Tech Insight
MARC Diligence: Step 3 – Implementing and Optimising DMARC for Maximum Security
In this third and final part of our series of ‘DMARC Diligence’ insights, we explore the detailed process of DMARC deployment, its monitoring, optimisation, and preparing businesses for future email security challenges. Last Week … Last week in part 2 of this series of ‘DMARC Diligence’ articles, we looked at the crucial yet often neglected aspect…
Read MoreDMARC Diligence: Step 2 – The Forgotten Domains : A Hidden Vulnerability
In this second article of the “DMARC Diligence” series, we shift our focus towards securing non-sending or “forgotten” domains and outline a strategy for their protection through DMARC implementation. Recap Of Part 1 You may remember that in part one of this DMARC Due Diligence series of articles we laid the groundwork by exploring the…
Read MoreDMARC Diligence (Part 1) : The Basics of Email Authentication
In this, the first of a series of three articles explaining DMARC and email authentication, we look at why SPF, DKIM, and DMARC are the key pillars of email authentication. The Issue Businesses face numerous cyber threats, with email being one of the most common attack vectors. Phishing, spoofing, and malware are prevalent issues, making email…
Read MoreWhat Are ‘Virtual’ Credit Cards?
In this tech-insight, we take a look at the world of virtual cards, who offers them, their benefits, and other secure payment alternatives. What Are Virtual Credit Card Numbers? Virtual credit cards and their card numbers (as the name suggests) only exist in the virtual world, e.g. in an app on your phone, and are…
Read More‘Only’ Double IT Spending Growth (To $5 Trillion)
New research from Gartner has predicted that global IT spending this year will reach $5 trillion and IT spending growth will be more than double that of 2023. A First – Spending More On IT Than Communications In its IT spending forecast, Gartner predicts that the massive $5 trillion global spend means that spending on…
Read MoreCyber Criminals With A PR Department
A whitepaper by researchers at Sophos highlights how, rather than remaining anonymous, ransomware gangs now engage with the media to shape the narrative around a hack and gain a tactical and strategic advantage. The Ransomware Threat Ransomware is a type of malicious software designed to block access to a computer system or data (typically by…
Read MoreCameras In Airbnb Properties – What Are The Rules?
Following the Metro recently highlighting the issue of undisclosed cameras being used by a small number of Airbnb hosts, we take a look at what the rules say, reports in the news of this happening, and what you can do to protect yourself. Do Airbnb Hosts Have The Right To Film Guests? You may be…
Read MoreAvoid Getting Stung With Roaming Charges
In the wake of the recent news that Scotland’s Health Secretary, Michael Matheson, received an £11,000 roaming charges bill from his holiday, here we look at some of main ways you can keep data roaming charges down. What Are Data Roaming Charges? Data roaming charges are fees that you incur when using your mobile phone’s…
Read MoreHow To Make a QR Code
In this tech insight, we look at QR codes, the many different methods to generate them, the benefits of doing so, and the future for QR codes as the successor to barcodes. What Is A QR code? A QR (Quick Response) code, first designed in 1994 by Japanese company ‘Denso Wave’, is a type of…
Read MoreBlockchain Bill
In this insight, we look at the introduction of the Electronic Trade Documents Act 2023 (ETDA), what it means and why it’s so significant, plus its implications. The ETDA The Electronic Trade Documents Act 2023 (ETDA), which was based on a draft Bill published by the Law Commission in March 2022, came into force in…
Read More