Testimonials
Customer Service
IT Support
01234 300099

Blog

Security Stop Press : Microsoft Reports 600 Million Daily Identity Attacks

Microsoft has revealed it tracks over 600 million identity attacks per day, as cybercriminals refine their tactics and work together more closely. In its ‘Digital Defense Report 2024’, Microsoft highlighted that identity-based attacks have surged due to the widespread shift to cloud services. The report noted that Microsoft Entra blocked 7,000 password attacks per second over the last year….

Read More

Sustainability-in-Tech : Wave Technology 5 X More Efficient

Swedish startup, CorPower, which has secured €32 million in funding, claims to have developed technology that’s five times more efficient than previous state-of-the-art wave power technology.  CorPower Ocean  CorPower Ocean is a Swedish-based renewable energy company with pioneering wave energy technology. Established in 2012, the company was co-founded by Patrik Möller and Dr. Stig Lundbäck, and has since positioned itself as a…

Read More

Tech Tip – Use “File Explorer Quick Access” to Pin Frequently Used Locations

You can quickly access your most-used folders and drives by pinning them to ‘Quick Access’ in File Explorer, allowing faster navigation without browsing through multiple directories. How to Pin a Folder – Open File Explorer (Win + E). – Navigate to the folder you want to pin. – Right-click the folder and select ‘Pin to Quick Access’. – The…

Read More

Featured Article : Face-Recognition & Personal Data Concerns

Two Harvard students have developed a program which (when used with Meta’s smart glasses) can identify people without their knowledge, thereby highlighting a potentially serious privacy risk.  Why?  In their report about their research, the two Harvard students, AnhPhu Nguyen and Caine Ardayfio, said their goal was “to demonstrate the current capabilities of smart glasses, face search engines, LLMs, and…

Read More

Tech Insight : What Was Revealed By The “We, Robot” Event?

Following Tesla’s “We, Robot” event on October 10 at the Warner Bros. Studios in Los Angeles, we look at the big reveals, the reactions to them, plus some of the key comments made and opinions given.  A Showcase of Futuristic Visions  Tesla’s long-anticipated “We, Robot” event, which captured the attention of millions worldwide, was CEO Elon Musk’s bold declaration of…

Read More

Tech News : Google Breakup Proposed

Following a recent US ruling that Google acted illegally to maintain a monopoly on its online search and the associated advertising, the US government has now proposed forcing Google to sell off parts of its business, potentially leading to the breakup of one of the world’s leading tech companies.  Antitrust Remedies – Structural Relief Suggested  After years of investigation…

Read More

Tech News : Ryanair Third-Party Data Protection Inquiry

What happens to data gathered as part of Ryanair’s extra ID verification requirement (from customers who don’t book directly through its website), has led to an inquiry being launched by Ireland’s Data Protection Commission (DPC).  Why ID Verification?  For travellers booking flights through third-party websites or online travel agents (OTA), rather than directly through Ryanair, the Irish low-cost airline…

Read More

An Apple Byte : Apple in Workers’ Rights Dispute

The U.S. National Labour Relations Board (NLRB) has accused Apple of restricting employees’ rights to advocate for better conditions by limiting their use of social media and Slack and retaliating against those who raised concerns.  The NLRB’s allegations, filed this month, focus on Apple’s work rules regarding Slack and social media use. Apple, which introduced Slack to its employees…

Read More

Security Stop Press : China-Backed Hackers Breach Telecoms Wiretap Systems

China-backed hackers have breached the wiretap systems of several major U.S. telecom and internet providers, exposing critical vulnerabilities and likely collecting vast amounts of internet traffic to gather intelligence on Americans. These wiretap systems, required by the 1994 Communications Assistance for Law Enforcement Act (CALEA), grant authorised personnel (e.g. law enforcement agencies) almost unfettered access to user data, including…

Read More