Posts by Mike Knight
What Are ‘BEC Campaigns’?
In this insight, we look at what BEC campaigns are, their characteristics, together with what businesses can do to protect themselves from the threat of BEC campaigns. What Is A BEC Campaign? A business email compromise (BEC) campaign is a kind of text-based, impersonation, social engineering scam where, in most cases, the victim is forwarded…
Read MoreThe Growth Of Low Code
After a recent Medix report noted the widescale adoption of “low-code” by business, we look at what it is, the reasons for its growth, and the pros and cons of using it. What Is Low Code? Low code applications are those built using visual, model-driven tools like drag-and-drop modelers, smart services, components, and pre-built connectors rather…
Read MoreEU Makes It Easier To Sue Over AI Accidents
A new set of European Commission rules, called the AI Liability Directive, could make it easier for people injured in AI accidents to sue. Why? The European Commission says that the new proposals, which could become the first-ever legal framework on AI, are needed because: – AI developers, deployers and users need clear requirements and…
Read MoreNearly Half of Employees Use Risky Login Practices
A new study by 1Password has revealed that almost half of employees put their companies at risk by using risky online habits to avoid difficulties logging in and out of apps at work. Taking Risks With Company Security The study, by passwords manager maker 1Password which surveyed 2,000 US workers, found that 44 per cent…
Read MoreSharing Files That Self-Destruct
In this insight, we take a look at some of the many options available for sharing files that self-destruct. Why? Many business IT users have occasions where they need to send sensitive information, e.g. passwords and other private work data and files but would feel uneasy about simply sending it via the normal email system,…
Read MoreDigital Marketing : TikTok Vs YouTube
In this article, we compare the TikTok and YouTube platforms and take a look at some of the pros and cons of each. Similarities There are several important similarities between YouTube and TikTok. For example: – Both are popular video-sharing social media platforms that encourage user-generated content. – Both platforms also cater for content…
Read MoreUK Broadband And Mobile Carriers Face Tough New Security Rules
The UK government’s Department for Digital, Culture, Media and Sport has proposed a new set of rules to tighten up network security against cyberattacks in broadband and mobile carriers. Amongst The Strongest In The World The government says that the new regulations and code of practice, developed with the National Cyber Security Centre and Ofcom,…
Read MoreProtect Yourself From Job Phishing Scams
In this article, we look at what ‘job phishing’ is, how it works, and how you can protect yourself from this type of fraud. What Is Job Phishing? Job phishing refers to recruitment/employment scams where fraudsters pose as recruitment agents or reputable companies. The fraudsters post fake job descriptions and information about their businesses on…
Read MoreWhy AI Systems Can’t Patent Inventions …Yet
Following a recent Intellectual Property Office (IPO) consultation, it has been decided that AI will not be allowed to patent inventions. What’s The Issue? As highlighted by a legal battle dating back to 2018, some people believe that if AI systems invent something, they should be granted the status of being listed as the inventor…
Read MoreHow Can You Protect Yourself From ‘Identity Theft’?
With identity theft and the resulting identity fraud becoming more widespread, we look at how to spot the signs that you may be a victim, the effects on victims, plus how to reduce the risk of having your identity stolen and used for fraud. What Are Identity Theft and Identity Fraud? Identity theft is when…
Read More