Testimonials
Customer Service
IT Support
01234 300099

Blog

Featured Article : Would You Be Filmed Working At Your Desk All Day?

Following a recent report in the Metro that BT is carrying out research into continuous authentication software, we look at some of the pros and cons and the issues around employees potentially being filmed all day at their desks … under the guise of cyber-security.  Why Use Continuous Authentication Technology?  Businesses use continuous authentication technology to enhance security, i.e….

Read More

Tech Insight : The Rising Cost Of API & Bot Attacks

Following a recent report by cyber-security company Imperva about the rising costs to businesses of bot attacks and vulnerable APIs, we look at why it’s happening and what can be done.  Vulnerable APIs & Bot Attacks Costing Businesses $186 Billion  Imperva’s report was based on Marsh McLennan Cyber Risk Intelligence Centre’s study of data from 161,000 cybersecurity incidents related…

Read More

Tech News : AI Drone Swarms … Military Tests Successful

Munich-based Quantum Systems (a Small Unmanned Aerial Systems – ‘sUAS’ – company), has announced a successful test of AI-powered ‘drone swarm’ technology which could advance the role drones play in warfare.  What Is A ‘Drone Swarm’?  In short, Drone swarm technology involves coordinating multiple drones to operate as a unified system and it can be used for tasks like…

Read More

Tech News : Human Right Abuses Linked To Lithium Batteries

New research compiled from AI-powered supply chain risk platform Infyos has revealed that 75 per cent of the lithium-ion battery supply chain may be linked to severe human rights abuses.  Human Rights Abuses – Forced (and Child) Labour  Infyos’s analysis, which drew on government datasets, NGO reports, news articles, social media, and proprietary data, has revealed widespread human rights…

Read More

An Apple Byte : New macOS Update Disrupts Popular Cybersecurity Tools

Following its recent release, Apple’s latest macOS update, dubbed Sequoia (macOS 15), has disrupted the functionality of several widely used cybersecurity tools, including those from CrowdStrike, SentinelOne, and Microsoft.  Users and developers have voiced frustrations on social media and in Mac-focused forums about issues leaving many security applications non-operational. Reports highlight problems with tools like CrowdStrike, SentinelOne, Microsoft Defender,…

Read More

Security Stop Press : Google Simplifies Secure Passkey Syncing Across Devices

Google has announced that users can now securely sync passkeys across all devices, not just Android, making sign-ins faster and more secure. Passkeys use biometrics, such as your fingerprint, face, or screen lock, to sign in to apps and websites, thereby making it easier and more secure than using traditional passwords. Whereas previously, only Android devices could save passkeys,…

Read More

Sustainability-in-Tech : 3D Printed Glass Blocks For Constructing Buildings

Engineers at the Massachusetts Institute of Technology (MIT) are developing a new kind of reconfigurable masonry made from 3D-printed, recycled glass.   Fits Together Like LEGO  MIT says the new multilayered glass bricks, each in the shape of a figure-of-eight, are designed to interlock, much like LEGO bricks.  3D Printed  One of the big advantages of the new glass bricks…

Read More