Category: Network

Providing IT support and solution to small and medium businesses. Servicing Edinburgh, Livingston, Fife and surrounding areas. Responsive, Flexible, Professional and friendly local support.

Featured Article – Email Security (Part 2)

Following on from last month’s featured article about email security (part 1), in part 2 we focus on many of the email security and threat predictions for this year and for the near, foreseeable future. Looking Forward In part 1 of this ‘Email Security’ snapshot, we looked at how most breaches involve email, the different…
Read more

Glimpse of the Future of Tech at CES Expo Show

This week, at the giant CES expo in Las Vegas, the latest technology from around the world is on display, and here are just a few of the glimpses into the future that are being demonstrated there, with regards to business-tech. Cyberlink FaceMe® Leading facial recognition company Cyberlink will be demonstrating the power of its…
Read more

Record Levels Of Carbon Dioxide Emissions

The Global Carbon Project reports that carbon dioxide emissions, which are linked to climate change, extreme weather events and rising oceans haven reached record-breaking high levels this year. Emissions High But Rate of Growth Slowing New Papers published in “Earth System Science Data,” “Environmental Research Letters” and “Nature Climate Change” contain the predictions from Global…
Read more

How Does Encryption Work?

Encryption comes from the age-old science of cryptography.  In the digital world of today, encryption refers to using electronic devices to generate unique encryption algorithms which essentially scramble messages and data, making them unintelligible to anyone who tries to intercept them, and also to provide an effective way to lock our electronic devices. Using Encryption…
Read more

Hacker’s Website Closed Down In International Operation

A website (and its supporting infrastructure) which sold a variety of hacking tools to other would-be cybercriminals has been closed down after an investigation by agencies from multiple countries including the UK’s National Crime Agency (NCA). IM-RAT The main tool that the agencies were particularly interested in eradicating was the Imminent Monitor Remote Access Trojan…
Read more

The Difference Between Backup and Disaster Recovery

We’re all familiar with the value of making a backup of business data, but how does this fit with ‘Disaster Recovery’ and ‘Business Continuity’ strategies?  This article takes a brief look at how these elements fit together to ensure that businesses can survive, function and get back up to speed when disastrous events (external or…
Read more

Some Of The Tech ‘Promises’ Made By The Main Political Parties

With the UK’s General Election due to take place on 12 December, many issues have been covered in the media.  One key area of interest for businesses is technology and for those of you who may not have time to plough through the manifestos of the main parties, here’s a quick look at some of…
Read more

Research Says Memes Can Tell Between Humans and Bots

Researchers from the University of Delaware have concluded that when it comes to authentication for logins, Memes may be one of the strongest techniques to distinguish between a human and a bot. The Bot Challenge One of the great challenges to websites when it comes to authentication for logins is that software bots can fool…
Read more

Despite Patches, Researchers Warn That Intel Chips Are Still Vulnerable

The New York Times has reported that despite Intel issuing patches for security flaws (that were discovered last year) in its processors, security researchers are alleging that the processors still have some serious vulnerabilities. What Flaws? In January 2018, it was discovered that nearly all computer processors made in the last 20 years contained two…
Read more

‘Moore’s Law’ and Business Innovation Challenged By Slow-Down In Rate of Processing Power Growth

Many tech commentators have noted a stagnation or slow-down period in computing-related to ‘Moore’s Law’ being challenged, but has the shrinking of transistors within computer chips really hit a wall and what could drive innovation further? What Is Moore’s Law? Moore’s Law, named after Intel co-founder Gordon Moore, is based on his observation from 1965…
Read more