Facebook Bans Deepfake Videos

In a recent blog post, ahead of the forthcoming US election, Monika Bickert, Vice President, of Facebook’s Global Policy Management has announced that the social media giant is banning deepfakes and “all types of manipulated media”. Not Like Last Time With the 59th US presidential election scheduled for Tuesday, November 3, 2020, Facebook appears to […]

Continue reading


How to Set Up and Configure Multi-Factor Authentication (MFA) in the Office 365 Admin Center

The threats to business go far beyond cyber criminals accessing data. This can be the start of a very uncomfortable journey for business. After a breach clients have 72 hours to report to the ICO a breach. To help protect our customers we have prepared the following guide on how to activate Multi Factor Authentication […]

Continue reading


Featured Article – Email Security (Part 2)

Following on from last month’s featured article about email security (part 1), in part 2 we focus on many of the email security and threat predictions for this year and for the near, foreseeable future. Looking Forward In part 1 of this ‘Email Security’ snapshot, we looked at how most breaches involve email, the different […]

Continue reading


Glimpse of the Future of Tech at CES Expo Show

This week, at the giant CES expo in Las Vegas, the latest technology from around the world is on display, and here are just a few of the glimpses into the future that are being demonstrated there, with regards to business-tech. Cyberlink FaceMe® Leading facial recognition company Cyberlink will be demonstrating the power of its […]

Continue reading


Real-time Phishing Protection Now Available in Chrome

Google has announced real-time phishing protection with the help of improvements to ‘Safe Browsing’ which allow Chrome to check each new site you visit against a safe list stored on your computer and with Google so that Chrome can issue an instant warning if the site is thought to be suspicious or malicious. Phishing Problem […]

Continue reading


Record Levels Of Carbon Dioxide Emissions

The Global Carbon Project reports that carbon dioxide emissions, which are linked to climate change, extreme weather events and rising oceans haven reached record-breaking high levels this year. Emissions High But Rate of Growth Slowing New Papers published in “Earth System Science Data,” “Environmental Research Letters” and “Nature Climate Change” contain the predictions from Global […]

Continue reading


Over Half of Businesses Don’t Respond To GDPR Requests On Time

The results of a survey by Talend show that 58% of businesses worldwide fail to address requests from individuals for a copy of their personal data within the one-month time limit as required by GDPR. Bad, But Better Than Last Year The survey, which involved 103 GDPR-relevant companies across the globe (84% of which were […]

Continue reading


How Does Encryption Work?

Encryption comes from the age-old science of cryptography.  In the digital world of today, encryption refers to using electronic devices to generate unique encryption algorithms which essentially scramble messages and data, making them unintelligible to anyone who tries to intercept them, and also to provide an effective way to lock our electronic devices. Using Encryption […]

Continue reading


Amazon Announces Smart Office Supply Re-Ordering Device

Amazon has announced the introduction of a ‘smart’ office essentials re-ordering device called Dash Smart Shelf which uses a weight-sensing, Wi-Fi-enabled smart scale to re-order products when they’re running low. Why? According to Amazon, monitoring and reordering everyday business essentials (e.g. printer paper) can be unnecessarily time-consuming for the small and medium-sized businesses (SMBs) that […]

Continue reading


Hacker’s Website Closed Down In International Operation

A website (and its supporting infrastructure) which sold a variety of hacking tools to other would-be cybercriminals has been closed down after an investigation by agencies from multiple countries including the UK’s National Crime Agency (NCA). IM-RAT The main tool that the agencies were particularly interested in eradicating was the Imminent Monitor Remote Access Trojan […]

Continue reading