
Green IT - what is it, and how can you play your part
We make some sensible and practical suggestions for how you can contribute to your organisation’s Green IT strategy.
Past articles from every news category.

We make some sensible and practical suggestions for how you can contribute to your organisation’s Green IT strategy.

Dell has admitted that it as unintentionally installed software on their machines that contains a serious security flaw that can be taken advantage of.

The iPhone’s operating system source code has apparently been leaked online.

Outlook Top Tips. It's likely that you'll know some of these, given the amount of time spent per day trawling through and composing Emails. However, to improve your productivity even more, we have compiled a list of useful keyboard shortcuts you should take advantage of, as well some other features we think you should utilise.

This will be the first of many Productivity Knowledgebase articles that contain a range of tips and useful suggestions that will help increase productivity for a specific, common workplace technology.

Swedish developers, Wille Dalhlbo and Linus Unneback, have created a website that allows you to remove your online footprint by collecting all your accounts and deleting them.

A computer weekly survey has found that customer relationship management (CRM) is predicted to be the number one priority for IT systems buyers in the UK in 2017, in terms of packaged business applications.

Figuring out how to get compensation for a poor broadband service, isn’t always as easy as it should be!

Ofcom has been warned that new rulings to business broadband will result in price surges.

Symantec’s State of Privacy report has found that consumers in the UK don’t believe that the government and businesses do enough to ensure their data is secure.

Microsoft are to deliver one of their most important speeches in recent times.

If you're currently setup with an Apple ID, you'll need to take a bit more care when deleting your browser history. It has been found that iCloud will store your history indefinitely – which raises serious privacy and security questions for apple.

A recent report carried out by Ofcom’s Connected Nations has highlighted speed and connectivity improvements in the UK – but there are still companies and houses out there that still don’t have good enough broadband speeds.

Microsoft have announced they are offering cloud users private network connections to datacentres in the UK.

A new family of ransomware has come about called Locky Ransomware. While it follows the same pattern as other Ransomware by encrypting local files and holding the private encryption keys at ransom, the deployment has some minor differences.

A recent study has called for the IT industry to consider the needs of disabled people when commencing new procurements.
The Business Disability Forum (BDF), conducted a study that found that most of enterprise IT purchasers, and some suppliers, are not taking into consideration the needs of disabled people when making purchasing decisions.

The park where Alan Turing solved the Enigma code during WWII is to host a Cyber Security College that will help nurture the talent of young people that aim to have a future in cyber security
The college will be the UK’s first National College of Cyber Security when it opens in 2018.

Samsung have finally announced the answers to what caused the Samsung Galaxy Note 7 phones to explode.

The data breach happened in 2014 and is likely to have been carried out in a state-sponsored attack.

Mobile data use has almost doubled in the past two years, increasing 74 per cent alone in 2015 – taking the overall global figure averaging to around 3.7 exabytes per month. Which is an exorbitant amount.

Cyber Security Breaches Survey has found that two-thirds of large UK enterprises have been victims of a cyber-attack in the last year.

According to Bloomberg, Samsung is considering introducing two new ‘bendable’ smart phones sometime in 2017.

Instant communication giant WhatsApp has confirmed that End-to-End encryption will be applied to all its services.

We recently completed a high-profile office move/expansion project, integrating a client's operations with a foreign branch office - based in Africa.

After long discussions between Ofcom and BT, Ofcom has finally decided Openreach will remain part of BT.

BT is to create a centralised system that compiles information from both social and health care systems, in Islington.

It has been predicted that Yahoo will not place its 15% Alibaba holding in a separate company, and instead focus on its core business. However, this could include selling off most of Yahoo, which has sparked interest from Verizon to acquire these assets if they are for sale.

Leading security firm, Symantec, has vocalised its concerns about the growing popularity of malware designed to target OS X and IOS (Apple’s mobile operating system). Symantec states that the amount of malware has almost doubled this year.

Cable.co.uk, one of the UK’s leading broadband comparison groups, has warned that the expected increase in network connected devices on Christmas day could lead to a network standstill over the holidays.

Companies need to consider the risks as well as the benefits of Android’s operating system, warn experts.

Windows based laptops and hybrids are still likely to be the most common type of device used in business despite decline in sales.

The popularity of cloud computing and mobile technologies growing has brought with it more security challenges – and experts believe that security technologies and cross-industry collaboration are key to security success going forward.

Google have promised new customers free use of their Google Apps while they wait for their contract with current productivity suite provider to expire.

BT Openreach is adopting Infosys software platform to improve support for its engineers and customers.

Mobile analytics company RootMetrics, has published recent statistics that show Vodafone has improved its coverage in London drastically.

Studies conducted by Intel Security discovered that up to 94% of users were unable to tell the difference between genuine emails and a phishing attempt.

Businesses migrating to Windows 10 Enterprise edition, are promised a much smoother upgrade than in the past.

The Imagine Festival in Milton Keynes highlighted the potential of technology to revolutionise the way we move. A variety of young entrepreneurs gathered under one roof to offer creative solutions to 21st-century travel dilemmas.

In what at first glance seems to be a fairly odd move Microsoft have announced that Windows 10 will be their last ever edition of Windows.

Start-ups need more support if London’s digital economy is to develop, according to business leaders at Westminster Policy Forum.

The latest release of news bulletins have been released from Microsoft for April 2015 and ten out of eleven are related to vulnerabilities with the windows OS. Three of these could allow remote code execution, in this the limitation of how destructive it can be is what privileges the compromised account has.

Microsoft has unveiled a Skype for Business product as part of the monthly April update for Office 2013 and Office 365 customers.

The most common form of reminder for a forgotten password is email, from your colleague sending the password over for an encrypted document to amazon sending a new password. Most people pride themselves that their password is safe and no one can guess it but what if you didn’t permanently delete the email after memorising the password?

A report produced by Verizon has found that from the start of a phishing campaign to its first successful victim takes only a worrying 82 seconds.

Users should not be the first to receive the blame for a successful phishing attack, says security awareness expert.

The government of the United States has refused Intel their license application to export tens of thousands of processors to China to support the upgrade of the Tianhe-2 supercomputer.

EC2 IT updates its terms for the first time, simplifying how we work further and bringing us more into line with what customers expect.

As Microsoft continues to cease support for its 2003 line of products, it has set a deadline when support for Server 2003 will stop.

There was a 40% increase in the number cyber-attacks carried out on large companies in 2014, as criminals hijack infrastructures and attack from within, according to IT security firm Symantec.

We’d like to extend a huge EC2 IT welcome to our latest recruits, Darren, Ben and Sam.

One of the largest employment agencies in the United Kingdom, Reed, have adopted the Bitcoin as they believe this payment method play an important [art in the future of currency.

Hewlett-Packard intend to split into two individual companies to help better combat its competitors. This allows the allocation of resources to be more fine-tuned and focused within the aspects of the business which has grown large to incorporate a wide range of IT related services and equipment.

IT suppliers will now have to fully comply with the five security controls in the Cyber Essential Scheme (CES) starting from the 1st October.

The internet can be dangerous and there is always someone trying to use its massive reach for their own personal illegitimate gain. Being yet another victim of hacking is becoming common place now due to the vast amount of devices that are connected to the internet - but this doesn’t need to be the case.

HP is obtaining Eucalyptus – an open-source software specialist – to build private and enterprise clouds as they believe that open source cloud is the future.
Windows 9 Beta has been leaked following the news that Microsoft will send out invites to an event that will review the technical aspects of Windows 9 on the 30th September.