Unit 2, Eliburn Office Park, Livingston, EH54 6GR
+441506668613

Category: Network

IT Support for SMB

AI Designs Chips Better Than Humans, Says Google

AI can now design AI chips hundreds of times faster (and better) than humans. Where will this lead? A recent research paper has described how a deep reinforcement learning approach to chip ‘floorplanning’ has led to AI generating chip floorplans that are superior or comparable to those produced by humans. Floorplans Chip floorplanning is the term for…
Read more

How Secure Is Your Software/Digital Supply Chain?

It is easy to think that cyber-attacks are likely to come from outsiders unconnected to the business, but how much do you know about the security of your digital supply chain? Software Supply Chain Risks Businesses use many different third-party software tools as part of their day-to-day transactions and for organisations in the public sector,…
Read more

Guarding Against The Rise In Router and VoIP Attacks

After a recent high profile media story highlighted how poor router security led to a police raid of the home of an innocent family, we take a look at how Wi-Fi piggybacking attacks against home and domestic targets, and VoIP hacking of businesses worldwide are growing threats. What Happened? It has been reported that in…
Read more

Featured Article – The Issue of Push Payment Fraud Reimbursement

With Barclays Bank recently publishing the figures of refunds it made to customers who fell victim to authorised push payment (APP) fraud, there have been calls for greater transparency and reform to the current (voluntary) reimbursement code. Authorised Push Payment (APP) Fraud APP refers to situations where consumers have used a bank transfer to pay…
Read more

Tech Insight – Tech Insight: What Are Firewalls?

In this article, we take a brief look at what a firewall is, what types there are, and the benefits and drawbacks of firewalls. Firewall A firewall is a network security system that can monitor and control incoming and outgoing network traffic based on predetermined security rules.  Based on these rules, it decides whether to…
Read more

Google Alerts Used In Malware Scam

It has been reported that hackers have been able to spread malware using fake news stories via the Google Alerts service. Google Alerts Launched in 2003, Google Alerts is Google’s content change detection and notification service which sends emails to a user when it finds new results (e.g. web pages, newspaper articles, blogs) that match…
Read more

Emotet: A Million Bucks per Incident

In the light of a reported recent victory by Europol in trying to stop the particularly dangerous Emotet malware, we look at what it is, how it is spread, and how to try and guard against it. What Is Emotet? Emotet is a computer malware program, believed to be Russian in origin, that was originally…
Read more

What Is Zero Trust?

With mobile computing, software-as-a-service (SaaS), and now remote working moving the focus of IT security away from the traditional perimeter, this article looks at what a Zero Trust approach is and how it can help. More Complex Demands The belief among many IT security experts is that a traditional perimeter-based security approach may no longer…
Read more

WhatsApp To Share Users’ Personal Info

In a change to WhatsApp’s privacy policy from next month, users outside of Europe will have to agree to share their personal information with WhatsApp’s owner Facebook or leave the app. Outside Europe From February 8, 2021, a compulsory aspect of continuing to use WhatsApp outside the EU and EEA will be to agree to…
Read more

Brexit – Temporary Data Adequacy Granted to the UK

Worries about the disruption of the flow of data and the effect of this on trade between the UK and EU countries with Brexit have been addressed by the granting of controversial, short-term data adequacy status to the UK. What Is Data Adequacy? For third countries, i.e. those outside the European Economic Area (EEA) of the…
Read more