Category: GDPR

Providing IT support and solution to small and medium businesses. Servicing Edinburgh, Livingston, Fife and surrounding areas. Responsive, Flexible, Professional and friendly local support.

Mobile Malware Surges By 500%

Tech News : Mobile Malware Surges By 500%

Proofpoint researchers have reported that, starting in early February, there has been a 500 per cent jump in mobile malware delivery attempts in Europe.  Trend  According to the researchers, this rise is in keeping with a trend that has been evident in the last few years where attackers have been increasing their attempts at smishing…
Read more

Ransomware Study : Most UK Firms Pay

Ransomware Study : Most UK Firms Pay

A study by security firm ‘Proofpoint’ has revealed that 82 per cent of UK organisations whose systems were infected by ransomware in 2021 opted to pay the ransom.  Much Higher Than The Global Average  Despite cybersecurity and government agencies warning against paying, Proofpoint’s ‘2022 State of the Phish’ report states that this UK figure for…
Read more

Firms Prepare For The Quantum Apocalypse

Featured Article : Firms Prepare For The ‘Quantum Apocalypse’

In this article, we look at what the ‘quantum apocalypse’ is, and what some businesses are doing to prepare for this threat.  What Is The Quantum Apocalypse?  The so-called ‘quantum apocalypse’ refers to the unspecified point in the future where someone (e.g., threat actors or a foreign power) has a functioning quantum computer that can…
Read more

What Is The Online Safety Bill?

What Is The Online Safety Bill?

Following recent announcements of a toughening-up of the (draft) Online Safety Bill, we look at what the bill is, and what its implications are. What Is The Online Safety Bill For? The UK government’s Online Safety Bill is (draft) legislation that’s designed to place a ‘duty of care’ on internet companies which host user-generated content in…
Read more

Study Shows No-One Is Immune From Phishing

Study Shows No-One Is Immune From Phishing

A new report from F-Secure has revealed that the most technically competent staff are just as likely (if not more likely) to fail a phishing test exercise. Phishing Phishing attacks typically involve sending emails that appear to come from a legitimate company/organisation (e.g., a bank) in order to gain an individual’s confidence, so that the…
Read more

Tech Insight : How To Check Your VPN

In this article, we take a look at some of the ways users can assess how good their VPN really is. What Is A VPN? A ‘Virtual Private Network’ (VPN) is used to keep internet activity private, evade censorship / maintain net neutrality and use public Wi-Fi securely (e.g., avoid threats such as ‘man-in-the-middle’ attacks).…
Read more

How To Avoid The Top Christmas Cons

In this article, we take a look at some of the latest known online scams so that you can avoid falling foul of cybercriminals this Christmas. Christmas – A Great Opportunity For Scammers The extra spending at many different online shops, often for large amounts, and the requirement for delivery before the big day makes…
Read more

Hybrid Working Results In Move Off-Premise For Tech Infrastructure

Research by Zen Internet has revealed that hybrid working is causing businesses to question whether they now need enough on-premise tech infrastructure to support a full capacity office. Most Business Have Hybrid Working Plan The research conducted by Vanson Bourne on behalf of Zen Internet showed that 93 per cent of businesses already have a hybrid…
Read more

Apple’s New ‘Business Essentials’

Apple has announced a new ‘Business Essentials’ service that enables small businesses to easily manage every employee’s iPhone, iPad, and Mac. Device Management Solution For Small Businesses Aimed at business with up to 500 employees, Apple says that ‘Business Essentials’ has been designed to make it easy to manage every aspect of the Apple devices…
Read more

Tech News : Massive Rise In HTTPS Attacks

The latest “ThreatLabz: The State of Encrypted Attacks,” 2021 report has shown a 300 per cent increase in online attackers using HTTPS to cloak their activities and blend in with other traffic. HTTPS HTTPS, the encrypted version of the Hypertext Transfer Protocol (HTTP), enables secure communication over a computer network, using Transport Layer Security (formerly,…
Read more

Book a free consultation call
Close