In this insight, we look at the new online form where customers can report online rip-offs that’s been developed as part of the new government campaign “The Online Rip-Off Tip-Off” to help shoppers spot and avoid misleading online practices. The Online Rip-Off Problem According to a recent poll of over 2,000 UK adults by the […]
Read MoreIn this insight, we look at the steps you can take to erase any details about yourself from Google to protect your privacy. Why Might A Person Want To Erase Their Details From Google? Google collects your personal information when you go online, some (or all) of which you may want to erase, e.g. a […]
Read MoreGoogle has announced the rollout of ‘Passkeys,’ which it describes as “the easiest and most secure way to sign-in to apps and websites” and a major step toward a “passwordless future.” Working Toward A Passwordless Future : FIDO & Passkeys Passkeys comes out of the work that Google’s been doing with the FIDO Alliance, an open industry association, formed […]
Read MoreFollowing “AI Godfather” Dr Geoffrey Hinton’s departure from Google to talk about the dangers of AI, we look at what the threats could be and what this could mean for businesses. Departure From Google Dr Geoffrey Hinton was dubbed as the “AI Godfather” because of his pioneering research on neural networks and deep learning which […]
Read MoreWhat is Zero Trust? The Zero Trust is a cybersecurity framework that challenges the conventional network safety philosophy of implicitly trusting network administrators and users. It runs under the belief of “never trust, always verify,” which states that no user or device should ever be presumed to be trustworthy, irrespective of their location or network […]
Read MoreWhatsApp has announced that it is introducing the ability to use the same account on multiple phones. Message Seamlessly Across All Devices WhatsApp says that this change gives users globally the ability to message seamlessly across all their devices without signing out, and to pick up their chats where they left off. Employees Can Use […]
Read MoreYou can tell if your WordPress site has been hacked or otherwise compromised by looking for a few common signs. In this article, we’ll discuss some of the most typical indicators that your WordPress site has been hacked and what you can do to fix it. Even if Google Analytics is correctly configured, a sudden […]
Read MoreFollowing news that hackers have stolen encrypted backups from the parent company of popular password manager LastPass, we look at what password managers are, plus the implications of the attack for businesses. Password Challenges We are all used to using passwords but without extra measures (e.g. 2FA) they are now recognised as having security limitations […]
Read MoreIn many cases, even after users opt out through a Consent Management Platform (CMP), user data is still gathered, processed, and shared, according to a recent US research study titled “Opted Out, Yet Tracked: Are Regulations Enough to Protect Your Privacy?” The Issue The research was based around developing a framework to measure how well […]
Read MoreChanges to Microsoft 365 could lead to less OneDrive cloud storage and disruptions with Outlook. Change In February, Microsoft announced that cloud storage used across Microsoft 365 apps and services would include Outlook.com attachments data and OneDrive data. Microsoft has warned that this change may decrease the available cloud storage on OneDrive. If the storage […]
Read More