MSP LinkedIn Marketing – Basics

Are you looking to boost your managed service provider (MSP) business through LinkedIn marketing? LinkedIn marketing can be a powerful tool for managed service providers (MSPs) to reach new clients and grow their businesses. Here are some benefits of LinkedIn marketing for MSPs: Targeted audience: LinkedIn allows you to target specific industries and job titles,…

Read More

Online Safety Bill Amendment Gets Mixed Reaction

Tech News : Online Safety Bill Amendment Gets Mixed Reaction

The Government’s decision to amend the Online Safety Bill to allow ‘legal but harmful’ content has received a mixed reaction with criticism coming from The Samaritans.  What Is The Online Safety Bill?  The UK government’s Online Safety Bill, originally proposed by former PM Teresa May, is (draft) legislation that’s designed to place a ‘duty of care’…

Read More

AI Content Legal Challenges

Featured Article : AI Content Legal Challenges

Following a copyright lawsuit against an AI code generator and industry questions about who actually owns images made by AI text-to-image generators, we look at the legal issues (and others) surrounding generative AI.  The Issue  The recent lawsuit and questions from coders, artists, musicians, and other creatives show that the challenge is that there is…

Read More

New Deadline To Remove Huawei

Tech News : New Deadline To Remove Huawei

Following the UK government’s decision back in June 2020 to remove all Huawei Equipment From 5G Network Cores, the deadline has now been pushed back to December 2023.  Why Remove Huawei Equipment?  The decision to remove the equipment in the UK dates back to the Trump era in the US, however worries about national security…

Read More

What Is A Discord Server?

Tech Insight : What is a Discord Server?

In this insight, we look at what a ‘Discord server’ is, how to set one up, and the pros and cons of Discord servers.  What Is It?  Launched in 2015, ‘Discord’ (https://discord.com/) is a (free to access) voice, video and text chat app where users can set up their own public server / dedicated virtual…

Read More

What Are ‘BEC Campaigns’?

What Are 'BEC Campaigns'?

In this insight, we look at what BEC campaigns are, their characteristics, together with what businesses can do to protect themselves from the threat of BEC campaigns.  What Is A BEC Campaign?  A business email compromise (BEC) campaign is a kind of text-based, impersonation, social engineering scam where, in most cases, the victim is forwarded…

Read More

The Growth Of Low Code

Featured Article : The Growth Of Low Code

After a recent Medix report noted the widescale adoption of “low-code” by business, we look at what it is, the reasons for its growth, and the pros and cons of using it.  What Is Low Code?  Low code applications are those built using visual, model-driven tools like drag-and-drop modelers, smart services, components, and pre-built connectors rather…

Read More

EU Makes It Easier To Sue Over AI Accidents

EU Makes It Easier To Sue Over AI Accidents

A new set of European Commission rules, called the AI Liability Directive, could make it easier for people injured in AI accidents to sue.  Why?  The European Commission says that the new proposals, which could become the first-ever legal framework on AI, are needed because:  – AI developers, deployers and users need clear requirements and…

Read More

Nearly Half of Employees Use Risky Login Practices

Tech News : Nearly Half of Employees Use Risky Login Practices

A new study by 1Password has revealed that almost half of employees put their companies at risk by using risky online habits to avoid difficulties logging in and out of apps at work.  Taking Risks With Company Security  The study, by passwords manager maker 1Password which surveyed 2,000 US workers, found that 44 per cent…

Read More

Sharing Files That Self-Destruct

Sharing Files That Self-Destruct

In this insight, we take a look at some of the many options available for sharing files that self-destruct. Why? Many business IT users have occasions where they need to send sensitive information, e.g. passwords and other private work data and files but would feel uneasy about simply sending it via the normal email system,…

Read More