Copilot – A Stitch in Time Saves Nine

Reading Time: 2 minutes For small and medium-sized businesses (SMBs), Copilot can be a game-changer, offering a suite of benefits that can help your business, bring energy to your team’s output and put a smile on your client’s face, with the improved business interaction they have with you.

Worthing Golf Club Goes the Extra Mile

Reading Time: 2 minutes Golf courses are often located in rural areas, so they face unique challenges when it comes to reliable internet connectivity. These locations are ideal for golf and are a key aspect of the golfing experience.

Protecting your Emails with DKIM/DMARC

Reading Time: 3 minutes Sending an email is a bit like a relay race. Each runner has a crucial role to play, in ensuring that the baton (the email) reaches the finish line (the recipient) without any tampering.

Meet James Butler, our top TAM

Reading Time: 3 minutes What is your earliest recollection of IT in your life? I was about 13 years old, and I remember arguing with my dad about whether I could stay up all night to play computer games on a PC that he had brought home.

CNC-FluidOne FareShare Charity run update

Reading Time: 2 minutes Team CNC-FluidOne put on their running shoes and 15 runners did their bit on a wonderful summer’s evening. Burning up 5 kilometres, all in an effort to support FareShare UK.

What you need to know to keep your data safe

Reading Time: 2 minutes There’s a common myth going around that Microsoft 365 automatically protects and backs up your data. Sadly, it’s a popular misconception that many businesses put themselves at risk with

How to use your smartphone in the art of disconnecting

Reading Time: 3 minutes Switching off from work can be hard. There’s an expectation to be “always on”, where your personal life and your business world never separate. Here’s how to get a minute or two to practice the art of stone stacking.

Stay safe and secure: cyber tips for when you’re on the move

Reading Time: 5 minutes So, you’ve been going through your checklist before you fly off on your business trip: encrypt or delete sensitive files? CHECK. Tamper seals over the hard drive access points? CHECK. Spare USB port locks? CHECK, privacy screen? CHECK. Was it always like this?

Pen Testing – let me explain

Reading Time: 5 minutes In the IT industry, we have a penchant for acronyms. If we can condense the name of a service, product, or piece of equipment into just three letters, we’re as happy as a lark.

What you need to know about the PSTN switch-off

Image of optical fibers with binary codes. internet connection with fiber

Reading Time: 2 minutes Every technology has its day and now, it’s time to take the next step forward in the evolution of telecommunications.

Business showdown: cloud service vs. on-premise solutions

Reading Time: 5 minutes In the late autumn of 1965, the Rolling Stones released ‘Get off my cloud’. It’s one of the band’s signature tunes, reaching the number-one spot in the UK, the US, Canada and Germany. They could have never imagined that the title of their song would have such relevance today.

Staying one step ahead: phishing, vishing, and smishing

Studio shot of a handsome young man using a laptop and looking stressed against a white background

Reading Time: 4 minutes Phishing, vishing, and smishing sound like the names of small villages on a beautiful coastline in some faraway paradise, but I can assure you these names stand for something completely onerous.

The ultimate guide to protecting your company from cyber threats

Portrait of happy African businesswoman holding digital tablet standing in the office. Female entrepreneur at her startup office looking at camera and smiling.

Reading Time: 3 minutes You go into your office and find yourself locked out of your computer and, it gets worse you’re being asked for a ransom to retrieve your access, here’s how you can stop that.

Outsourced IT Support: Finding the Perfect Fit for Your Company

Guests throwing confetti over bride and groom as they walk past after their wedding ceremony. Joyful young couple celebrating their wedding day

Reading Time: 4 minutes Outsourced IT support is just like a marriage. It’s about finding an IT partner who is going to go through all the joys and wonders of business life, with your hand in hand.

Microsoft 365 Copilot – A Vision of Things to Come

Shot of a young businesswoman looking stressed out in a demanding office environment

Reading Time: 4 minutes We spend an average of about 37 hours a week at work, of which 68% is spent on ‘doing stuff,’ spending time on various tasks, creating more tasks and attending meetings. Don’t we just love those meetings?

Common Mistakes to Avoid in Backup and Disaster Recovery

Portrait of an attractive woman at the table with cup and laptop, book, notebook on it, grabbing her head. Bookshelf at the background, concept photo

Reading Time: 4 minutes In today’s data-driven world, backup and disaster recovery have become crucial aspects of any business’s IT infrastructure.

10th October 2023 (Windows 2012)

Pictures of Vintage Real Santa Claus carrying gift sack. This pictures a horizontal composition and ia wintery background.

Reading Time: 5 minutes You would be absolutely right in thinking that the date 10th October, is only 10 weeks away from Christmas. However, the 10th of October 2023, is a very special day in its own right. It is in fact, the last day of support and security from Microsoft for Windows Server 2012, and Windows Server 2012/R2.

Exploring the Benefits of Microsoft 365 for Businesses

Bucharest, Romania - June 04, 2022: View of Microsoft Romania headquarters in City Gate Towers situated in Free Press Square, in Bucharest, Romania.

Reading Time: 5 minutes In today’s fast-paced and interconnected world, businesses are continually seeking ways to enhance productivity, streamline operations, and stay competitive.

Outsourced IT Support, Is it really worth it?

Dissatisfied and upset woman at workplace looking at laptop screen, business woman received error and refusal of online banking transaction, female worker disappointed inside office.

Reading Time: 6 minutes In today’s rapidly evolving business landscape, you’d be hard-pressed to find a business or sector that doesn’t rely on IT in one form or another.

The Crucial Role of a Chief Information Security Officer (CISO)

Cropped shot of a mature businessman working on programming code

Reading Time: 5 minutes In today’s digital landscape, businesses face an ever-increasing threat of cyber-attacks and cybercrime. As organisations become more reliant on technology and data, the need for advanced security measures to protect against cyber threats has become paramount.

MOVEit File CyberHack

Hacker attack computer hardware microchip while process data through internet network, 3d rendering insecure Cyber Security exploit database breach concept, virus malware unlock warning screen

Reading Time: 4 minutes Cybercriminals known as Cl0p ransomware group, thought to be part of a Russian crime ring, have exploited a newly discovered flaw within the popular MOVEit file transfer software.

Protecting Your Business from Cybersecurity Threats: Top Tips for Enhanced Security

View at mature business woman explaining project details on a meeting in office

Reading Time: 4 minutes Cybersecurity is not just about technology; it’s about people, processes, and awareness.” – Vishal Salvi In today’s digitally-driven world, businesses face an ever-growing threat landscape when it comes to cybersecurity. Cybercriminals are continuously devising new techniques to exploit vulnerabilities and compromise sensitive data. As a result, safeguarding your business from cyber threats has become more… Continue reading Protecting Your Business from Cybersecurity Threats: Top Tips for Enhanced Security

Antivirus vs EDR what’s the difference?

Happy office worker sitting, typing, working, and selling big at 1970's or 1980's monochrome computer. Retro office interior scene. Wood Paneling and a water cooler in the background. Old retro vintage technology

Reading Time: 5 minutes When the picture above was taken sometime in the early 80’s, Anti-Virus (AV) protection was almost unheard of. The idea that someone would create a malicious program that would cause your computer to fail was in its infancy.

Protect your business with Cyber Essentials.

A male roman soldier in full uniform, armour, helmet, carrying a sword and dagger, standing and looking way from the camera, holding a spear - pilum near to a shield. The grand classical buildings of Ancient Rome, including the Colosseum are visible in the background at sunset.

Reading Time: 5 minutes Today in the digital age, we store information electronically. Why? Because information is power; it can be our competitive advantage over other businesses. Our supplier list of who provides us with what, and when; it might be customer information, entrusted to us through a sales transaction and numerous other details, all particular to our business.

What is Patch Management?

Reading Time: 4 minutes Whatever your favourite canine might tell you, “Get off the sofa, stop chasing cars, begging for food, digging up the garden, or chewing the furniture”, whether your dog is called Patch or not, you’d be right in thinking, patch management is none of the above.

What are the Top 10 Benefits of Outsourced IT Support? (And the one thing they never tell you…)

Teenager girl with white short hair over yellow wall shouting with mouth wide open

Reading Time: 6 minutes Managing your own IT can sometimes feel like a full-time job. How did IT become the centre of everyone’s business? The short answer is information. Every successful business needs to be able to tap into a sophisticated database of information to maintain its competitive edge. So, having your IT working for you and not against… Continue reading What are the Top 10 Benefits of Outsourced IT Support? (And the one thing they never tell you…)

Published
Categorized as Outsourcing

What is mobile device management (MDM)

Business People Working with Technology

Reading Time: 4 minutes Mobile Device Management (MDM) is a system that allows businesses to securely manage the devices that their employees use to access company data and resources Why is Mobile Device Management So Important? MDM software allows you to control, secure, and automate any security enforcement policies and compliance standards, across all your company’s laptops, smartphones and… Continue reading What is mobile device management (MDM)

Published
Categorized as Security

Cyber Security Insurance, or Not to Cyber Security Insurance? – That is the Question

Siege to a medieval castle

Reading Time: 4 minutes Not quite the opening line of Hamlet, Act 1 Scene 1. However, in Shakespeare’s version as Bernardo looks out from the misty battlements, high up on the outer walls of Elsinore castle, he calls out to his fellow soldier, Francisco ‘Who’s there?’ Francisco replies ‘Nay, answer me. Stand and unfold yourself’. Protecting castles back in… Continue reading Cyber Security Insurance, or Not to Cyber Security Insurance? – That is the Question

Published
Categorized as Security

How Hackers use Public Wi-Fi to Steal Information…

Reading Time: 4 minutes Wi-Fi is everywhere. Buses, trains, cafes and pubs of course. It’s at the gym, taxis, shopping centres, the list goes on. Hold on a minute, just let me check my bank statement, whilst I’m enjoying a mocha coffee. As they say, I’ll just pop in my password, which is the heart of the problem. Sitting… Continue reading How Hackers use Public Wi-Fi to Steal Information…

Published
Categorized as Security

Cyber Security During a Recession

Ice cream on the ground. (selective focus)

Reading Time: 4 minutes The news is full of it at the moment; a recession is just around the corner. ‘The recession we have been dreading is about to strike’, ‘it will be the longest and deepest recession since the 50’s’. Industry leaders will be rolling back budgets in anticipation, as revenues decrease. Costs must come down! One of… Continue reading Cyber Security During a Recession

Published
Categorized as Security

Zoom Vs Microsoft Teams – Which is best?

Flattening the curve: a happy woman sitting at home and talking to her friends or colleagues in a meeting using her laptop computer.

Reading Time: 6 minutes As unintended consequences go, online collaboration got a really massive boost when the COVID 19 pandemic swept around the world as the virus looked to decimate the business landscape. Video calling that had once been the communication tool for all but a few, two video conferencing tools Zoom and Microsoft Teams saved the day and… Continue reading Zoom Vs Microsoft Teams – Which is best?

Published
Categorized as Tech News

How to Prevent DDoS Attacks…

Reading Time: 5 minutes In its purest form, DDoS stands for Distributed Denial of Service. A DDoS attack is a combined cyber attack on a specific server or network, with an overwhelming amount of information, with the intended purpose of disrupting normal service. That’s the dictionary version, but what does a DDoS attack look like in the real world?… Continue reading How to Prevent DDoS Attacks…

Published
Categorized as Security

Top 10 Benefits of Microsoft Teams

Reading Time: 5 minutes At the heart of every business is a conversation. Between your team, between suppliers, customers, local or global. A telephone call is good, we have been making those for a long time-since March 10th, 1876, to be precise. Interestingly, the first words spoken by Alexander Graham Bell in the worlds first telephone call, were: ‘‘Mr… Continue reading Top 10 Benefits of Microsoft Teams

Published
Categorized as Tech News

A Pothole, Outsourced IT and Microsoft remote desktop story…

Reading Time: 3 minutes As in the classic convention of fairy tale storytelling, it typically starts off with a hero or heroine performing a task and then being rewarded. The best of them usually has an insurmountable event and then some magical assistance thrown in for good measure! The Cast The Handsome Prince – Who else? The pothole played… Continue reading A Pothole, Outsourced IT and Microsoft remote desktop story…

Published
Categorized as Tech News

HOW TO RECYCLE YOUR OLD COMPUTER? HERE’S HOW…

Reading Time: 3 minutes A new widescreen screen arrives on your desk, along with a brand-new computer to power it. It has all the bells and whistles on it; Windows 10, Microsoft 365, virus and ransomware protection, all connected to a super-fast dedicated business leased internet line. It’s just like Christmas, as the boxes open, all the kit is… Continue reading HOW TO RECYCLE YOUR OLD COMPUTER? HERE’S HOW…

Published
Categorized as Tech News

Everybody be cool, this is a robbery… (or how not to click on a phishing email)…

Reading Time: 4 minutes What a great film Pulp Fiction is, and that opening scene! Two thieves casually sipping coffee and discussing the good and the bad merits of robbing banks and liquor stores. As the Hawaiian shirt-clad villain says to the other, ‘‘There‘s no sense in robbing a bank. There’s no money in it’’. The method of robbing… Continue reading Everybody be cool, this is a robbery… (or how not to click on a phishing email)…

Published
Categorized as Tech News

What has the Eurovision song contest got to do with Outsourced IT?

Reading Time: 4 minutes Back in 2002, the Greek entry by Michalis Rakintzis ‘SAGAPO’ for the Eurovision song contest came 17th. I’m sure Michalis won’t mind me sharing with you just how pertinent his lyrics are. Hey (Hey, hey, hey, hey) If you wanna get my love (Love, love, love, love) If you pray for me and hope (Hope,… Continue reading What has the Eurovision song contest got to do with Outsourced IT?

Published
Categorized as Tech News

FBI reports 2020 cyber-crime surge

Washington, USA - April 24, 2011: FBI emblem on the J. Edgar Hoover F.B.I. Building in downtown Washington, DC

Reading Time: 2 minutes The US Federal Bureau of Investigation says that more than $4 Billion was lost through cyber-attacks during 2020 by American businesses and individuals. An FBI report, using data from the FBI’s Internet Crime Complaint Centre (IC3), says that 20 per cent more money was lost in 2020 than in 2019. Victims also reported more than… Continue reading FBI reports 2020 cyber-crime surge

Published
Categorized as Tech News

Virus spurs big office rethink

Mobile office at Mount Fuji, Japan

Reading Time: 2 minutes Half of UK businesses expect to reduce their office space, with a third looking to cut it down by 30 per cent. PricewaterhouseCoopers (PwC) surveyed 258 C-Suite executives and other senior employees of the UK’s largest companies. Their proposed cuts signify a reduction of around nine million square feet of space. The pandemic appears to… Continue reading Virus spurs big office rethink

Published
Categorized as Tech News

COVID fuels online crime surge

Illustration vector: Covid-19 fraud and scam alert

Reading Time: 2 minutes The UK’s National Cyber Security Centre (NCSC) has stopped more online scams during the pandemic than the combined total of the previous three years. COVID and NHS-themed cyber-attacks fuelled the increase. Security experts recorded a 15-fold rise in the removal of online campaigns in 2020 compared to 2019. The findings were included in the NCSC’s… Continue reading COVID fuels online crime surge

Published
Categorized as Tech News

Jobs boost speeds fibre roll-out

Birmingham, UK - September 25, 2015: The British Telecom Tower for telecommunications is the tallest building in Birmingham

Reading Time: 2 minutes BT is set to create 7,000 new jobs to support its fibre broadband roll-out to 25 million UK premises. The company’s chief executive, Philip Jansen, said the jobs are part of plans to “build like fury across the country” to expand broadband coverage. Money from a government tax deduction will help pay for this investment.… Continue reading Jobs boost speeds fibre roll-out

Published
Categorized as Tech News

Virus fuels working revolution

contemporary office interior. 3d rendering design concept

Reading Time: 2 minutes Leading companies are now looking to significantly change the working experience for employees due to the pandemic. Most recently, Salesforce announced it will let all employees work “remotely part or full-time, after the pandemic”. The software giant intends to scale-back its real estate footprint with more than 65 per cent of its workforce only coming… Continue reading Virus fuels working revolution

Published
Categorized as Tech News

Pandemic boom-time for hackers

Digital illustration of a macro Covid-19 cell with red words Security Breach, data processing and statistics over a man wearing a hoodie. Coronavirus Covid-19 pandemic concept digital composite

Reading Time: 2 minutes Cyber-crime had a boom year in 2020 as online attacks soared and ransomware earned perpetrators millions. UK businesses faced a 20 per cent rise in cybersecurity threats compared to 2019 and the first COVID-19 lockdown in March escalated hacking attempts into corporate networks. According to the internet service provider, Beaming, there were more than 686,000… Continue reading Pandemic boom-time for hackers

Published
Categorized as Tech News

Firms shun security as cyber risks soar

Road sign with words security versus risk. White two street signs with arrow on metal pole. Directional road, Crossroads Road Sign, Two Arrow. Blue sky background

Reading Time: 2 minutes Around half of the UK’s businesses had no security policies in place in 2020 – fewer than in 2019. According to a report by the Department for Digital, Culture, Media and Sport (DCMS), the proportion of businesses and charities using security monitoring tools fell from 40 per cent in 2019 to 35 per cent in… Continue reading Firms shun security as cyber risks soar

Published
Categorized as Tech News

Ofcom triggers full-fibre roll-out

Cardiff, Wales - April 2019: BT Openreach van parked in a city centre street in Cardiff. An operative is working behind barriers on a network connection point.

Reading Time: 2 minutes UK roll-out of Fibre To The Premises (FTTP) is being accelerated by Openreach and its competitors following new Ofcom regulations. The regulations, governing the wholesale telecoms market, aim to promote competition and investment in networks which can provide gigabit speeds to and from premises. Openreach became a legally separate company from BT in 2018, with… Continue reading Ofcom triggers full-fibre roll-out

Published
Categorized as Tech News

Second-hand data storage danger

green pencil with an eraser erases the data. The concept of security, data deletion

Reading Time: 2 minutes Beware when disposing of old data storage devices because these are likely to contain confidential business or personal information. Research company Kaspersky found that 90 per cent of second-hand storage devices, such as USB sticks, contained data that could be exploited if it fell into criminal hands. Anything from banking documents and company emails to… Continue reading Second-hand data storage danger

Published
Categorized as Tech News

Video call fatigue hits home

Shot of stressed business woman working from home on laptop looking worried, tired and overwhelmed.

Reading Time: 2 minutes Videoconferencing, using tools such as Zoom, Skype or Teams, is causing many remote workers to suffer serious fatigue. As so many people resort to virtual meetings due to the COVID 19 pandemic, various research studies are highlighting the downsides of technology which has proved such a lifeline for many businesses. In a report by Microsoft… Continue reading Video call fatigue hits home

Published
Categorized as Tech News

Hackers poison US water supply

The Solid Contact Clarifier Tank type Sludge Recirculation process in Water Treatment plant

Reading Time: 3 minutes Cyber criminals have attempted to poison a city’s water supply in the United States. The attempt sharply highlights how critically important robust cybersecurity is to avoid exposure to hackers. Someone gained access to a computer at the water facility which supplies Oldsmar City in Pinellas County, Florida. By altering the facility’s remote-control software, TeamViewer, they… Continue reading Hackers poison US water supply

Published
Categorized as Tech News

Hackers wage war on Microsoft Exchange

Mountain View, CA, USA - Sept. 4, 2016: Microsoft Silicon Valley Center. Microsoft SVC is the software giant's presence in the Silicon Valley of California.

Reading Time: 2 minutes Microsoft Exchange Server users are being targeted by hackers in a series of ransomware attacks affecting thousands of organisations worldwide. According to Reuters, more than 20,000 organisations have been compromised in the US with many more across the globe. The victims include the European Banking Authority which has announced that personal data may have been… Continue reading Hackers wage war on Microsoft Exchange

Published
Categorized as Tech News

Giant leap for wi-fi with 6 and 6E

Wireless communication network in Big city concept. IoT(Internet of Things). ICT(Information Communication Technology)

Reading Time: 2 minutes A superior wi-fi experience is now on the horizon for UK businesses after successful trials of Wi-Fi 6 and the birth of the new Wi-Fi 6E standard. Regulators in the US and the UK have this year opened up the 6GHZ spectrum. And the technology which will use it has been branded 6E by the… Continue reading Giant leap for wi-fi with 6 and 6E

Published
Categorized as Tech News

Global PC sales soar

different computers in store background

Reading Time: 2 minutes Global sales of personal computers (PCs) soared over the past 12 months as many more people worked from home. Market research firm Canalys reports that PC shipments reached 297 million units in 2020, up an impressive 11 per cent from 2019. IDC puts the year at 302 million shipments, up 13.1 per cent year-on-year. And… Continue reading Global PC sales soar

Published
Categorized as Tech News

Unrealistic broadband and 5G targets

3D illustration of a FTTH network for high broadband access over white background

Reading Time: 3 minutes Plans to bring high-speed internet to 85 per cent of UK households by 2025 is over-ambitious. So says a Broadband and the Road to 5G report, published by parliament’s Digital, Culture, Media and Sports Committee (DCMSC). It says there is “no genuine belief” that the current goal can be met. The National Audit Office has… Continue reading Unrealistic broadband and 5G targets

Published
Categorized as Tech News

COVID fuels cybercrime surge

Digital illustration of a macro Covid-19 cell with macro Covid-19 cells and numbers floating over man wearing hoodie and black face mask. Coronavirus Covid-19 pandemic concept digital composite

Reading Time: 2 minutes The UK’s National Cyber Security Centre (NCSC) has reported a surge in pandemic-related cyber attacks, with more than a quarter of all known incidents related to COVID-19. It handled 723 incidents between 1 September 2019 and 31 August 2020 – up from 658 reported in the previous 12 months. The increase in cases reflects ongoing… Continue reading COVID fuels cybercrime surge

Published
Categorized as Tech News

Time to forget passwords?

Two Hexagon Icons symbolising Secure Athetication in Front of a Smartphone and a Laptop Computer

Reading Time: 2 minutes Major technology providers are now moving towards a password-free world, but is it time for you to forget them? Steps towards a ‘password-less’ environment being taken by the likes of Google and Microsoft reflect the fact that the traditional way of protecting personal data is fundamentally unsafe. A report from Risk Based Security revealed more… Continue reading Time to forget passwords?

Published
Categorized as Tech News

Offices axed as remote working grows

Light office interior with panoramic window, new york city view and daylight. 3D Rendering

Reading Time: 2 minutes City firms may axe office space in London as the demand for remote working forces them to review how much square-footage they need. A survey by the Confederation of British Industry and professional services firm PwC has found that 74 per cent of London-based banks and insurance firms are re-assessing their office requirements. Of the… Continue reading Offices axed as remote working grows

Published
Categorized as Tech News

BA gets £20m slap for mega-breach

March 13, 2020 San Jose / CA / USA - Close up of the front a British Airways Boeing 787 Dreamliner displaying the company logo and symbol; British Airways (BA) is the flag carrier airline of the UK

Reading Time: 2 minutes British Airways (BA) has been let off a possible £183 million data breach fine due to the economic disruption caused by the coronavirus. The Information Commissioner’s Office (ICO) will now fine BA the smaller sum of £20 million, after taking into account appeals from the airline and also the economic fallout from the pandemic. The… Continue reading BA gets £20m slap for mega-breach

Published
Categorized as Tech News

Virus fuels ransomware surge

Ransom message from newspaper letters.

Reading Time: 2 minutes Global ransomware attacks soared by 20 per cent in the first half of 2020 with 121 million incidents recorded worldwide. That’s according to research by SonicWall Capture Labs, which shows that 79.9 million targeted the US and 5.9 million in the UK. Both countries were just outside the top ten nations most affected. China and… Continue reading Virus fuels ransomware surge

Published
Categorized as Tech News

Robotics surge as virus strikes

3d rendering humanoid robots working with headset and notebook

Reading Time: 2 minutes The scourge of coronavirus could be fundamentally changing the way businesses operate by expanding remote working and accelerating the deployment of robotics and AI. The British Chambers of Commerce (BCC) has released the results of its Coronavirus Impact Tracker, which reveals that the majority of businesses have made changes to adapt to the UK lockdown… Continue reading Robotics surge as virus strikes

Published
Categorized as Tech News

UK’s broadband ranking plummets

Snail crawling on download bar, conceptual image showing slow internet downloading

Reading Time: 2 minutes British broadband speeds are now among the slowest in Europe having dropped to a lowly 47th in the world. This alarming news is revealed in new research conducted by Cable.co.uk, which indicates that the UK has fallen 13 places in an annual league table of global broadband speeds. Britain’s average broadband speed is 37.82 Mbits/sec.… Continue reading UK’s broadband ranking plummets

Published
Categorized as Tech News

COVID changes the world

Unemployment, coronacrisis. Big office with covered computers with no workers, remote work, panorama

Reading Time: 3 minutes There are many signs that the COVID-19 pandemic is fundamentally changing the world we live in today. How we work, consume, enjoy entertainment and travel are all being re-assessed by governments, businesses and individuals. Some steps are totally new, and others are accelerating trends already apparent before the pandemic. As soon as countries went into… Continue reading COVID changes the world

Published
Categorized as Tech News

Cybercrime epidemic costs trillions

mixed media of financial technology concept

Reading Time: 2 minutes The cost of cybercrime is snowballing at an alarming rate and costing organisations around the world many trillions of dollars. Four years ago, Cybersecurity Ventures – a leading researcher – predicted cybercrime would cost the world US$6 trillion a year by 2021. It’s a prediction which has been corroborated by many academics, senior government officials… Continue reading Cybercrime epidemic costs trillions

Published
Categorized as Tech News

NatWest’s banking on biometrics

London: Person exits NatWest bank branch in London. National Westminster Bank, known as NatWest is a large British bank with 1,400 branches.

Reading Time: 2 minutes NatWest Bank is developing behavioural biometrics technology which could soon replace conventional passwords. Behavioural biometrics analyse the unique ways customers interact with their devices when making online purchases – helping to verify the identity of a payee to ensure it’s actually the cardholder who’s authorising the payment. NatWest’s roll-out of the technology starts next year… Continue reading NatWest’s banking on biometrics

Published
Categorized as Tech News

Password re-use still poses a big threat

Hacker accessing to personal data information with a computer in a dark room 3D rendering

Reading Time: 2 minutes Millions of Microsoft users have been using log-on credentials that could be known by cybercriminals. A big part of the problem has been the re-use of passwords which has made it much easier for hackers to unlock users’ accounts. The software giant analysed a database of more than three billion leaked credentials pooled from multiple… Continue reading Password re-use still poses a big threat

Published
Categorized as Tech News

Too many IT projects fail

System Fail Situation

Reading Time: 2 minutes Many organisations that set out to modernise their legacy IT systems never complete the process, according to new global research. A report commissioned by IT solutions and services company, Advanced, shows that different teams in a company can have conflicting priorities, and this makes any IT transformation much more challenging. Leadership teams often fail to… Continue reading Too many IT projects fail

Published
Categorized as Tech News

Tech giants suspend police sales

Surveillance camera with face recognition system

Reading Time: 2 minutes Major technology companies are suspending sales of facial recognition software to US police departments until the laws concerning their appropriate use are tightened up. The decision from three tech giants came just two weeks after the death of George Floyd, which sparked a series of protests in the US, the UK and elsewhere. Amazon has… Continue reading Tech giants suspend police sales

Published
Categorized as Tech News

Flexibility bug bites UK workers

Professional business teleworkers connecting online and working from home for their corporate company, remote working and networks concept

Reading Time: 2 minutes Working from home during the pandemic has made many people reluctant to go back to their workplaces on a full-time basis despite an easing of the UK lockdown rules. Research commissioned by technology provider Okta surveyed 6,000 office workers across the UK. Just 24 per cent of respondents said they wanted to return to the… Continue reading Flexibility bug bites UK workers

Published
Categorized as Tech News

Cyber attacks soar during the pandemic

COVID-19 hacking icon with skull and binary code in background

Reading Time: 2 minutes Covid-19 is causing a surge in cybercrime as hackers use various techniques to steal data and disrupt organisations. According to analysis from an internet service provider (ISP) Beaming, UK companies experienced on average 157,000 cyber-attacks each in the first quarter of 2020. That’s the equivalent of more than one every minute. As a result, Beaming… Continue reading Cyber attacks soar during the pandemic

Published
Categorized as Tech News

Leap in Microsoft Teams popularity

Reading Time: 2 minutes The Microsoft Teams collaboration suite is becoming a force to be reckoned with, as it now has 75 million daily active users. That’s an increase of 62 million since July 2019. Only a few months ago it overtook its rival, Slack, but it’s still less popular than Microsoft’s other business chat platform, Skype for Business.… Continue reading Leap in Microsoft Teams popularity

Published
Categorized as Tech News