Category: Operating System

Providing IT support and solution to small and medium businesses. Servicing Edinburgh, Livingston, Fife and surrounding areas. Responsive, Flexible, Professional and friendly local support.

Re-Branding Means Microsoft Office Becomes Microsoft 365

Re-Branding Means Microsoft Office Becomes Microsoft 365

After 30 years of Microsoft Office, a major re-branding will see it being re-named as Microsoft 365 as part of Microsoft’s expansion of its productivity suite.  What, Who, And How?  Microsoft has announced that starting in November, Office.com (the Office mobile app and the Office app for Windows) will all become part of the re-branded…
Read more

Forget Hacking, What About Tracking?

Forget Hacking, What About Tracking?

In this article, we look at the many different ways we are being tracked online, plus which measures users can take to avoid being tracked.  Why Are We Being Tracked?  Internet tracking is used for a number of reasons, including:  – Improving user browser experiences on websites.  – For analytics to improve business performance and…
Read more

Cyber Security

Security Stop-Press : Biggest Cyber Hack In History – Australia’s ‘Optus’

A cyber-attack on Australian telecommunications provider, Optus, may have affected 10 million people, the equivalent of 40% of the country’s population! Customer data reported as stolen in the attack includes names, dates of birth, home addresses, phone, and email contacts, and even the passport and driving licence numbers of around 2.8 million people! Following the…
Read more

First Update for Windows 11 : What Does It Include?

First Update for Windows 11 : What Does It Include?

With the news that as of 20 September 2022, the new Windows 11 update started its rollout in 190+ countries, we look at what it includes and how these elements could benefit your business.  The Focus  Microsoft says that the new Windows 11 22H2 update takes account of the move to flexible work, and is…
Read more

Nearly Half of Employees Use Risky Login Practices

Nearly Half of Employees Use Risky Login Practices

A new study by 1Password has revealed that almost half of employees put their companies at risk by using risky online habits to avoid difficulties logging in and out of apps at work.  Taking Risks With Company Security  The study, by passwords manager maker 1Password which surveyed 2,000 US workers, found that 44 per cent…
Read more

How To Protect Yourself From Job Phishing Scams

How To Protect Yourself From Job Phishing Scams

In this article, we look at what ‘job phishing’ is, how it works, and how you can protect yourself from this type of fraud.  What Is Job Phishing?  Job phishing refers to recruitment/employment scams where fraudsters pose as recruitment agents or reputable companies. The fraudsters post fake job descriptions and information about their businesses on…
Read more

Featured Article : The True Cost Of Using Pirated Software

The True Cost Of Using Pirated Software

In this article, we look at how the risks to businesses posed by pirated software can far outweigh the benefits of using it, and how you can protect your business from the true costs of pirated software.  Benefits  On the surface, there appears to be some clear benefits to using pirated software such as acquiring…
Read more

Tech Insight : What Is Microsoft Azure?

In this insight, we look at what Microsoft Azure is, plus what it offers businesses.  Azure  Microsoft Azure (formerly Windows Azure) is Microsoft’s public cloud computing platform. Public cloud refers to cloud computing services offered over the public Internet and available to anyone, i.e. the services are shared with multiple customers rather than just controlled…
Read more

Spotting Fake Reviews And Dubious Ratings On Amazon

Spotting Fake Reviews And Dubious Ratings On Amazon

Following Amazon suing the admins of more than 10,000 Facebook groups over an alleged co-ordinated fake reviews campaign, we look at how to spot fake reviews and dubious ratings on Amazon.  Why Use Fake Reviews?  On the site of one of the world’s largest retailers and the top online marketplace, large numbers of positive reviews…
Read more

How Easy Is It To Clone Someone’s Voice?

Following recent security concerns about Amazon’s plans to enable Alexa to mimic voices, we look at how easy it is to do, what the benefits are, and what risks it poses.  Alexa The Mimic  Recently, Amazon announced that it was working on technology to enable its Alexa digital assistant to take on the voice of…
Read more