Category: Network

Providing IT support and solution to small and medium businesses. Servicing Edinburgh, Livingston, Fife and surrounding areas. Responsive, Flexible, Professional and friendly local support.

AI, Supercomputers … and Storm Dennis

The disruption and damage caused by weather events affect businesses across the UK but having the benefit of early and detailed insights provided a by a new supercomputer system could enable businesses, organisations, agencies, local authorities and the government to plan and minimise disruption where possible, thereby saving billions of pounds per year. Climate Change…
Read more

‘Runet’ Test – Russia Unplugs Itself From The Internet

A little later than its original planned date of April 1st 2019, a recent test-run has seen Russia successfully ‘unplug’ itself from the Internet and prove that it can create its own state-controlled Intranet. Successfully Creating The ‘Runet’ The test, which was first announced back in February last year, is reported to have gone ahead…
Read more

UK Job Candidates Favour Tech-Savvy Companies

New research conducted by Censuswide on behalf of Tableau Software has revealed that half of UK job candidates would reject a job offer from a company that offered no digital and data potential. Training The research results, which were obtained from 1,100 office workers and C-suite executives from across the UK, showed that a vacancy that offered digital…
Read more

Avast Anti-Virus Is To Close Subsidiary Jumpshot After Browsing Data Selling Privacy Concerns

Avast, the Anti-virus company, has announced that it will not be providing any more data to, and will be commencing “a wind down” of its subsidiary Jumpshot Inc after a report that it was selling supposedly anonymised data to advertiser third parties that could be linked to individuals. Jumpshot Inc. Jumpshot Inc, founded in 2010,…
Read more

‘Snake’ Ransomware, A Threat To Your Whole Network

Over the last couple of weeks, there have been reports of a new type of ransomware known as ‘Snake’ which can encrypt all the files stored on your computer network and on all the connected devices. Discovered Snake ransomware is so-called because it is the reverse order spelling of the ‘ekans’ file marker that it…
Read more

Featured Article – Email Security (Part 2)

Following on from last month’s featured article about email security (part 1), in part 2 we focus on many of the email security and threat predictions for this year and for the near, foreseeable future. Looking Forward In part 1 of this ‘Email Security’ snapshot, we looked at how most breaches involve email, the different…
Read more

Glimpse of the Future of Tech at CES Expo Show

This week, at the giant CES expo in Las Vegas, the latest technology from around the world is on display, and here are just a few of the glimpses into the future that are being demonstrated there, with regards to business-tech. Cyberlink FaceMe® Leading facial recognition company Cyberlink will be demonstrating the power of its…
Read more

Record Levels Of Carbon Dioxide Emissions

The Global Carbon Project reports that carbon dioxide emissions, which are linked to climate change, extreme weather events and rising oceans haven reached record-breaking high levels this year. Emissions High But Rate of Growth Slowing New Papers published in “Earth System Science Data,” “Environmental Research Letters” and “Nature Climate Change” contain the predictions from Global…
Read more

How Does Encryption Work?

Encryption comes from the age-old science of cryptography.  In the digital world of today, encryption refers to using electronic devices to generate unique encryption algorithms which essentially scramble messages and data, making them unintelligible to anyone who tries to intercept them, and also to provide an effective way to lock our electronic devices. Using Encryption…
Read more

Hacker’s Website Closed Down In International Operation

A website (and its supporting infrastructure) which sold a variety of hacking tools to other would-be cybercriminals has been closed down after an investigation by agencies from multiple countries including the UK’s National Crime Agency (NCA). IM-RAT The main tool that the agencies were particularly interested in eradicating was the Imminent Monitor Remote Access Trojan…
Read more