Featured Article – The Issue of Push Payment Fraud Reimbursement

With Barclays Bank recently publishing the figures of refunds it made to customers who fell victim to authorised push payment (APP) fraud, there have been calls for greater transparency and reform to the current (voluntary) reimbursement code. Authorised Push Payment (APP) Fraud APP refers to situations where consumers have used a bank transfer to pay […]
Tech Insight – What Are Firewalls?

In this article, we take a brief look at what a firewall is, what types there are, and the benefits and drawbacks of firewalls. Firewall A firewall is a network security system that can monitor and control incoming and outgoing network traffic based on predetermined security rules. Based on these rules, it decides whether to […]
Tech Tip – How To Delete The Last 15 Minutes of Your Search History In Google

If, for whatever reason, you have not used Incognito browsing in Google and would like a fast and easy way to delete the last 15 minutes of your search history, here’s how: – Open the Google Search app on your Android or iOS device. – Tap on your profile picture (top-right). – Tap on “Delete […]
Tech News : Clubhouse For Android Launched In The UK

Drop-in audio conversation social network app ‘Clubhouse’ has launched its Android (beta) version for download in the UK. Clubhouse Android Launched In English-Speaking Countries San Francisco-based Clubhouse announced on May 9 that, starting in the U.S., and quickly following in other English-speaking countries, it was rolling out of the beta Android version of its popular […]
Tech News : AI Keystroke Spy Tools

With AI recently in the spotlight in Europe over the need to regulate over some ‘unacceptable use’, some experts are warning of the threat of AI keystroke reading spy tools. Possibilities Companies like TypingDNA developing AI biometric verification (back in 2017) based on recognising the individual characteristics of how a person types, suggest that it […]
Featured Article : Life After Cookies

With Google recently committing to phasing out third-party cookies as Firefox and Safari have already done, we take a brief look at the possible alternatives and replacements for using cookies to track and understand user behaviour. Cookies Cookies are pieces of code/small text files used for tracking and stored on the browser of someone who […]
Tech Insight : What Is Patching or Patch Management?

In this article, we take a brief look at the importance of patch management in maintaining security. Patches and Patch Management Patches are the software fixes for known security vulnerabilities in software such as operating systems, third-party applications, cloud-platforms, and embedded systems. Patch management is the ongoing process of distributing and applying those important security […]
Tech Tip : Using Alexa As An Intercom System

If you have Amazon Echo devices in your home (or office), the ‘Drop In’ feature allows you to use Alexa as an intercom through your Echo devices. Here’s how: – Open your Alexa app. – Tap ‘Devices’ (lower-right corner). – Tap ‘Echo & Alexa’ to display a list of all of your Echo devices and […]
9 most terrifying types of malware in an easy to read guide

9 most terrifying types of malware in an easy to read guide All businesses are being targeted by malware, all the time. And it’s estimated there are now one billion pieces of it out there. What is malware? It’s malicious software that’s been designed to do damage to your IT systems, or steal your data. […]
Tech News : Google Users To Be Auto-Enrolled In Two-step Verification

In a recent blog post, Google has announced that the automatic enrolment of Google account users in Two Step Verification ‘2SV’ is coming soon. Passwords – Single Biggest Threat To Online Security In the blog post on ‘On World Password Day’ (May 6), Google’s Director of Product Management, Identity and User Security, Mark Risher, shared […]