Phishing is the term used for all types of scams that bypass cyber defences by tricking people into handing over information. Bad actors use it to steal money, install ransomware or steal private data. Often they are looking for passwords. Forms of phishing have been...
Blog & News Media & Press
ChatGPT and Zero Trust – what’s behind the buzzwords?
Chances are you’ve already heard something about ChatGPT, a recently released piece of Artificial Intelligence (AI) which has the potential to massively transform the way we work with and relate to technology. It also raises fresh concerns and challenges for...
The Cloud Part 3: Security
A cloud is by far the safest place for your data. Clouds live in giant data centres operated by large organisations. In most cases they are built like fortresses. Guards patrol outside. Security cameras watch everything. No-one is going to break in and get physical...
A Pond Farewell
It’s a sad day in the office at N4L as we announce the closure of our education platform, Pond. The platform was initially built to connect educators with curated teaching and learning resources. The theory seemed pretty sound too - if we connect schools to the...
The Cloud Part 2
Moving to the cloud Moving to the cloud will save money, lighten your workload and give your more flexibility. Yet there is plenty of work to do before you will see the benefit. Cloud computing may be easier than managing your own servers but switching is rarely...
The Cloud
Cloud computing is using remote computers for jobs that were once done by local machines. We call it cloud because the computers are somewhere else on the internet. Most of the time you don't need to know where they are. When the idea was first developed, people would...