Testimonials
Customer Service
IT Support
01234 300099

Featured Article : ‘AI Washing’ – Crackdown

The US investment regulator, the Securities and Exchange Commission (SEC), has dished out penalties totalling $400,000 to two investment companies who made misleading claims about how they used AI, a practice dubbed ‘AI Washing’.  What Is AI Washing?  The term ‘AI washing’ (as used by the investment regulator in this case) refers to the practice of making unsubstantiated or misleading…

Read More

Tech Insight : What Is Customer Journey Mapping Software?

In this tech insight, we look at what customer journey mapping is, its benefits, the challenges of using it, and also we look at some of the popular customer journey mapping software solutions available.  What Is Customer Journey Mapping?  Customer journey mapping refers to a strategic process (that’s used by marketers) to visualise and understand the complete experience of…

Read More

Tech News : Glassdoor Site Shows Real Users’ Names

It’s been reported that Glassdoor (the website that allows current employees to anonymously review their employer) posted users’ real names to their profiles without their consent.  What Is Glassdoor?  By allowing users to register anonymously, Glassdoor is a website that allows current and former employees to anonymously review their companies and management. Founded in 2007 in Mill Valley, California,…

Read More

Tech News : Your AI Twin Might Save Your Life

A new study published in The Lancet shows how an AI tool called Foresight (which fully analyses patient health records and makes digital twins of patients) could be used to predict the future of your health.  What Is Foresight?  The Foresight tool is described by the researchers as a “generative transformer in temporal modelling of patient data, integrating both free…

Read More

An Apple Byte : Serious Apple Chip Vulnerability Discovered

US researchers have reported discovering a hardware chip vulnerability inside Apple M1, M2, and M3 silicon chips. The unpatchable ‘GoFetch’ is a microarchitecture vulnerability and side-channel attack that reportedly affects all kinds of encryption algorithms, even the 2,048-bit keys that are hardened to protect against attacks from quantum computers.  This serious vulnerability renders the security effects of constant-time programming (a side-channel mitigation encryption algorithm)…

Read More

Security Stop Press : Microsoft’s RSA Key Policy Change

Microsoft is making a security-focused policy change that will see RSA keys with lengths shorter than 2048 bits deprecated. RSA keys are algorithms used for secure data encryption and decryption in digital communications, i.e. to encrypt data for secure communications over an enterprise network. However, with RSA encryption keys becoming vulnerable to advancing cryptographic techniques (driven by advancements in…

Read More

Sustainability-in-Tech : World’s First Bio-Circular Data Centre

French data centre company, Data4, says its new project will create a world-first way of reusing data centre heat and captured CO2 to grow algae which can then be used to power other data centres and create bioproducts.  Why?  The R&D project, involving Data4 working with the University of Paris-Saclay, is an attempt to tackle the strategic challenge of…

Read More

Tech Tip – Use Task Scheduler to Automate Tasks in Windows

Automating routine tasks can save time and ensure that critical operations aren’t overlooked. The Windows Task Scheduler allows you to automate tasks such as daily backups, weekly disk cleanups, off-hours software updates, periodic service restarts, and sending reminder emails for events by setting them to occur at specific times or when certain events happen. Here’s how to use Task…

Read More

Featured Article : Don’t Ask Gemini About The Election

Google has outlined how it will restrict the kinds of election-related questions that its Gemini AI chatbot will return responses to.  Why?  With 2024 being an election year for at least 64 countries (including the US, UK, India, and South Africa) the risk of AI being misused to spread misinformation has grown dramatically. This problem extends to a lack…

Read More

Tech Insight : DMARC Diligence (Part 3) : Implementing and Optimising DMARC for Maximum Security

In this third and final part of our series of ‘DMARC Diligence’ insights, we explore the detailed process of DMARC deployment, its monitoring, optimisation, and preparing businesses for future email security challenges.  Last Week …  Last week in part 2 of this series of ‘DMARC Diligence’ articles, we looked at the crucial yet often neglected aspect of securing non-sending or…

Read More