Unit 2, Eliburn Office Park, Livingston, EH54 6GR
+441506668613

Category: GDPR

IT Support for SMB

Tech Insight : How To Check Your VPN

In this article, we take a look at some of the ways users can assess how good their VPN really is. What Is A VPN? A ‘Virtual Private Network’ (VPN) is used to keep internet activity private, evade censorship / maintain net neutrality and use public Wi-Fi securely (e.g., avoid threats such as ‘man-in-the-middle’ attacks).…
Read more

How To Avoid The Top Christmas Cons

In this article, we take a look at some of the latest known online scams so that you can avoid falling foul of cybercriminals this Christmas. Christmas – A Great Opportunity For Scammers The extra spending at many different online shops, often for large amounts, and the requirement for delivery before the big day makes…
Read more

Hybrid Working Results In Move Off-Premise For Tech Infrastructure

Research by Zen Internet has revealed that hybrid working is causing businesses to question whether they now need enough on-premise tech infrastructure to support a full capacity office. Most Business Have Hybrid Working Plan The research conducted by Vanson Bourne on behalf of Zen Internet showed that 93 per cent of businesses already have a hybrid…
Read more

Apple’s New ‘Business Essentials’

Apple has announced a new ‘Business Essentials’ service that enables small businesses to easily manage every employee’s iPhone, iPad, and Mac. Device Management Solution For Small Businesses Aimed at business with up to 500 employees, Apple says that ‘Business Essentials’ has been designed to make it easy to manage every aspect of the Apple devices…
Read more

Tech News : Massive Rise In HTTPS Attacks

The latest “ThreatLabz: The State of Encrypted Attacks,” 2021 report has shown a 300 per cent increase in online attackers using HTTPS to cloak their activities and blend in with other traffic. HTTPS HTTPS, the encrypted version of the Hypertext Transfer Protocol (HTTP), enables secure communication over a computer network, using Transport Layer Security (formerly,…
Read more

30 Countries Pledge To Act On Ransomware

The international Counter-Ransomware members from 30 countries have issued a joint statement outlining their intent to take action to counter the growing threat posed by ransomware. What Is Ransomware? Ransomware is a form of malware that encrypts the important files on a computer and the user (often a business/organisation) is given a ransom demand, the…
Read more

Monetising Movement (Your Geo-Data)

In this feature, we take a look at how a multi-billion-dollar market obtains, uses, and sells our location data. Report A GVR report estimates that the global location intelligence market was worth USD 12.2 billion in 2020. This market uses our phone/device location data. There are many different interlinked players in this market ecosystem from…
Read more

Keeping Your Domain Safe

After a recent report found that poor domain security has left most Global 2000 companies vulnerable to the threats of phishing and brand abuse, we take a closer look at domain security and how businesses can maximise their protection against popular threats. CSC Research – Domains Dangerously Under-Protected Recent research by US-based CSC, which describes…
Read more

Tech News : Birthdays Now Required For Insta Login

The introduction of the Age Appropriate Design Code (also known as the Children’s Code) by the ICO means that Facebook has decided to ask Instagram users to give their date of birth as part of the login. Age Appropriate Design Code The statutory Children’s Code (‘The Age Appropriate Design Code’), which came into force on…
Read more

Guess What Most Web Traffic Is Made Up Of?

In this article, we look at how a surprisingly large proportion of Internet traffic is made up of bots, how many of these can be ‘bad bots’, and what businesses can do to keep enjoying the benefits of good bots while guarding against the threats of bad bots. Two-Thirds of Internet Traffic is Bots The…
Read more