Category: Operating System

Providing IT support and solution to small and medium businesses. Servicing Edinburgh, Livingston, Fife and surrounding areas. Responsive, Flexible, Professional and friendly local support.

30 Countries Pledge To Act On Ransomware

The international Counter-Ransomware members from 30 countries have issued a joint statement outlining their intent to take action to counter the growing threat posed by ransomware. What Is Ransomware? Ransomware is a form of malware that encrypts the important files on a computer and the user (often a business/organisation) is given a ransom demand, the…
Read more

Guess What Most Web Traffic Is Made Up Of?

In this article, we look at how a surprisingly large proportion of Internet traffic is made up of bots, how many of these can be ‘bad bots’, and what businesses can do to keep enjoying the benefits of good bots while guarding against the threats of bad bots. Two-Thirds of Internet Traffic is Bots The…
Read more

Apps & Zaps – Ideas For Automating Your Business

In this article, we look at how Zapier and other alternatives can be used to link apps together and create automated workflows that can carry out daily/weekly marketing tasks for you in the background while you get on with running your business. Zapier Zapier (https://zapier.com/) is a tool that can automate repetitive tasks between two…
Read more

Featured Article : New 365 “Cloud PC” From Microsoft

Microsoft has announced its new hybrid Windows 365 cloud service where the operating system is stored in Microsoft’s Cloud and which securely streams each user’s apps, data, and settings to personal or corporate devices, acting as a full Windows desktop PC in the cloud. New Era of Hybrid Personal Computer Microsoft is calling the new subscription…
Read more

Here’s Windows 11

With the launch of Microsoft’s Windows 11 recently announced in an online event, we take a brief look at what’s new with this new OS, how it challenges Apple, and when it’s available. Early Preview + Free Update An early preview version of the new Microsoft Windows 11, next generation OS will be released for…
Read more

AI Designs Chips Better Than Humans, Says Google

AI can now design AI chips hundreds of times faster (and better) than humans. Where will this lead? A recent research paper has described how a deep reinforcement learning approach to chip ‘floorplanning’ has led to AI generating chip floorplans that are superior or comparable to those produced by humans. Floorplans Chip floorplanning is the term for…
Read more

How Secure Is Your Software/Digital Supply Chain?

It is easy to think that cyber-attacks are likely to come from outsiders unconnected to the business, but how much do you know about the security of your digital supply chain? Software Supply Chain Risks Businesses use many different third-party software tools as part of their day-to-day transactions and for organisations in the public sector,…
Read more

Guarding Against The Rise In Router and VoIP Attacks

After a recent high profile media story highlighted how poor router security led to a police raid of the home of an innocent family, we take a look at how Wi-Fi piggybacking attacks against home and domestic targets, and VoIP hacking of businesses worldwide are growing threats. What Happened? It has been reported that in…
Read more

Featured Article – The Issue of Push Payment Fraud Reimbursement

With Barclays Bank recently publishing the figures of refunds it made to customers who fell victim to authorised push payment (APP) fraud, there have been calls for greater transparency and reform to the current (voluntary) reimbursement code. Authorised Push Payment (APP) Fraud APP refers to situations where consumers have used a bank transfer to pay…
Read more

Tech Insight – Tech Insight: What Are Firewalls?

In this article, we take a brief look at what a firewall is, what types there are, and the benefits and drawbacks of firewalls. Firewall A firewall is a network security system that can monitor and control incoming and outgoing network traffic based on predetermined security rules.  Based on these rules, it decides whether to…
Read more