Tag: Data Security

Providing IT support and solution to small and medium businesses. Servicing Edinburgh, Livingston, Fife and surrounding areas. Responsive, Flexible, Professional and friendly local support.

Featured Article : AI Safety-Bill Killed (Well, Blocked)

Following California Governor Gavin Newsom vetoing a landmark AI safety bill aimed at regulating the development and deployment of advanced AI systems, we look at the reasons why it was blocked and the implications of doing so.  What Bill?  US Senate ‘Bill 1047’ relates to regulating AI systems with the focus specifically around frontier AI…
Read more

Featured Article : Would You Be Filmed Working At Your Desk All Day?

Following a recent report in the Metro that BT is carrying out research into continuous authentication software, we look at some of the pros and cons and the issues around employees potentially being filmed all day at their desks … under the guise of cyber-security.  Why Use Continuous Authentication Technology?  Businesses use continuous authentication technology…
Read more

Essentials Explained : Getting Rid of e-Waste

In this second of our ‘Essentials Explained’ series, we explore how e-waste is currently disposed of, what happens to it afterwards, plus various initiatives and strategies aimed at reducing the ever-increasing pile of discarded electronics.  What Is E-Waste?  Electronic waste (e-waste) refers to any electronic device that has reached the end of its useful life…
Read more

Featured Article : Google in Monumental Monopoly Ruling

Four years on from Google being sued by the US Department of Justice over its control of about 90 per cent of the online search market, a US judge has ruled that Google acted illegally to maintain a monopoly on its online search and the associated advertising.  Building and Defending a Search Monopoly  Following a ten-week…
Read more

Featured Article : CrowdStrike : What Happened?

Following 8.5 million Microsoft devices being hit by a faulty software update from CrowdStrike causing global chaos, we look at what happened, how, and why.  The Worst Cyber Event In History  The scale of effects of the disruption caused make this event, which began on 18 July (Microsoft) or 19 July (according to CrowdStrike), makes…
Read more

Featured Article : ‘Pay or Consent’ Model Breaches Rules

Following an investigation into whether the big tech companies are complying with the new Digital Markets Act (DMA) rules, the European Commission’s preliminary findings say that Meta’s ‘Pay or Consent’ model for data-sharing is in breach of its new rules.  Investigation  The European Commission (EC) launched an investigation into Google, Apple, and Meta to determine…
Read more

Featured Article : Gemini … Overblown Hype?

Two new studies show that Google’s Gemini AI models may not live up to the hype in terms of answering questions about large datasets correctly.  Google Gemini  Google Gemini is an advanced AI language model developed by Google to enhance various applications with sophisticated natural language understanding and generation capabilities. It features multimodal capabilities, enabling…
Read more

Protect Your Business During Staff Holidays

In this next summer security article, and with the summer holiday season upon us, we take a look at the various aspects of protecting your business when your staff are on holiday, offering practical advice and solutions to help you stay secure and efficient while staff are physically away.  Why Worry?  Holidays are essential for…
Read more

Featured Article : Apple Avalanche!

Following Apple’s 5-day Worldwide Developers Conference (WWDC24) last week at Apple Park in Cupertino, California, we take a look at the many new products announced and their key features.   Showcasing New Products  At Apple’s WWDC24 from June 10 to June 14, Apple showcased a variety of updates and advancements across its software platforms, including iOS, iPadOS,…
Read more

Ex-Employees : Offboarding Checklist

Here we look at why organisations need to have an effective employee offboarding procedure in place and suggest a checklist for you that could form the basis of this procedure.  Why?  Members of organisations inevitably change over time for various reasons, perhaps to relocate to another job and move away, or they may be asked…
Read more