get the game to load you had the amazing sound track as shown in the clip above along with the amazing colour loading screens.

The aim of the game was to first cross the busy road using the 4 control arrows. Once across you had to rent a pair of skis and make it back over the road. If you managed this you then got to go skiing, down the hill, avoiding the trees, aiming for the ski gates trying to get to the end of the course.

Natalie
The first computer game I remember playing was a basic ABC game which sang the ABCs to me when I was very young, and the story is usually told of the amount of times I repeated the song, much to my parents enjoyment! Luckily, I have never had a draw or need to come back to this game to relearn my ABCs!

However, recently in lockdown I have been reliving my childhood of battling my brother, Gareth, on Worms and playing the newer version of the game. The biggest difference I’ve noticed is that originally the game was 2D however now the graphics are 3D and much higher definition!

via GIPHY

Marko
Gaming for me stated when I was very young. The first games I remember playing, or at least trying would have been Doom PC and Robocop SNES. These were owned by my uncle and cousin so would only really get to play/watch them play when we went down to visit.

After that I believe the first console I owned would have been a Playstation 1 and used to actively play games such as Crash Bandicoot, Spyro and Gran Turismo. Most of these have now been stopped so I don’t go back to play these however I did start playing the remaster of Crash Bandicoot when that came out back in 2018.

via GIPHY

Gareth
My first computer game that I can remember was Halo Combat Evolved.

This was bought on the original Xbox. I would spend hours infront of the TV trying to complete the game and never managed to until I went back and played the anniversary version years later.

At the time the graphics were amazing but since playing the remastered edition where you can switch the graphics between original and remastered it has confirmed just how far gaming has come! 😂

via GIPHY

Newsletter Signup

If you would like to receive a notification when a new blog post goes live, please enter your email address below.