Tech Insight
Jobs Threatened By ChatGPT
In this insight, we look at the kinds of industries and jobs that research has identified as being most exposed to the disruptive threat of generative AI, but we also look at how AI has created some new job roles. Research Research from Felten, Manav Raj, and Seamans –“How will Language Modelers like ChatGPT Affect…
Read MoreWhat Are ‘Deadbots’?
Following warnings by ethicists at Cambridge University that AI chatbots made to simulate the personalities of deceased loved ones could be used to spam family and friends, we take a look at the subject of so-called “deadbots”. Griefbots, Deadbots, Postmortem Avatars The Cambridge study, entitled “Griefbots, Deadbots, Postmortem Avatars: on Responsible Applications of Generative AI in…
Read MoreCould ‘Digital Mindfulness’ Reduce Your Tech Stress?
In this insight, we look at what ‘digital mindfulness’ is, how it could help you and your business, and what challenges there are to introducing it. The ‘Digital Stress’ Problem Although the digital age has revolutionised work in terms of levels of productivity and connectivity, it has come at a cost. A significant challenge emerging…
Read MoreWhat Is ‘Customer Journey Mapping’ Software?
In this tech insight, we look at what customer journey mapping is, its benefits, the challenges of using it, and also we look at some of the popular customer journey mapping software solutions available. What Is Customer Journey Mapping? Customer journey mapping refers to a strategic process (that’s used by marketers) to visualise and understand…
Read MoreMARC Diligence: Step 3 – Implementing and Optimising DMARC for Maximum Security
In this third and final part of our series of ‘DMARC Diligence’ insights, we explore the detailed process of DMARC deployment, its monitoring, optimisation, and preparing businesses for future email security challenges. Last Week … Last week in part 2 of this series of ‘DMARC Diligence’ articles, we looked at the crucial yet often neglected aspect…
Read MoreDMARC Diligence: Step 2 – The Forgotten Domains : A Hidden Vulnerability
In this second article of the “DMARC Diligence” series, we shift our focus towards securing non-sending or “forgotten” domains and outline a strategy for their protection through DMARC implementation. Recap Of Part 1 You may remember that in part one of this DMARC Due Diligence series of articles we laid the groundwork by exploring the…
Read MoreDMARC Diligence (Part 1) : The Basics of Email Authentication
In this, the first of a series of three articles explaining DMARC and email authentication, we look at why SPF, DKIM, and DMARC are the key pillars of email authentication. The Issue Businesses face numerous cyber threats, with email being one of the most common attack vectors. Phishing, spoofing, and malware are prevalent issues, making email…
Read MoreWhat Are ‘Virtual’ Credit Cards?
In this tech-insight, we take a look at the world of virtual cards, who offers them, their benefits, and other secure payment alternatives. What Are Virtual Credit Card Numbers? Virtual credit cards and their card numbers (as the name suggests) only exist in the virtual world, e.g. in an app on your phone, and are…
Read More‘Only’ Double IT Spending Growth (To $5 Trillion)
New research from Gartner has predicted that global IT spending this year will reach $5 trillion and IT spending growth will be more than double that of 2023. A First – Spending More On IT Than Communications In its IT spending forecast, Gartner predicts that the massive $5 trillion global spend means that spending on…
Read MoreCyber Criminals With A PR Department
A whitepaper by researchers at Sophos highlights how, rather than remaining anonymous, ransomware gangs now engage with the media to shape the narrative around a hack and gain a tactical and strategic advantage. The Ransomware Threat Ransomware is a type of malicious software designed to block access to a computer system or data (typically by…
Read More