Category: Security

Providing IT support and solution to small and medium businesses. Servicing Edinburgh, Livingston, Fife and surrounding areas. Responsive, Flexible, Professional and friendly local support.

How To Protect Yourself From Job Phishing Scams

How To Protect Yourself From Job Phishing Scams

In this article, we look at what ‘job phishing’ is, how it works, and how you can protect yourself from this type of fraud.  What Is Job Phishing?  Job phishing refers to recruitment/employment scams where fraudsters pose as recruitment agents or reputable companies. The fraudsters post fake job descriptions and information about their businesses on…
Read more

Featured Article : The True Cost Of Using Pirated Software

The True Cost Of Using Pirated Software

In this article, we look at how the risks to businesses posed by pirated software can far outweigh the benefits of using it, and how you can protect your business from the true costs of pirated software.  Benefits  On the surface, there appears to be some clear benefits to using pirated software such as acquiring…
Read more

Spotting Fake Reviews And Dubious Ratings On Amazon

Spotting Fake Reviews And Dubious Ratings On Amazon

Following Amazon suing the admins of more than 10,000 Facebook groups over an alleged co-ordinated fake reviews campaign, we look at how to spot fake reviews and dubious ratings on Amazon.  Why Use Fake Reviews?  On the site of one of the world’s largest retailers and the top online marketplace, large numbers of positive reviews…
Read more

Why we disable SMTP

Why we Disable SMTP for our clients and why you should disable SMTP for your business. First a History lesson – How old is SMTP SMTP stands for “Simple Mail Transfer Protocol” and first appeared in 1982. The purposes of this was to send electronic mail over the internet (email). Little has changed to this…
Read more

How Easy Is It To Clone Someone’s Voice?

Following recent security concerns about Amazon’s plans to enable Alexa to mimic voices, we look at how easy it is to do, what the benefits are, and what risks it poses.  Alexa The Mimic  Recently, Amazon announced that it was working on technology to enable its Alexa digital assistant to take on the voice of…
Read more

New Windows Feature Displays Which Apps Have Been Listening-In

New Windows Feature Displays Which Apps Have Been Listening-In

The new Privacy Auditing feature in Windows 11 allows users to see a list of which apps have accessed their microphone or camera recently, plus details of any other suspicious activity.  See Which Apps Have Accessed Your Microphone and Camera  David Weston, Microsoft’s VP for Enterprise and OS Security, highlighted the new privacy feature in…
Read more

WhatsApp Rolls-Out Emojis and Sharing Of Files Over 2GB

WhatsApp Rolls-Out Emojis and Sharing Of Files Over 2GB

Following last month’s announcement, Meta’s WhatsApp is rolling-out emojis and the ability to share files within WhatsApp up to 2GB in size.  Communities  The new features are being added as part of WhatsApp’s “vision for Communities” where the idea is to “help people have the next best thing to an in-person conversation when they want to talk to…
Read more

Apple, Google and Microsoft In Password Collaboration

Apple, Google and Microsoft In Password Collaboration

Apple, Google and Microsoft have announced that they are joining forces to support a common passwordless sign-in standard that will allow websites and apps to offer consistent, secure and easy sign-ins across devices and platforms.   The Problem With Password-Only   Relying on password-only authentication is known to present many risks and challenges such as managing multiple…
Read more

More Control To Remove Personal Data From Google Searches

More Control To Remove Personal Data From Google Searches

Google has announced that it is changing its policies to allow more types of personally identifiable information removal requests.  Personal Information Showing Up In Google Search  Google acknowledges that personally identifiable information of some users can and does show up in Google search queries. This can make users concerned, e.g. about how it could be…
Read more

What Are 'Toxic' Backlinks?

What Are ‘Toxic’ Backlinks?

In this tech insight, we look at what ‘toxic’ backlinks are, how to identify them, and how to remove them.  Backlinks Backlinks (incoming links) are believed to be one of Google’s top three ranking factors. Trustworthy backlinks from websites with a high authority score are a factor which contribute to higher search engine rankings. However,…
Read more