Featured Article – Email Security (Part 2)

Following on from last month’s featured article about email security (part 1), in part 2 we focus on many of the email security and threat predictions for this year and for the near, foreseeable future. Looking Forward In part 1 of this ‘Email Security’ snapshot, we looked at how most breaches involve email, the different […]

Continue reading


How Does Encryption Work?

Encryption comes from the age-old science of cryptography.  In the digital world of today, encryption refers to using electronic devices to generate unique encryption algorithms which essentially scramble messages and data, making them unintelligible to anyone who tries to intercept them, and also to provide an effective way to lock our electronic devices. Using Encryption […]

Continue reading


The Battle Between ‘Slack’ and ‘Teams’

With Microsoft’s announcement that it’s Teams product has 20 million daily active users (and growing), sending Slack’s share price downwards (Slack has 12 million users), the battle is well underway in the $3.5 billion chat-based collaborative working software market. What Is Slack? Slack, launched in 2013, is a cloud-based set of proprietary team collaboration tools […]

Continue reading


Free VPN Tools May Be Linked To China

A new investigation by Metric Labs of the top free VPN (Virtual Private Network) apps in Apple’s App Store and Google Play has revealed that more than half are run by companies with Chinese ownership. What’s A VPN? A ‘Virtual Private Network’ (VPN) is generally used to keep internet activity private, evade censorship / maintain […]

Continue reading


Apple Offers Free Repairs For iPhone X and MacBook Problems

Apple Inc is reported to be offering free repairs / replacements for problems relating to screen touch issues on the iPhone X and data loss and storage drive failures in 13-inch MacBook Pro computers. iPhone X Problems The offer of free fixes in the iPhone X handset, which was only released last November and was […]

Continue reading


IBM Security Expert Says Prepare For Quantum

As businesses come to realise that they may be required to store some data for decades, encrypted data should be secure well beyond its useful life, and with this in mind, security architect for Benelux at IBM, Christiane Peters, is suggesting that businesses should start preparing now to implement post-quantum data protection. Post What? The […]

Continue reading


New Features and New Prices For Old Apple Products

At a recent event at the Brooklyn Academy of Music in New York, Apple announced the introduction of new features and accompanying price changes for old favourite products like the iPad Pro and Mac Book. iPad Pro It was announced that Apple’s higher-end tablet and direct competitor to Microsoft’s Surface, the iPad Pro, will be […]

Continue reading


Blurring of Personal and Business Technology Cause For Concern

A report by CCS Insight showing how three-quarters of employees are forced to install work software on their personal mobile devices has highlighted how the increased blurring of personal and business technology is causing concern. Objections The report, which took into account the views of 672 employees across the US and Western Europe about digital […]

Continue reading


How Business Emails Are Vulnerable

Research by digital risk management and threat intelligence firm Digital Shadows has revealed that company credentials and emails that can be easily accessed on the web are making it easier for cyber-criminals to target businesses with attacks. What’s Are The Problems? According to the research, businesses may be suffering targeted attacks because several key problems […]

Continue reading


Chrome Extensions Get Security, Privacy and Performance Boost

Following the introduction last month of Google Chrome 69’s better password protection, Google has announced that Chrome 70 will bring trustworthy extensions by default. What Are Extensions? The Chrome extension system, introduced to the browser nearly a decade ago, has enabled the introduction of 180,000 different extensions which are small, bolt-on software programs that allow […]

Continue reading