Tech Insight
What Are ‘Toxic’ Backlinks?
In this tech insight, we look at what ‘toxic’ backlinks are, how to identify them, and how to remove them. Backlinks Backlinks (incoming links) are believed to be one of Google’s top three ranking factors. Trustworthy backlinks from websites with a high authority score are a factor which contribute to higher search engine rankings. However,…
Read MoreGIF Creator Died. Just What Did He Invent?
In this insight, we look at how Stephen Wilhite invented the GIF file, and how his invention has endured while the Internet has undergone vast changes. Who Was Stephen Wilhite? Stephen Wilhite is regarded as one of the inventors who changed the face of the Internet. White worked at CompuServe in the 1980s. Founded in…
Read MoreWhat Is ‘Agile’ Working?
In this article, we take a brief look at what agile working is, plus how technology contributes to it. Agile Agile working refers to the idea of connecting processes, people, technology, time, and place to create a dynamic workforce. By giving workers the freedom and maximum flexibility to work where and when they want, thereby minimising…
Read MoreHow to Avoid Being “Doxxed”
In this article, we look at what doxxing is, some examples of doxxing, and what can be done to protect ourselves and our businesses from being ‘Doxxed’. What Is Doxxing? Doxing is a 90s hacker term meaning for dropping (personal) dox where ‘dox’ is a slang term for documents. Doxxing is a malicious act where…
Read MoreWhat Is A ‘Watering Hole’ Attack?
In this tech insight, we look at what a watering hole attack is, some examples of such attacks, and how businesses can defend against this threat. Poisoning The Water A watering hole attack is a targeted, ‘supply chain,’ cyber-attack strategy, similar to spear phishing. With this strategy, the attacker identifies a website that’s frequented by…
Read MoreHow To Check Your VPN
In this article, we take a look at some of the ways users can assess how good their VPN really is. What Is A VPN? A ‘Virtual Private Network’ (VPN) is used to keep internet activity private, evade censorship / maintain net neutrality and use public Wi-Fi securely (e.g., avoid threats such as ‘man-in-the-middle’ attacks).…
Read MoreWhat Was New at CES?
In this tech insight, we take a look at a selection of the latest B2B and B2C tech products and gadgets on show at the recent CES® tech trade show. Examples The more business-focused devices, hardware and software on show included: Laptops And Other Devices As you may expect, many new laptops and other devices…
Read MoreWhat Is DuckDuckGo?
In this tech insight, we look at what DuckDuckGo is, what features it offers, and why businesses may consider using it. DuckDuckGo DuckDuckGo is a privacy-centred search engine / privacy browsing app, which is available as a download for mobile devices and a Chrome extension. The company, founded in 2008, also plans to launch a…
Read MoreWhat Are Quantum Computers?
In this tech-insight, we take a look at what quantum computers are and what they’re used for. What Are They? Quantum computers can carry out complex calculations at high speed. Whereas traditional computers store data in binary ‘bits’ (ones and zeros) and work by creating and storing long strings of these ‘bits,’ quantum computing’s ‘qubits’…
Read MoreWhat Is ‘Surveillance for Hire’?
After Meta (Facebook) recently reported alerting 50,000 people that it believed were being targeted by “surveillance-for-hire” entities, we take a look are who these entities are and what they do. Meta’s Report Following months of investigation, Meta recently informed 50,000 people that they were being targeted by seven “surveillance-for-hire” entities / “cyber mercenaries” who were targeting people in…
Read More