Unit 2, Eliburn Office Park, Livingston, EH54 6GR
+441506668613

Category: GDPR

Mear Technology help many business resolve their IT issues and focus on their business not their IT

New Windows Feature Displays Which Apps Have Been Listening-In

New Windows Feature Displays Which Apps Have Been Listening-In

The new Privacy Auditing feature in Windows 11 allows users to see a list of which apps have accessed their microphone or camera recently, plus details of any other suspicious activity.  See Which Apps Have Accessed Your Microphone and Camera  David Weston, Microsoft’s VP for Enterprise and OS Security, highlighted the new privacy feature in…
Read more

Apple, Google and Microsoft In Password Collaboration

Apple, Google and Microsoft In Password Collaboration

Apple, Google and Microsoft have announced that they are joining forces to support a common passwordless sign-in standard that will allow websites and apps to offer consistent, secure and easy sign-ins across devices and platforms.   The Problem With Password-Only   Relying on password-only authentication is known to present many risks and challenges such as managing multiple…
Read more

More Control To Remove Personal Data From Google Searches

More Control To Remove Personal Data From Google Searches

Google has announced that it is changing its policies to allow more types of personally identifiable information removal requests.  Personal Information Showing Up In Google Search  Google acknowledges that personally identifiable information of some users can and does show up in Google search queries. This can make users concerned, e.g. about how it could be…
Read more

How To Stop Your Smart Devices From Being Used To Spy On You

How To Stop Your Smart Devices From Being Used To Spy On You

With so many smart devices now all around us in homes and offices, we look here at ways to minimise the risk of having your privacy invaded.    The Internet of Things (IoT)    IoT devices are those devices that are now present in most offices and homes that have a connection to the Internet and are,…
Read more

Mobile Malware Surges By 500%

Tech News : Mobile Malware Surges By 500%

Proofpoint researchers have reported that, starting in early February, there has been a 500 per cent jump in mobile malware delivery attempts in Europe.  Trend  According to the researchers, this rise is in keeping with a trend that has been evident in the last few years where attackers have been increasing their attempts at smishing…
Read more

Ransomware Study : Most UK Firms Pay

Ransomware Study : Most UK Firms Pay

A study by security firm ‘Proofpoint’ has revealed that 82 per cent of UK organisations whose systems were infected by ransomware in 2021 opted to pay the ransom.  Much Higher Than The Global Average  Despite cybersecurity and government agencies warning against paying, Proofpoint’s ‘2022 State of the Phish’ report states that this UK figure for…
Read more

Firms Prepare For The Quantum Apocalypse

Featured Article : Firms Prepare For The ‘Quantum Apocalypse’

In this article, we look at what the ‘quantum apocalypse’ is, and what some businesses are doing to prepare for this threat.  What Is The Quantum Apocalypse?  The so-called ‘quantum apocalypse’ refers to the unspecified point in the future where someone (e.g., threat actors or a foreign power) has a functioning quantum computer that can…
Read more

What Is The Online Safety Bill?

What Is The Online Safety Bill?

Following recent announcements of a toughening-up of the (draft) Online Safety Bill, we look at what the bill is, and what its implications are. What Is The Online Safety Bill For? The UK government’s Online Safety Bill is (draft) legislation that’s designed to place a ‘duty of care’ on internet companies which host user-generated content in…
Read more

Study Shows No-One Is Immune From Phishing

Study Shows No-One Is Immune From Phishing

A new report from F-Secure has revealed that the most technically competent staff are just as likely (if not more likely) to fail a phishing test exercise. Phishing Phishing attacks typically involve sending emails that appear to come from a legitimate company/organisation (e.g., a bank) in order to gain an individual’s confidence, so that the…
Read more

Tech Insight : How To Check Your VPN

In this article, we take a look at some of the ways users can assess how good their VPN really is. What Is A VPN? A ‘Virtual Private Network’ (VPN) is used to keep internet activity private, evade censorship / maintain net neutrality and use public Wi-Fi securely (e.g., avoid threats such as ‘man-in-the-middle’ attacks).…
Read more