Copilot – A Stitch in Time Saves Nine
Reading Time: 2 minutes For small and medium-sized businesses (SMBs), Copilot can be a game-changer, offering a suite of benefits that can help your business, bring energy to your team’s output and put a smile on your client’s face, with the improved business interaction they have with you.
Worthing Golf Club Goes the Extra Mile
Reading Time: 2 minutes Golf courses are often located in rural areas, so they face unique challenges when it comes to reliable internet connectivity. These locations are ideal for golf and are a key aspect of the golfing experience.
Protecting your Emails with DKIM/DMARC
Reading Time: 3 minutes Sending an email is a bit like a relay race. Each runner has a crucial role to play, in ensuring that the baton (the email) reaches the finish line (the recipient) without any tampering.
How to Prepare Your Team for DORA Changes in 2024
Reading Time: 5 minutes The financial sector is uniquely exposed to cyber risk because of the large amounts of data and high-risk transactions that are handled.
The Fédération Internationale de l’Automobile (FIA) gets…..HACKED
Reading Time: 2 minutes In the 200 mph world of Formula 1, speed and precision are paramount. But, it wasn’t a race car that brought the Fédération Internationale de l’Automobile (FIA) to its knees—it was a cleverly crafted email
Meet James Butler, our top TAM
Reading Time: 3 minutes What is your earliest recollection of IT in your life? I was about 13 years old, and I remember arguing with my dad about whether I could stay up all night to play computer games on a PC that he had brought home.
CNC-FluidOne FareShare Charity run update
Reading Time: 2 minutes Team CNC-FluidOne put on their running shoes and 15 runners did their bit on a wonderful summer’s evening. Burning up 5 kilometres, all in an effort to support FareShare UK.
What you need to know to keep your data safe
Reading Time: 2 minutes There’s a common myth going around that Microsoft 365 automatically protects and backs up your data. Sadly, it’s a popular misconception that many businesses put themselves at risk with
Microsoft Copilot: The future of workplace efficiency revealed
Reading Time: 6 minutes For business leaders aiming to unlock operational performance while maintaining a competitive edge, finding a technology that speeds up decision-making, boosts productivity, and fosters profitability is increasingly challenging.
From novice to expert: Anna Barrett’s transformational apprenticeship experience
Reading Time: 3 minutes An apprenticeship is a great way of training for a career in IT. Typically, it’s 18 months of intense training and lots of study.
Unlocking your company’s IT potential: the power of a dedicated technical account manager
Reading Time: 3 minutes IT outsourcing is a powerful and effective way to access specialised skills, reduce costs, and increase the efficiency of your IT network.
MobileFlex: a game-changer in business mobile communication for today and beyond
Reading Time: 2 minutes Now CNC is part of the FluidOne Group of Companies, we have a lot of extra services to offer our customers, including mobile connectivity.
The recent cybercrime wave: why are NHS, Ticketmaster & Santander vulnerable?
Reading Time: 7 minutes June was a black month with some of the worst cyber hacks perpetrated in 2024 so far. Ticketmaster, the NHS and Santander were all in the national press, with news of them being hacked by cyber terrorists.
Empowering businesses with Litigation Hold and eDiscovery in Microsoft 365 Business Premium
Reading Time: 4 minutes In the fast-paced world of business, data plays a pivotal role in decision-making, collaboration, and overall success. However, with great data comes great responsibility, especially when it comes to legal matters.
How to use your smartphone in the art of disconnecting
Reading Time: 3 minutes Switching off from work can be hard. There’s an expectation to be “always on”, where your personal life and your business world never separate. Here’s how to get a minute or two to practice the art of stone stacking.
If there’s something strange in your IT network, who ya gonna call?
Reading Time: 3 minutes This time 40 years ago in June 1984, Ghostbusters was the number one film.
Our new service desk teams: how this will work for you.
Reading Time: 2 minutes Our service desk has undergone in recent months some changes. As part of CNC’s continuous improvement programme, we have revised how our helpdesk structure resolves your IT problems.
Stay safe and secure: cyber tips for when you’re on the move
Reading Time: 5 minutes So, you’ve been going through your checklist before you fly off on your business trip: encrypt or delete sensitive files? CHECK. Tamper seals over the hard drive access points? CHECK. Spare USB port locks? CHECK, privacy screen? CHECK. Was it always like this?
Remembering passwords can be a real headache.
Reading Time: 3 minutes I can remember how much it cost to see Star Wars, my first car’s registration plate or who was number 1 in the charts, 30 years ago, but a password from yesterday?
Starlink success: A game-changer in internet access
Reading Time: 2 minutes A glowing review from a customer about a supplied product beats any marketing material. Starlink proves to be a major success for forward-facing surveyors. Here is how:
An evolution of cyber crime: The rise of cyber scam factories
Reading Time: 3 minutes There are many sides to cyber crime. However, there is another aspect of the horror of cyber crime that is the cyber scam factory.
Pen Testing – let me explain
Reading Time: 5 minutes In the IT industry, we have a penchant for acronyms. If we can condense the name of a service, product, or piece of equipment into just three letters, we’re as happy as a lark.
It couldn’t have happened to a nicer bunch of cybercriminals
Reading Time: 3 minutes The world’s largest criminal ransomware gang (Lockbit) have not only been infiltrated by the UK’s National Crime Agency (NCA) but they have had their data stolen.
Using Microsoft’s roadmap for your business
Reading Time: 2 minutes Running a business and keeping abreast of all the technological things that are sent your way can be pretty daunting. See what’s on the horizon with Microsoft Roadmap.
FluidOne goes the extra mile for FareShare in 5K charity event
Reading Time: 2 minutes FluidOne takes FareShare cause to heart, with a 5K run organised for this July, to help raise funds for this great charity.
365 Backups: your insurance policy against data loss and disasters
Reading Time: 5 minutes Joke for you: Why don’t clouds use Microsoft services? Because even in the sky, they can’t find a backup!
Southern Water: faces reputational fallout with confirmed cyber hack
Reading Time: 3 minutes Southern Water now admits that as many as half a million customers’ personal information may have been stolen in the recent cyber attack.
What you need to know about the PSTN switch-off
Reading Time: 2 minutes Every technology has its day and now, it’s time to take the next step forward in the evolution of telecommunications.
All you need to know about an IT Risk Register
Reading Time: 2 minutes Over the next few months, we’ll be putting together a Risk Register for each of our customers and placing it on the Portal for you.
Business showdown: cloud service vs. on-premise solutions
Reading Time: 5 minutes In the late autumn of 1965, the Rolling Stones released ‘Get off my cloud’. It’s one of the band’s signature tunes, reaching the number-one spot in the UK, the US, Canada and Germany. They could have never imagined that the title of their song would have such relevance today.
Staying one step ahead: phishing, vishing, and smishing
Reading Time: 4 minutes Phishing, vishing, and smishing sound like the names of small villages on a beautiful coastline in some faraway paradise, but I can assure you these names stand for something completely onerous.
What you need to know about Windows end of life support in 2025
Reading Time: 2 minutes As part of Microsoft’s Modern Lifecycle Policy, the Company is ending all active support for Windows 10 on October 14th, 2025.
High-speed Internet, available almost anywhere on Earth
Reading Time: 2 minutes ‘Connectivity where you least expect it’. That’s a bold statement to make, but can the world’s most advanced internet system, do exactly what it says it can do?
UK water company confirms cyber attack
Reading Time: 3 minutes Southern Water confirms network breach, as cybercriminals Black Basta attempt to hold the UK utility to ransom as they threaten to release data.
The ultimate guide to protecting your company from cyber threats
Reading Time: 3 minutes You go into your office and find yourself locked out of your computer and, it gets worse you’re being asked for a ransom to retrieve your access, here’s how you can stop that.
CNC integrates with FluidOne, aligning with a group of premium brands
Reading Time: 3 minutes CNC provides the very best in IT services, expertly delivered across the Southeast. But now, customers will also benefit from a wider product portfolio supported by FluidOne, a nationwide, market-leading provider of Connected Cloud solutions.
Protecting your data: Lush’s response to its recent cyber attack
Reading Time: 2 minutes Lush the cosmetics store, home to some of the most beautiful fragrances in the high street, has announced on its website, that it had been the victim of a cyber security incident.
Outsourced IT Support: Finding the Perfect Fit for Your Company
Reading Time: 4 minutes Outsourced IT support is just like a marriage. It’s about finding an IT partner who is going to go through all the joys and wonders of business life, with your hand in hand.
40 Governments around the world crack down on paying out to ransomware gangs
Reading Time: 4 minutes Ransomware attacks are the number one tool used by cyber criminals to steal money and data, which creates havoc upon the social apparatus of society.
Microsoft 365 Copilot – A Vision of Things to Come
Reading Time: 4 minutes We spend an average of about 37 hours a week at work, of which 68% is spent on ‘doing stuff,’ spending time on various tasks, creating more tasks and attending meetings. Don’t we just love those meetings?
Common Mistakes to Avoid in Backup and Disaster Recovery
Reading Time: 4 minutes In today’s data-driven world, backup and disaster recovery have become crucial aspects of any business’s IT infrastructure.
10th October 2023 (Windows 2012)
Reading Time: 5 minutes You would be absolutely right in thinking that the date 10th October, is only 10 weeks away from Christmas. However, the 10th of October 2023, is a very special day in its own right. It is in fact, the last day of support and security from Microsoft for Windows Server 2012, and Windows Server 2012/R2.
Exploring the Benefits of Microsoft 365 for Businesses
Reading Time: 5 minutes In today’s fast-paced and interconnected world, businesses are continually seeking ways to enhance productivity, streamline operations, and stay competitive.
Outsourced IT Support, Is it really worth it?
Reading Time: 6 minutes In today’s rapidly evolving business landscape, you’d be hard-pressed to find a business or sector that doesn’t rely on IT in one form or another.
The Crucial Role of a Chief Information Security Officer (CISO)
Reading Time: 5 minutes In today’s digital landscape, businesses face an ever-increasing threat of cyber-attacks and cybercrime. As organisations become more reliant on technology and data, the need for advanced security measures to protect against cyber threats has become paramount.
The Essential Components of a Reliable Backup and Disaster Recovery Strategy
Reading Time: 4 minutes Businesses today heavily rely on their data and IT infrastructure to operate smoothly and efficiently.
The Benefits of Outsourced IT Support for Small and Medium-Sized Businesses
Reading Time: 4 minutes In today’s digital age, technology plays a crucial role in the success of small and medium-sized businesses (SMBs). However, managing and maintaining an efficient and secure IT infrastructure can be a daunting task for many SMBs.
MOVEit File CyberHack
Reading Time: 4 minutes Cybercriminals known as Cl0p ransomware group, thought to be part of a Russian crime ring, have exploited a newly discovered flaw within the popular MOVEit file transfer software.
Protecting Your Business from Cybersecurity Threats: Top Tips for Enhanced Security
Reading Time: 4 minutes Cybersecurity is not just about technology; it’s about people, processes, and awareness.” – Vishal Salvi In today’s digitally-driven world, businesses face an ever-growing threat landscape when it comes to cybersecurity. Cybercriminals are continuously devising new techniques to exploit vulnerabilities and compromise sensitive data. As a result, safeguarding your business from cyber threats has become more… Continue reading Protecting Your Business from Cybersecurity Threats: Top Tips for Enhanced Security
Antivirus vs EDR what’s the difference?
Reading Time: 5 minutes When the picture above was taken sometime in the early 80’s, Anti-Virus (AV) protection was almost unheard of. The idea that someone would create a malicious program that would cause your computer to fail was in its infancy.
Protect your business with Cyber Essentials.
Reading Time: 5 minutes Today in the digital age, we store information electronically. Why? Because information is power; it can be our competitive advantage over other businesses. Our supplier list of who provides us with what, and when; it might be customer information, entrusted to us through a sales transaction and numerous other details, all particular to our business.
What is Patch Management?
Reading Time: 4 minutes Whatever your favourite canine might tell you, “Get off the sofa, stop chasing cars, begging for food, digging up the garden, or chewing the furniture”, whether your dog is called Patch or not, you’d be right in thinking, patch management is none of the above.
What is a Bad Actor in Cyber Security?
Reading Time: 4 minutes Michael Caine, Cameron Diaz, Will Smith, Barbara Streisand, Patrick Swayze, (that’s not fair), Halle Berry and even Robert de Niro have won one. ‘The Golden Raspberry Award for Bad Acting’ has been giving actors a hard time about their roles for the last 40+ years. Held the night before the Oscars, the nadir award is… Continue reading What is a Bad Actor in Cyber Security?
What are the Top 10 Benefits of Outsourced IT Support? (And the one thing they never tell you…)
Reading Time: 6 minutes Managing your own IT can sometimes feel like a full-time job. How did IT become the centre of everyone’s business? The short answer is information. Every successful business needs to be able to tap into a sophisticated database of information to maintain its competitive edge. So, having your IT working for you and not against… Continue reading What are the Top 10 Benefits of Outsourced IT Support? (And the one thing they never tell you…)
What is mobile device management (MDM)
Reading Time: 4 minutes Mobile Device Management (MDM) is a system that allows businesses to securely manage the devices that their employees use to access company data and resources Why is Mobile Device Management So Important? MDM software allows you to control, secure, and automate any security enforcement policies and compliance standards, across all your company’s laptops, smartphones and… Continue reading What is mobile device management (MDM)
Cyber Security Insurance, or Not to Cyber Security Insurance? – That is the Question
Reading Time: 4 minutes Not quite the opening line of Hamlet, Act 1 Scene 1. However, in Shakespeare’s version as Bernardo looks out from the misty battlements, high up on the outer walls of Elsinore castle, he calls out to his fellow soldier, Francisco ‘Who’s there?’ Francisco replies ‘Nay, answer me. Stand and unfold yourself’. Protecting castles back in… Continue reading Cyber Security Insurance, or Not to Cyber Security Insurance? – That is the Question
How Hackers use Public Wi-Fi to Steal Information…
Reading Time: 4 minutes Wi-Fi is everywhere. Buses, trains, cafes and pubs of course. It’s at the gym, taxis, shopping centres, the list goes on. Hold on a minute, just let me check my bank statement, whilst I’m enjoying a mocha coffee. As they say, I’ll just pop in my password, which is the heart of the problem. Sitting… Continue reading How Hackers use Public Wi-Fi to Steal Information…
Cyber Security During a Recession
Reading Time: 4 minutes The news is full of it at the moment; a recession is just around the corner. ‘The recession we have been dreading is about to strike’, ‘it will be the longest and deepest recession since the 50’s’. Industry leaders will be rolling back budgets in anticipation, as revenues decrease. Costs must come down! One of… Continue reading Cyber Security During a Recession
What is Multifactor Authentication?
Reading Time: 4 minutes Did you know that elephants are one of the most protective animals on the planet towards their young? They only have one calf at a time typically, and carry them for almost two years. When born, the mother receives help in protecting the calf, from all the mothers within the herd. Octopuses, Orangutans and Kangaroos… Continue reading What is Multifactor Authentication?
Zoom Vs Microsoft Teams – Which is best?
Reading Time: 6 minutes As unintended consequences go, online collaboration got a really massive boost when the COVID 19 pandemic swept around the world as the virus looked to decimate the business landscape. Video calling that had once been the communication tool for all but a few, two video conferencing tools Zoom and Microsoft Teams saved the day and… Continue reading Zoom Vs Microsoft Teams – Which is best?
How to Prevent DDoS Attacks…
Reading Time: 5 minutes In its purest form, DDoS stands for Distributed Denial of Service. A DDoS attack is a combined cyber attack on a specific server or network, with an overwhelming amount of information, with the intended purpose of disrupting normal service. That’s the dictionary version, but what does a DDoS attack look like in the real world?… Continue reading How to Prevent DDoS Attacks…
Top 10 Benefits of Microsoft Teams
Reading Time: 5 minutes At the heart of every business is a conversation. Between your team, between suppliers, customers, local or global. A telephone call is good, we have been making those for a long time-since March 10th, 1876, to be precise. Interestingly, the first words spoken by Alexander Graham Bell in the worlds first telephone call, were: ‘‘Mr… Continue reading Top 10 Benefits of Microsoft Teams
A Pothole, Outsourced IT and Microsoft remote desktop story…
Reading Time: 3 minutes As in the classic convention of fairy tale storytelling, it typically starts off with a hero or heroine performing a task and then being rewarded. The best of them usually has an insurmountable event and then some magical assistance thrown in for good measure! The Cast The Handsome Prince – Who else? The pothole played… Continue reading A Pothole, Outsourced IT and Microsoft remote desktop story…
Benjamin Franklin and how to deal with Cyber-Crime…
Reading Time: 3 minutes If Benjamin Franklin had been alive today, I am sure he would be impressed with what we have done with the place and been at the forefront of IT innovation, especially in the last 50 years. Remember how we used to use typewriters to generate a letter and to make multiple copies of it. You’d… Continue reading Benjamin Franklin and how to deal with Cyber-Crime…
HOW TO RECYCLE YOUR OLD COMPUTER? HERE’S HOW…
Reading Time: 3 minutes A new widescreen screen arrives on your desk, along with a brand-new computer to power it. It has all the bells and whistles on it; Windows 10, Microsoft 365, virus and ransomware protection, all connected to a super-fast dedicated business leased internet line. It’s just like Christmas, as the boxes open, all the kit is… Continue reading HOW TO RECYCLE YOUR OLD COMPUTER? HERE’S HOW…
Everybody be cool, this is a robbery… (or how not to click on a phishing email)…
Reading Time: 4 minutes What a great film Pulp Fiction is, and that opening scene! Two thieves casually sipping coffee and discussing the good and the bad merits of robbing banks and liquor stores. As the Hawaiian shirt-clad villain says to the other, ‘‘There‘s no sense in robbing a bank. There’s no money in it’’. The method of robbing… Continue reading Everybody be cool, this is a robbery… (or how not to click on a phishing email)…
What has the Eurovision song contest got to do with Outsourced IT?
Reading Time: 4 minutes Back in 2002, the Greek entry by Michalis Rakintzis ‘SAGAPO’ for the Eurovision song contest came 17th. I’m sure Michalis won’t mind me sharing with you just how pertinent his lyrics are. Hey (Hey, hey, hey, hey) If you wanna get my love (Love, love, love, love) If you pray for me and hope (Hope,… Continue reading What has the Eurovision song contest got to do with Outsourced IT?
How much does IT downtime cost your business?
Reading Time: 3 minutes Your IT system crashes, and while it’s being repaired you put on the kettle to make a cup of tea. But you now realize you’re making lots of cups of tea every week and begin to wonder how much is all this downtime costing? Is it because you’re using sticking plaster solutions to resolve much… Continue reading How much does IT downtime cost your business?
FBI reports 2020 cyber-crime surge
Reading Time: 2 minutes The US Federal Bureau of Investigation says that more than $4 Billion was lost through cyber-attacks during 2020 by American businesses and individuals. An FBI report, using data from the FBI’s Internet Crime Complaint Centre (IC3), says that 20 per cent more money was lost in 2020 than in 2019. Victims also reported more than… Continue reading FBI reports 2020 cyber-crime surge
Virus spurs big office rethink
Reading Time: 2 minutes Half of UK businesses expect to reduce their office space, with a third looking to cut it down by 30 per cent. PricewaterhouseCoopers (PwC) surveyed 258 C-Suite executives and other senior employees of the UK’s largest companies. Their proposed cuts signify a reduction of around nine million square feet of space. The pandemic appears to… Continue reading Virus spurs big office rethink
COVID fuels online crime surge
Reading Time: 2 minutes The UK’s National Cyber Security Centre (NCSC) has stopped more online scams during the pandemic than the combined total of the previous three years. COVID and NHS-themed cyber-attacks fuelled the increase. Security experts recorded a 15-fold rise in the removal of online campaigns in 2020 compared to 2019. The findings were included in the NCSC’s… Continue reading COVID fuels online crime surge
Jobs boost speeds fibre roll-out
Reading Time: 2 minutes BT is set to create 7,000 new jobs to support its fibre broadband roll-out to 25 million UK premises. The company’s chief executive, Philip Jansen, said the jobs are part of plans to “build like fury across the country” to expand broadband coverage. Money from a government tax deduction will help pay for this investment.… Continue reading Jobs boost speeds fibre roll-out
Virus fuels working revolution
Reading Time: 2 minutes Leading companies are now looking to significantly change the working experience for employees due to the pandemic. Most recently, Salesforce announced it will let all employees work “remotely part or full-time, after the pandemic”. The software giant intends to scale-back its real estate footprint with more than 65 per cent of its workforce only coming… Continue reading Virus fuels working revolution
Pandemic boom-time for hackers
Reading Time: 2 minutes Cyber-crime had a boom year in 2020 as online attacks soared and ransomware earned perpetrators millions. UK businesses faced a 20 per cent rise in cybersecurity threats compared to 2019 and the first COVID-19 lockdown in March escalated hacking attempts into corporate networks. According to the internet service provider, Beaming, there were more than 686,000… Continue reading Pandemic boom-time for hackers
Firms shun security as cyber risks soar
Reading Time: 2 minutes Around half of the UK’s businesses had no security policies in place in 2020 – fewer than in 2019. According to a report by the Department for Digital, Culture, Media and Sport (DCMS), the proportion of businesses and charities using security monitoring tools fell from 40 per cent in 2019 to 35 per cent in… Continue reading Firms shun security as cyber risks soar
Ofcom triggers full-fibre roll-out
Reading Time: 2 minutes UK roll-out of Fibre To The Premises (FTTP) is being accelerated by Openreach and its competitors following new Ofcom regulations. The regulations, governing the wholesale telecoms market, aim to promote competition and investment in networks which can provide gigabit speeds to and from premises. Openreach became a legally separate company from BT in 2018, with… Continue reading Ofcom triggers full-fibre roll-out
Second-hand data storage danger
Reading Time: 2 minutes Beware when disposing of old data storage devices because these are likely to contain confidential business or personal information. Research company Kaspersky found that 90 per cent of second-hand storage devices, such as USB sticks, contained data that could be exploited if it fell into criminal hands. Anything from banking documents and company emails to… Continue reading Second-hand data storage danger
Video call fatigue hits home
Reading Time: 2 minutes Videoconferencing, using tools such as Zoom, Skype or Teams, is causing many remote workers to suffer serious fatigue. As so many people resort to virtual meetings due to the COVID 19 pandemic, various research studies are highlighting the downsides of technology which has proved such a lifeline for many businesses. In a report by Microsoft… Continue reading Video call fatigue hits home
Hackers poison US water supply
Reading Time: 3 minutes Cyber criminals have attempted to poison a city’s water supply in the United States. The attempt sharply highlights how critically important robust cybersecurity is to avoid exposure to hackers. Someone gained access to a computer at the water facility which supplies Oldsmar City in Pinellas County, Florida. By altering the facility’s remote-control software, TeamViewer, they… Continue reading Hackers poison US water supply
Hackers wage war on Microsoft Exchange
Reading Time: 2 minutes Microsoft Exchange Server users are being targeted by hackers in a series of ransomware attacks affecting thousands of organisations worldwide. According to Reuters, more than 20,000 organisations have been compromised in the US with many more across the globe. The victims include the European Banking Authority which has announced that personal data may have been… Continue reading Hackers wage war on Microsoft Exchange
Giant leap for wi-fi with 6 and 6E
Reading Time: 2 minutes A superior wi-fi experience is now on the horizon for UK businesses after successful trials of Wi-Fi 6 and the birth of the new Wi-Fi 6E standard. Regulators in the US and the UK have this year opened up the 6GHZ spectrum. And the technology which will use it has been branded 6E by the… Continue reading Giant leap for wi-fi with 6 and 6E
Global PC sales soar
Reading Time: 2 minutes Global sales of personal computers (PCs) soared over the past 12 months as many more people worked from home. Market research firm Canalys reports that PC shipments reached 297 million units in 2020, up an impressive 11 per cent from 2019. IDC puts the year at 302 million shipments, up 13.1 per cent year-on-year. And… Continue reading Global PC sales soar
Unrealistic broadband and 5G targets
Reading Time: 3 minutes Plans to bring high-speed internet to 85 per cent of UK households by 2025 is over-ambitious. So says a Broadband and the Road to 5G report, published by parliament’s Digital, Culture, Media and Sports Committee (DCMSC). It says there is “no genuine belief” that the current goal can be met. The National Audit Office has… Continue reading Unrealistic broadband and 5G targets
COVID fuels cybercrime surge
Reading Time: 2 minutes The UK’s National Cyber Security Centre (NCSC) has reported a surge in pandemic-related cyber attacks, with more than a quarter of all known incidents related to COVID-19. It handled 723 incidents between 1 September 2019 and 31 August 2020 – up from 658 reported in the previous 12 months. The increase in cases reflects ongoing… Continue reading COVID fuels cybercrime surge
Time to forget passwords?
Reading Time: 2 minutes Major technology providers are now moving towards a password-free world, but is it time for you to forget them? Steps towards a ‘password-less’ environment being taken by the likes of Google and Microsoft reflect the fact that the traditional way of protecting personal data is fundamentally unsafe. A report from Risk Based Security revealed more… Continue reading Time to forget passwords?
Offices axed as remote working grows
Reading Time: 2 minutes City firms may axe office space in London as the demand for remote working forces them to review how much square-footage they need. A survey by the Confederation of British Industry and professional services firm PwC has found that 74 per cent of London-based banks and insurance firms are re-assessing their office requirements. Of the… Continue reading Offices axed as remote working grows
BA gets £20m slap for mega-breach
Reading Time: 2 minutes British Airways (BA) has been let off a possible £183 million data breach fine due to the economic disruption caused by the coronavirus. The Information Commissioner’s Office (ICO) will now fine BA the smaller sum of £20 million, after taking into account appeals from the airline and also the economic fallout from the pandemic. The… Continue reading BA gets £20m slap for mega-breach
Virus fuels ransomware surge
Reading Time: 2 minutes Global ransomware attacks soared by 20 per cent in the first half of 2020 with 121 million incidents recorded worldwide. That’s according to research by SonicWall Capture Labs, which shows that 79.9 million targeted the US and 5.9 million in the UK. Both countries were just outside the top ten nations most affected. China and… Continue reading Virus fuels ransomware surge
Robotics surge as virus strikes
Reading Time: 2 minutes The scourge of coronavirus could be fundamentally changing the way businesses operate by expanding remote working and accelerating the deployment of robotics and AI. The British Chambers of Commerce (BCC) has released the results of its Coronavirus Impact Tracker, which reveals that the majority of businesses have made changes to adapt to the UK lockdown… Continue reading Robotics surge as virus strikes
UK’s broadband ranking plummets
Reading Time: 2 minutes British broadband speeds are now among the slowest in Europe having dropped to a lowly 47th in the world. This alarming news is revealed in new research conducted by Cable.co.uk, which indicates that the UK has fallen 13 places in an annual league table of global broadband speeds. Britain’s average broadband speed is 37.82 Mbits/sec.… Continue reading UK’s broadband ranking plummets
COVID changes the world
Reading Time: 3 minutes There are many signs that the COVID-19 pandemic is fundamentally changing the world we live in today. How we work, consume, enjoy entertainment and travel are all being re-assessed by governments, businesses and individuals. Some steps are totally new, and others are accelerating trends already apparent before the pandemic. As soon as countries went into… Continue reading COVID changes the world
Cybercrime epidemic costs trillions
Reading Time: 2 minutes The cost of cybercrime is snowballing at an alarming rate and costing organisations around the world many trillions of dollars. Four years ago, Cybersecurity Ventures – a leading researcher – predicted cybercrime would cost the world US$6 trillion a year by 2021. It’s a prediction which has been corroborated by many academics, senior government officials… Continue reading Cybercrime epidemic costs trillions
NatWest’s banking on biometrics
Reading Time: 2 minutes NatWest Bank is developing behavioural biometrics technology which could soon replace conventional passwords. Behavioural biometrics analyse the unique ways customers interact with their devices when making online purchases – helping to verify the identity of a payee to ensure it’s actually the cardholder who’s authorising the payment. NatWest’s roll-out of the technology starts next year… Continue reading NatWest’s banking on biometrics
Password re-use still poses a big threat
Reading Time: 2 minutes Millions of Microsoft users have been using log-on credentials that could be known by cybercriminals. A big part of the problem has been the re-use of passwords which has made it much easier for hackers to unlock users’ accounts. The software giant analysed a database of more than three billion leaked credentials pooled from multiple… Continue reading Password re-use still poses a big threat
Too many IT projects fail
Reading Time: 2 minutes Many organisations that set out to modernise their legacy IT systems never complete the process, according to new global research. A report commissioned by IT solutions and services company, Advanced, shows that different teams in a company can have conflicting priorities, and this makes any IT transformation much more challenging. Leadership teams often fail to… Continue reading Too many IT projects fail
Tech giants suspend police sales
Reading Time: 2 minutes Major technology companies are suspending sales of facial recognition software to US police departments until the laws concerning their appropriate use are tightened up. The decision from three tech giants came just two weeks after the death of George Floyd, which sparked a series of protests in the US, the UK and elsewhere. Amazon has… Continue reading Tech giants suspend police sales
Flexibility bug bites UK workers
Reading Time: 2 minutes Working from home during the pandemic has made many people reluctant to go back to their workplaces on a full-time basis despite an easing of the UK lockdown rules. Research commissioned by technology provider Okta surveyed 6,000 office workers across the UK. Just 24 per cent of respondents said they wanted to return to the… Continue reading Flexibility bug bites UK workers
Cyber attacks soar during the pandemic
Reading Time: 2 minutes Covid-19 is causing a surge in cybercrime as hackers use various techniques to steal data and disrupt organisations. According to analysis from an internet service provider (ISP) Beaming, UK companies experienced on average 157,000 cyber-attacks each in the first quarter of 2020. That’s the equivalent of more than one every minute. As a result, Beaming… Continue reading Cyber attacks soar during the pandemic
Leap in Microsoft Teams popularity
Reading Time: 2 minutes The Microsoft Teams collaboration suite is becoming a force to be reckoned with, as it now has 75 million daily active users. That’s an increase of 62 million since July 2019. Only a few months ago it overtook its rival, Slack, but it’s still less popular than Microsoft’s other business chat platform, Skype for Business.… Continue reading Leap in Microsoft Teams popularity