Facebook Bans Deepfake Videos

In a recent blog post, ahead of the forthcoming US election, Monika Bickert, Vice President, of Facebook’s Global Policy Management has announced that the social media giant is banning deepfakes and “all types of manipulated media”. Not Like Last Time With the 59th US presidential election scheduled for Tuesday, November 3, 2020, Facebook appears to […]

Continue reading


How to Set Up and Configure Multi-Factor Authentication (MFA) in the Office 365 Admin Center

The threats to business go far beyond cyber criminals accessing data. This can be the start of a very uncomfortable journey for business. After a breach clients have 72 hours to report to the ICO a breach. To help protect our customers we have prepared the following guide on how to activate Multi Factor Authentication […]

Continue reading


Featured Article – Email Security (Part 2)

Following on from last month’s featured article about email security (part 1), in part 2 we focus on many of the email security and threat predictions for this year and for the near, foreseeable future. Looking Forward In part 1 of this ‘Email Security’ snapshot, we looked at how most breaches involve email, the different […]

Continue reading


Real-time Phishing Protection Now Available in Chrome

Google has announced real-time phishing protection with the help of improvements to ‘Safe Browsing’ which allow Chrome to check each new site you visit against a safe list stored on your computer and with Google so that Chrome can issue an instant warning if the site is thought to be suspicious or malicious. Phishing Problem […]

Continue reading


Facebook’s New Tool Allows You To Port Your Photos & Videos To Google

Facebook has announced that it is releasing a data portability tool that will enable Facebook users to transfer their Facebook photos and videos directly to other services, starting with Google Photos. Why? Facebook acknowledged in its white paper (published back in September) that under GDPR currently, and under the California Consumer Privacy Act rules next […]

Continue reading


Over Half of Businesses Don’t Respond To GDPR Requests On Time

The results of a survey by Talend show that 58% of businesses worldwide fail to address requests from individuals for a copy of their personal data within the one-month time limit as required by GDPR. Bad, But Better Than Last Year The survey, which involved 103 GDPR-relevant companies across the globe (84% of which were […]

Continue reading


How Does Encryption Work?

Encryption comes from the age-old science of cryptography.  In the digital world of today, encryption refers to using electronic devices to generate unique encryption algorithms which essentially scramble messages and data, making them unintelligible to anyone who tries to intercept them, and also to provide an effective way to lock our electronic devices. Using Encryption […]

Continue reading


Hacker’s Website Closed Down In International Operation

A website (and its supporting infrastructure) which sold a variety of hacking tools to other would-be cybercriminals has been closed down after an investigation by agencies from multiple countries including the UK’s National Crime Agency (NCA). IM-RAT The main tool that the agencies were particularly interested in eradicating was the Imminent Monitor Remote Access Trojan […]

Continue reading


The Difference Between Backup and Disaster Recovery

We’re all familiar with the value of making a backup of business data, but how does this fit with ‘Disaster Recovery’ and ‘Business Continuity’ strategies?  This article takes a brief look at how these elements fit together to ensure that businesses can survive, function and get back up to speed when disastrous events (external or […]

Continue reading


Google Or Samsung Android Cameras Could Be Spying On You

Researchers at Checkmarx say they have discovered vulnerabilities in Google and Samsung smartphone apps that could allow hackers to remotely spy on users using their phone’s camera and speakers. Study The proof-of-concept (PoC) study results, highlighted on the Checkmarx blog reveal how the Checkmarx Security Research Team cracked into the apps that control android phone […]

Continue reading