Category: Security

Providing IT support and solution to small and medium businesses. Servicing Edinburgh, Livingston, Fife and surrounding areas. Responsive, Flexible, Professional and friendly local support.

Apps & Zaps – Ideas For Automating Your Business

In this article, we look at how Zapier and other alternatives can be used to link apps together and create automated workflows that can carry out daily/weekly marketing tasks for you in the background while you get on with running your business. Zapier Zapier (https://zapier.com/) is a tool that can automate repetitive tasks between two…
Read more

WhatsApp’s Vanishing Photos & Videos

Facebook’s WhatsApp is rolling out its new ‘View Once’ feature whereby photos and videos disappear from the chat after they’ve been opened. Privacy and Space-Saving WhatsApp says that the feature gives users more control over their privacy because “not everything we share needs to become a permanent digital record” and suggests that ‘View Once’ is ideal for…
Read more

Why is Data Science … Big?

In this article, we look at what data science is, and what is driving its growth and value to businesses and organisations worldwide. Data Science Data science uses multiple disciplines, scientific methods, and processes (e.g. domain expertise, programming skills, data engineering, data preparation, data mining, predictive analytics, machine learning, data visualisation, and knowledge of mathematics…
Read more

Here’s Windows 11

With the launch of Microsoft’s Windows 11 recently announced in an online event, we take a brief look at what’s new with this new OS, how it challenges Apple, and when it’s available. Early Preview + Free Update An early preview version of the new Microsoft Windows 11, next generation OS will be released for…
Read more

Tech News : Five-Year High For Tech Hiring

New figures from job search engine Adzuna and data provider Dealroom show that hiring in the tech industry has reached its highest level in five years. Vacancies Exceeding Pre-Pandemic Levels The data, which was compiled by Adzuna and Dealroom for the Government’s Digital Economy Council shows that job vacancies in the digital tech sector have now…
Read more

AI Designs Chips Better Than Humans, Says Google

AI can now design AI chips hundreds of times faster (and better) than humans. Where will this lead? A recent research paper has described how a deep reinforcement learning approach to chip ‘floorplanning’ has led to AI generating chip floorplans that are superior or comparable to those produced by humans. Floorplans Chip floorplanning is the term for…
Read more

How Secure Is Your Software/Digital Supply Chain?

It is easy to think that cyber-attacks are likely to come from outsiders unconnected to the business, but how much do you know about the security of your digital supply chain? Software Supply Chain Risks Businesses use many different third-party software tools as part of their day-to-day transactions and for organisations in the public sector,…
Read more

Guarding Against The Rise In Router and VoIP Attacks

After a recent high profile media story highlighted how poor router security led to a police raid of the home of an innocent family, we take a look at how Wi-Fi piggybacking attacks against home and domestic targets, and VoIP hacking of businesses worldwide are growing threats. What Happened? It has been reported that in…
Read more

Featured Article – The Issue of Push Payment Fraud Reimbursement

With Barclays Bank recently publishing the figures of refunds it made to customers who fell victim to authorised push payment (APP) fraud, there have been calls for greater transparency and reform to the current (voluntary) reimbursement code. Authorised Push Payment (APP) Fraud APP refers to situations where consumers have used a bank transfer to pay…
Read more

Tech Insight – Tech Insight: What Are Firewalls?

In this article, we take a brief look at what a firewall is, what types there are, and the benefits and drawbacks of firewalls. Firewall A firewall is a network security system that can monitor and control incoming and outgoing network traffic based on predetermined security rules.  Based on these rules, it decides whether to…
Read more