-
Careful with that A.I. Eugene ! / How NOT to A.I. / Stop feeding the machine.
Stop feeding the machine. You may have heard a lot about A.I. recently, as lots of money is being thrown at large A.I. projects to explore the space and open new possibilities with computing. While at the moment it seems like a solution looking for a problem, in time it could prove to have great…
-
The Cyber Security Fallout of CrowdStrike Global IT Outage
Before I get into some of the cyber security fallout from the CrowdStrike global IT outage, you can read some of my thoughts on the incident here: The Wednesday Bit on Monday – CrowdStrike Global IT Outage In this article I look at just a couple of the cyber security implications of an IT issue…
-
The Technology Behind VAR: Revolutionising Football
To continue with our Summer theme, I thought I’d give another insight in to some more football tech. This week it is the technology behind VAR The technology behind VAR has transformed the way football matches are officiated, bringing a new level of accuracy and fairness to the game. Introduced into the Laws of the…
-
Patch Tuesday and Updates
Patch Tuesday, also known as Update Tuesday refers to the established policy set by Microsoft and several other large software providers to push quality and security updates and fixes to their applications and programs. Since 2003 Microsoft have been releasing important updates on the second Tuesday of every month in order to address issues. Very…
-
Flying Cameras at Football Matches
Since it is the summer I thought I would give you a little insight in to some awesome tech that has made a huge difference to watching football. The flying cameras at football matches, often referred to as Spidercams, have revolutionised the way we view football, offering dynamic and immersive footage that brings fans closer…
-
What is involved in an IT and Cyber Security Audit?
We recommend all our clients to have an IT and Cyber Security Audit, but many business people are not sure what that involves or whether it is even necessary, particularly if the business is very small. In times of economic uncertainty, it is logical that business owners will look for value for money and an…
-
SOC-Backed AV
In the intricate web of cybersecurity, a Security Operations Center (SOC) serves as the nerve center, orchestrating the defense mechanisms against cyber threats. The integration of Antivirus (AV) solutions within a SOC framework elevates an organisation’s security posture to new heights. A SOC-backed AV system is not just about detecting and removing malicious software; it’s…
-
Sender Policy Framework – Phishing Email Primer (pt.10)
In the digital age, where business communication is predominantly conducted via email, the security and authenticity of these communications cannot be overstated. A correct business email setup, including Sender Policy Framework (SPF) records, is not just a technical detail but a fundamental aspect of a company’s online presence and reputation. SPF records are a type…
-
Safely Disposing of Old Hard Drives: Protecting Your Data and the Environment
As technology evolves, we find ourselves upgrading our gadgets and devices more frequently. Whether it’s a new laptop, smartphone, or external hard drive, the old ones often end up collecting dust in a drawer. But what about the sensitive data stored on those old hard drives? How can we ensure that our personal information doesn’t…
-
Is your Dad a Geek?
We’re back, with the essential geek present list for Father’s Day. For those of you who have forgotten when it is, here is a reminder – Sunday, 16 June 2024 Big enough? This list is mainly for fun – there are no affiliate links – and hopefully inspiration for more unusual presents than you normally…