The Online Rip-Off Tip-Off

In this insight, we look at the new online form where customers can report online rip-offs that’s been developed as part of the new government campaign “The Online Rip-Off Tip-Off” to help shoppers spot and avoid misleading online practices. The Online Rip-Off Problem According to a recent poll of over 2,000 UK adults by the […]

Read More

Erasing Yourself From Google

In this insight, we look at the steps you can take to erase any details about yourself from Google to protect your privacy.  Why Might A Person Want To Erase Their Details From Google?  Google collects your personal information when you go online, some (or all) of which you may want to erase, e.g. a […]

Read More

Passwordless Future : Google ‘Passkeys’

Google has announced the rollout of ‘Passkeys,’ which it describes as “the easiest and most secure way to sign-in to apps and websites” and a major step toward a “passwordless future.” Working Toward A Passwordless Future : FIDO & Passkeys Passkeys comes out of the work that Google’s been doing with the FIDO Alliance, an open industry association, formed […]

Read More

What If AI Goes Bad?

Following “AI Godfather” Dr Geoffrey Hinton’s departure from Google to talk about the dangers of AI, we look at what the threats could be and what this could mean for businesses. Departure From Google Dr Geoffrey Hinton was dubbed as the “AI Godfather” because of his pioneering research on neural networks and deep learning which […]

Read More

Zero Trust: The Future of Cybersecurity Defence

What is Zero Trust? The Zero Trust is a cybersecurity framework that challenges the conventional network safety philosophy of implicitly trusting network administrators and users. It runs under the belief of “never trust, always verify,” which states that no user or device should ever be presumed to be trustworthy, irrespective of their location or network […]

Read More

WhatsApp Wows: One Account Accessible on Multiple Mobiles

WhatsApp has announced that it is introducing the ability to use the same account on multiple phones. Message Seamlessly Across All Devices WhatsApp says that this change gives users globally the ability to message seamlessly across all their devices without signing out, and to pick up their chats where they left off. Employees Can Use […]

Read More

Is Your WordPress Site Hacked? Watch Out for These Common Signs!

You can tell if your WordPress site has been hacked or otherwise compromised by looking for a few common signs. In this article, we’ll discuss some of the most typical indicators that your WordPress site has been hacked and what you can do to fix it. Even if Google Analytics is correctly configured, a sudden […]

Read More

LastPass | What’s All the Fuss About LastPass?

Following news that hackers have stolen encrypted backups from the parent company of popular password manager LastPass, we look at what password managers are, plus the implications of the attack for businesses.  Password Challenges  We are all used to using passwords but without extra measures (e.g. 2FA) they are now recognised as having security limitations […]

Read More

Is your Data Shared even after opting out?

In many cases, even after users opt out through a Consent Management Platform (CMP), user data is still gathered, processed, and shared, according to a recent US research study titled “Opted Out, Yet Tracked: Are Regulations Enough to Protect Your Privacy?” The Issue   The research was based around developing a framework to measure how well […]

Read More

Microsoft 365 | Reduced OneDrive Cloud Storage 

Changes to Microsoft 365 could lead to less OneDrive cloud storage and disruptions with Outlook. Change  In February, Microsoft announced that cloud storage used across Microsoft 365 apps and services would include Outlook.com attachments data and OneDrive data. Microsoft has warned that this change may decrease the available cloud storage on OneDrive. If the storage […]

Read More
Astec IT Astec IT - Ultimate service through advances in technology 02038026525 [email protected]