Category: Manufacturers

Providing IT support and solution to small and medium businesses. Servicing Edinburgh, Livingston, Fife and surrounding areas. Responsive, Flexible, Professional and friendly local support.

Billions Of Devices At Risk Due To Wi-Fi Chip Vulnerability

A security threat to devices, Wi-Fi access points (APs), and routers that comes from the Kr00k Wi-Fi chip vulnerability could affect billions according to security researchers. Kr00k The existence of Kr00k, also known by the catchy name of CVE-2019-15126 was made public at the recent RSA Conference in San Francisco and its discovery was attributed…
Read more

Can your business survive the Coronavirus

Business is all about managing risks. Monitoring the landscape and the Coronavirus has the potential to disrupt business. What risks are your business subjective to Individual staff quarantined.  An interview with Matt Hancock (See here). Advised the government have the power to force individuals in to compulsory isolation to  help control the spreading of this…
Read more

Proposed New UK Law To Cover IoT Security

The UK government’s Department for Digital, Culture, Media and Sport (DCMS), has announced that it will soon be preparing new legislation to enforce new standards that will protect users of IoT devices from known hacking and spying risks. IoT Household Gadgets This commitment to legislate leads on from last year’s proposal by then Digital Minister…
Read more

Life After End-of-Life For Windows 7 Updates

Pressure from disgruntled Windows 7 users may have been a factor in Microsoft issuing a second update to its old Windows 7 Operating System, only two weeks after the official end-of-life date of Wednesday 14 January. (Almost) No More Support Microsoft had already made many announcements that support for its Windows 7 Operating system and…
Read more

How to Set Up and Configure Multi-Factor Authentication (MFA) in the Office 365 Admin Center

The threats to business go far beyond cyber criminals accessing data. This can be the start of a very uncomfortable journey for business. After a breach clients have 72 hours to report to the ICO a breach. To help protect our customers we have prepared the following guide on how to activate Multi Factor Authentication…
Read more

Featured Article – Email Security (Part 2)

Following on from last month’s featured article about email security (part 1), in part 2 we focus on many of the email security and threat predictions for this year and for the near, foreseeable future. Looking Forward In part 1 of this ‘Email Security’ snapshot, we looked at how most breaches involve email, the different…
Read more

Glimpse of the Future of Tech at CES Expo Show

This week, at the giant CES expo in Las Vegas, the latest technology from around the world is on display, and here are just a few of the glimpses into the future that are being demonstrated there, with regards to business-tech. Cyberlink FaceMe® Leading facial recognition company Cyberlink will be demonstrating the power of its…
Read more

AI Better at Breast Cancer Detection Than Doctors

Researchers at Good Health have created an AI program which, in tests, has proven to be more accurate at detecting and diagnosing breast cancer than expert human radiologists. Trained The AI software, which was developed by Good Health researchers in conjunction DeepMind, Cancer Research UK Imperial Centre, Northwestern University and Royal Surrey County Hospital was ‘trained’ to…
Read more

Watch “How to send email to a channel in Microsoft Teams”

Teams is a enormously powerful platform growing in both popularity and function. Take a look at this useful guide published by Microsoft explaining one of its less obvious functions.

Real-time Phishing Protection Now Available in Chrome

Google has announced real-time phishing protection with the help of improvements to ‘Safe Browsing’ which allow Chrome to check each new site you visit against a safe list stored on your computer and with Google so that Chrome can issue an instant warning if the site is thought to be suspicious or malicious. Phishing Problem…
Read more