All posts by Paul Stradling

Tech-Insight : Throttling And The “Big Switchoff”

With OpenReach now ‘throttling’ broadband speeds and limiting phone calls as measures designed to gently “nudge” customers to upgrade as the “Big Switchoff” approaches, we look at exactly what’s happening, why, and when.

What Is The Great Switchoff? 

The “Big Switchoff” refers to the switch from the old copper phone network to a new ‘Digital Voice’ alternative. Back in April 2021, BT Openreach announced that starting from the end of the year and finishing in 2025, it would be “switching off the UK telephone network as we know it” by moving 15 million lines (some figures say switching 29 million home landlines) from analogue to a VoIP (Voice over Internet Protocol) based replacement telephone service. The “Big Switchover” to digital was branded ‘Digital Voice.’

This means that the Internet (broadband) will be used to digitally carry telephone calls rather than traditional copper wires – i.e. landline voice calls will be transmitted digitally.  In individual homes, this will mean that people will plug a new digital phone, powered by mains electricity, into their router rather than a socket in the wall.

Also Means The End For ISDN 

Switching off the UK’s traditional public switched telephone network (PSTN) will also mean the end for ISDN because it uses the copper wire phone network. Also, BT Openreach will not be accepting new orders for PSTN, and ISDN2 and ISDN30 services after September 2023.

Why? 

The old PSTN is reaching the end of its life and is becoming increasingly difficult and costly to maintain, therefore Openreach is looking to ditch the legacy copper network completely so it won’t have to pay to run two parallel networks. Also, there are now more up-to-date alternatives that are compatible with how we communicate today, i.e. mobile and Internet communications. Some advantages for customers of the switch-over to VoIP could include:

– VoIP offers a greater breadth of capabilities.

– Cost savings and fewer system failures and outages and reduced complexity for providers.

– Scalability and portability (VoIP phone systems can go wherever the company goes).

– Greater communications-mobility, flexibility, and increased productivity and collaboration.

– Better security that’s continuously updated.

– Greater reliability.

– Improved customer experiences.

– Clearer calls, making it easier to keep existing numbers, and the choice to have broadband provided separately from the telephone service.

– Better identification and prevention of nuisance calls, thereby saving businesses time and money and potentially protecting against scammers.

Now The Throttling Starts 

Throttling refers to the intentional slowing down of internet speeds by an internet service provider (ISP) during certain times or for certain types of online activities. In the context of the impending “Big Switchoff”, Openreach has announced that it is planning to trial a set of service management measures to encourage customers still using analogue phone lines to contact their provider and upgrade to new, digital alternatives.

The trials in Salisbury, Wiltshire, and Mildenhall, Suffolk, will see “restrictions” introduced that will prevent out-bound telephone calls (calls to the emergency services will not be affected) and the limiting of broadband speeds (throttling), in order to prompt customer action.

A Nudge 

James Lilley, Director for Managed Customer Migrations at Openreach said of the trials: “A small minority of customers are yet to upgrade despite several attempts by their service provider to contact them, so we’re planning some gentle measures which will nudge them to contact their provider and have a conversation about their future service.” 

Deadlines 

Openreach notified its Communications Providers (CP) customers in January last year that the analogue services would be withdrawn in the trial areas by 19 April 2023, but that deadline has been extended to October 9 this year to test the new service measures.

The trials are reported to have been running since December 2020 and May 2021 respectively to test a set of processes for upgrading the UK’s decades old analogue network to new digital products and services.

Openreach says that “for those remaining on the legacy network who don’t have an agreed exemption, Openreach will introduce a reduction in broadband download speeds to around 2Mbps from April 24, followed by a barring of out-bound calls, from June 5. The changes will be introduced in batches to better manage customer responses.” 

Openreach also says that it’s still on track for the UK wide switch off at the end of 2025.

What Does This Mean For Your Business? 

The “Big Switchoff” at the end of 2025 of the old PTSN network and the move to ‘Digital Voice’ and VoIP should mean a more flexible, reliable, scalable, and more secure communications service that’s more capable of keeping up with the demands of the modern digital world which hopefully could deliver cost savings. At the current time, however, many businesses in the UK are still frustrated by not having particularly fast broadband speeds, plus the fact that the UK is lagging behind in terms of the 5G network, and at that many rural areas have no reliable broadband anyway. Also, they still have to wait until the end of 2025 to enjoy the full benefits of the digital switchover.

However, on the positive side, at least Openreach has allowed time to conduct enough tests and trials to hopefully iron any issues and ensure a smooth switchover from analogue that minimises costly disruption to businesses.

Tech News : IT Security Threatened By Professional Burnouts

A Mimecast spokesman has warned that in a labour market already stretched by shortages, Dutch digital resilience could be threatened if more attention isn’t paid to the mental well-being of cyber security professionals.

Wanting To Change Jobs 

Recent research commissioned by Mimecast in the Netherlands showed that a quarter of Dutch IT professionals are considering changing jobs in two years due to the risk of ‘burnout.’ Although burnout rates in the Netherlands among cyber security specialists are lower that the global average – 35 per cent as compared to 56 per cent – the research revealed that stress levels are high. It is thought that burnout rates are only as low as they are due to a ‘part-time’ culture, a good national work-life balance, and an innate cultural directness that highlights issues early.

What Kind Of Stresses? 

The kind of stresses and fears identified by the Mimecast research that cyber security professionals are facing, are reported to be:

– Security cutbacks at organisations.

– An increasing threat of cyber attacks.

– Feeling unrecognised in their work.

– Increasing media coverage of ransomware attacks making security professionals feel pressure to prepare properly.

– Fears about cyber insurance coverage and fear of potentially devastating attacks on critical infrastructure.

– Added pressure from the high workload caused by a chronic shortage of cyber specialists.

Could Affect Dutch Cyber Resilience 

The implications of cyber security professionals leaving the industry due to burnout and changing careers could be that Dutch businesses and organisations may be more at risk of successful cybers attacks, the loss of valuable knowledge and expertise in the industry, greater pressure on those left behind, plus making it more difficult for many  companies to find and afford cyber security professionals – i.e. low supply and high demand.

In Australia Too 

An Australian study from not-for-profit cyber mental health support initiative Cybermindz.org in December last year reached similar conclusions. For example:

– The rapidly evolving, relentless attack environment defying any sense of ‘job well done’ among cyber professionals and creating a sense of hopelessness.

– Early evidence of burnout in cyber professionals, signalling a potential loss of skills to a critical part of the economy which could lead to “systemic weaknesses in our human cyber defences would tend to impact society at mass levels, especially if essential services like water, energy, telecommunications, health, financial services, food distribution and transportation are affected.” 

What Can Be Done To Help? 

Some of the measures that can be taken to help the situation include:

– A serious acknowledgement of the conditions and challenges IT professionals face.

– Giving more board-level attention to the issue, which could create safer workplace conditions.

– The use of stress-reducing tools such as CyberMindz’s Integrative Restoration or iRest protocol.

– Greater promotion of mental health help options in the cyber community.

– Providing clear job descriptions and expectations to help cyber professionals to understand what is expected of them and what their responsibilities are, which can reduce ambiguity and stress.

– Encouraging work-life balance by promoting flexible working hours, remote work options, and setting realistic deadlines.

– Offering training and development opportunities to help cyber professionals stay up to date with the latest technologies and best practices, thereby improving job satisfaction, reducing stress, and increasing motivation.

– Ensuring that cybersecurity teams have access to the necessary resources and tools to perform their job effectively, e.g. by providing access to the latest software, hardware, and equipment, as well as providing support staff to help with administrative tasks.

– Fostering a positive work environment by promoting a culture of collaboration, recognition, and appreciation, as well as providing opportunities for team building and socialising.

– Managers and supervisors regularly checking-in with their cybersecurity professionals to gauge their wellbeing, discuss any concerns or issues they may be facing, and provide support when needed. This can help to build trust and rapport and can help to identify and address issues before they escalate into burnout.

What Does This Mean For Your Business? 

Research into this subject has highlighted a mostly hidden but important issue which, if not addressed, could have serious knock-on effects for many businesses, organisations and society as a whole. In addition to the relatively unrecognised human cost of the increasing stresses faced in today’s cyber professions, plus the potential loss of expertise from the cyber security industry, failing to address this issue could leave whole countries and societies open to devastating cyber attacks. As Cybermindz pointed out, these could impact society at mass levels through disruption to essential services like water, energy, telecommunications, health, financial services, food distribution and transportation.

Now that studies have revealed the extent of the issue, businesses may want to take a close look at how their own cyber professionals are feeling and identify what could be done to reduce their stress and the risk of them leaving. For example, measures such as providing clear job expectations, encouraging work-life balance, offering training and development opportunities, providing adequate resources, fostering a positive work environment, plus regularly checking in with employees could all help. By adopting these strategies, companies could help to improve the job satisfaction and wellbeing of their cybersecurity professionals, while also enhancing their performance and productivity.

Sustainability : Bacteria Ink Gives Bonelike 3D Printed Structures

Researchers at the Swiss Federal Institute of Technology Lausanne (EPFL) have developed a way for using a 3D-printing ink that contains calcium carbonate-producing bacteria, giving a result similar to mollusc shells or bone.

‘BacktoInk’ – Environmentally Friendly 

Researchers at EPFL’s Soft Materials Laboratory in the School of Engineering have successfully added the Sporosarcina pasteurii bacterium to 3D printing ink. When mixed with a urea-containing solution, it triggers a mineralisation process that produces calcium carbonate (CaCO3) that is light, strong, porous, and rigid, just bone or shells. This means that, using the new ‘BactoInk’, it’s now possible to produce a 3D-printed product of virtually any shape, using environmentally friendly materials and processes, which will gradually mineralise over the course of a few days to a solid state.

Mineral Particle Inks Failed In The Past 

Inks containing mineral particles have been tried in the past but have not been able to meet the flow conditions needed for successful 3D printing i.e., behaving like a solid when at rest, but still be extrudable through a 3D printing nozzle. Also, previous efforts have resulted in structures that were soft, or shrunk upon drying, leading to cracking and loss of control over the shape of the final product.

The Answer – A Polymeric ‘Scaffold’ Using BactoInk 

Lab head Esther Amstad explained why the bacteria-based ink method from the EPFL team has been successful where other mineral inks have failed, saying: “We came up with a simple trick: instead of printing minerals, we printed a polymeric scaffold using our BactoInk, which is then mineralised in a second, separate step. After about four days, the mineralisation process triggered by the bacteria in the scaffold leads to a final product with a mineral content of over 90 per cent.” 

The Result – A Strong And Resilient Bio-composite 

EPFL has reported that using BactoInk in a 3D printer produces a “strong and resilient bio-composite, which can be produced using a standard 3D printer and natural materials, and without the extreme temperatures often required for manufacturing ceramics.” 

No Living Bacteria In Final Product 

For those concerned about any possible dangers of the bacterial element of the ink, the EPFL researchers report that: “Final products no longer contain living bacteria, as they are submerged in ethanol at the end of the mineralisation process.” 

What Does This Mean For Your Organisation? 

This method of mineralising ink appears to have succeeded where others have failed and it’s believed that the versatility of BactoInk, combined with its low environmental impact and the excellent mechanical properties of the mineralised materials, could bring new possibilities for fabricating lightweight, load-bearing composites that are more like natural materials than to today’s synthetic composites. As such, the BactoInk method could have applications across a broad range of fields, including art, ecology, and biomedicine. The research team, for example, have suggested that it could be used in restoration of artworks e.g., by being directly injected into a mold or target site such as a crack in a vase or a chip in a statue. BactoInk’s mechanical properties such as its strength and shrinkage resistance mean that it could be well suited to both the repair a work of art, and preventing further damage during the restoration process.

One other very interesting environmental possibility for BactoInk could be in the building of artificial corals to help regenerate damaged marine reefs. Its bone-like structure may also lend itself to biomedical applications.

Security Stop-Press : Business Warned That ‘Deepfakes’ Are On The Rise

Following research, identity proofing experts ID R&D have warned businesses that there has been a rise in the number of fraud attempts and cyberattacks leveraging deepfake technology, i.e. the use of AI-powered technology to create convincing videos of people. Research indicates that nearly half (42 per cent) of organisations have already encountered deepfake attacks.

ID R&D has also warned that injection attacks, where cyber criminals bypass the camera or inject digital content into the data stream, e.g. to help bypass biometric authentication, are also on the rise. These threats highlight the need for new products and services to help businesses defend themselves against increasingly advanced identity theft attacks.

Tech Tip – Send Web Pages To Your Inbox

If you’d like a way to send web pages you find interesting to your inbox rather than bookmarking them in Chrome and forgetting about them, the InboxThis extension may be helpful. Here’s how to use it:

– Go to the Google Chrome Web Store and search for ‘InboxThis’. It’s a free browser extension that can send any webpage to your inbox in 5 seconds. N.B. other extensions and methods are available, and we have no commercial links with or reason to endorse this extension other than to highlight it as a potentially helpful tip.

– Add the extension (click on the ‘Add Extension’ button) – no signup or account creation is needed.

– When you’re on a page/article you want to save, click on the extension icon in Chrome.

– Check your email inbox. The webpage should be there.

Tech News : Want Free Hot Water? Have A Server In Your House!

Green distributed computer network heating company Heata is offering to provide up to 4.8kWh of free hot water per day in exchange for installing a business cloud server in your home.

Green Distributed Compute Network 

Heata, which began as an innovation project with British Gas, describes itself as “a ground-breaking green distributed compute network that uses the waste heat from compute to heat the water in people’s homes.”

Tackling Two Challenges With One Solution 

The company sees this as a way of tackling two challenges with one solution in that over 4 million UK households live in fuel poverty and data centres require vast amounts of energy and create significant heat. For example, it’s estimated that waste heat from a large data centre could provide hot water for 11,000 homes. Heata says that “moving heat is hard, it requires new infrastructure or a pre-existing heat network” but “moving bits and bytes is easy” so the idea of installing servers on the side of water tanks is a way of taking the servers to where heat is needed, thereby providing free hot water for those that want it. Heata says this turns a computing problem into a “social benefit” and supports the decarbonisation of the rapidly growing cloud computing industry.

How Does It Work 

The company fits a computer server unit to the side of domestic hot water tanks and the heat generated by the business cloud server heats the hot water. In return, Heata gets to expand its business cloud server network without the cost and complications of having to find/build and run data centres and deal with the heat from them.

Offer Example  

The Heata unit is reported to be currently only available as part of a government backed scheme in South East England. An example of a recent offer to customers is that (from Toms Hardware) in exchange for Heata installing a water-heating server unit next to the existing hot water cylinder, homeowners can get up to 4.8kWh of free hot water a day, the equivalent of 80 per cent of a UK household’s daily use for a whole year.

The Server Unit And ‘Thermal Bridge’ 

The computer server is mounted on Heata’s patented thermal bridge which is fitted to 450mm diameter domestic hot water cylinders and provides the attachment point for the server.

What About Your Router And The Power For The Server? 

Two key aspects of the deal that are less clear, however, are the fact that an extra (business) server will need to connect to the home’s router and network, and the unit will require electricity that the homeowner initially pays for (Heata says it will reimburse owners in the trial). These facts may well give potential customers some concerns such as:

– The bandwidth the unit will use and the associated costs and connection worries.

– The fact that it’s a strange computer on the home network that the homeowner has no access to and doesn’t know exactly what it’s doing, leading to possible security concerns.

That said, Heata has reportedly said that the server will only use a fraction of the bandwidth, it will only be engaged in tasks such as monitoring information and performing speed tests for most of the time, and later versions will be separated from a home’s broadband by fibre connections.

What Does This Mean For Your Business? 

The huge growth in cloud computing has created the need for many more energy hungry data centres which in turn has created the issues of how to manage the heat they generate and minimise/reduce the environmental impact. Many ideas have been tried, e.g. underwater data centres, but part of the attractiveness of this scheme is both the social element, i.e. homeowners in a cost-of-living crisis with high energy prices getting ‘free’ hot water, plus the fact that the product appears to tackle several issues with one solution. Businesses always need affordable cloud computing which schemes like this may be able to help provide and the computing industry needs to rapidly find ways to decarbonise, which Heata’s offering also shows promise for. It could also have knock-on benefits and opportunities for broadband providers and for other computing-based companies looking to offer similar solutions.

Featured Article : Usage Based Pricing And Now Hybrid Pricing

Although Openview’s recent second report shows that most SaaS companies used usage-based pricing last year, many are now moving to hybrid models.

What Is Usage Based Pricing? 

Usage-based pricing (UBP) is a pricing model where customers are charged based on how much they use a particular product or service. In the context of SaaS (Software as a Service), usage-based pricing means that the amount a customer pays for the service is, therefore, directly tied to how much they use it. For example, a SaaS company that offers an email marketing service may charge customers based on the number of emails they send each month, or a SaaS company that provides a project management tool may charge customers based on the number of active projects they have at any given time.

Types 

There are many popular types of UBP, including pay-per-use, tiered pricing, subscription-based pricing, and freemium pricing, but the pricing model commonly used in industries such as software and SaaS, where businesses charge based on the number of employees or users accessing the product, is known as per-seat pricing.

61 Per Cent Used UBP Last Year 

Openview’s  second ‘The State of Usage Based Pricing’ report (published this month and based on a survey conducted among a diverse range of private SaaS companies in July-August 2022) shows that 61 per cent of SaaS companies used some form of UBP in 2022. The report also shows that another 21 per cent plan on testing UBP in the future.

Who? 

Some examples of well-known tech companies shifting to UBP in recent times include Apigee, Google Cloud’s API management platform, and vertical software giant Autodesk. UBP is, however, used by many other big names including Slack, Mailchimp, Spotify, and many more.

What Are The Main Benefits Of UBP? 

Some of the main benefits of UBP that explain why it’s been gaining in popularity in recent years include:

– It seems fair. UBP can be more fair than flat-rate pricing, as customers only pay for what they use. This ensures that customers who use less of a product or service pay less than those who use more.

– Cost-effectiveness. UBP can be cost-effective for both customers and businesses. Customers can save money by paying only for what they use, while businesses can reduce the amount of waste or excess inventory they have on hand.

– UBP is more flexible and allows customers to adjust their consumption based on their needs and budget. This can be particularly useful for customers who have fluctuating demand, such as those in seasonal businesses.

– Transparency. UBP is often more transparent than flat-rate pricing, as customers can easily see how their usage translates into costs. This can help build trust and loyalty between businesses and customers.

– It’s relatively simple to understand.

– It allows SaaS companies to share in their customers’ success, making it what could be called a Product-led growth (PLG) model, i.e. where product usage drives customer acquisition, retention, and expansion.

– It incentivises efficiency. UBP incentivises customers to be more efficient in their usage, as they will be directly rewarded for reducing their consumption. This can be particularly effective in industries where energy or resource conservation is a priority.

Why Charge On Usage Instead Of Users? 

Some reasons why UBP has been preferred over pricing based on user numbers in recent years include:

– Seat pricing doesn’t scale with the value of automation. Software increasingly automates manual processes so the more successful a product is, the fewer user seats the customer needs.

– With the rise of AI gradually eliminating the need for whole teams of people for ongoing tasks, it’s become more difficult to achieve Monetisation that’s tied to human users of a product.

– For many fast-growing software companies, the value is in the API, i.e. software talking directly to software, so there doesn’t need to be a user to see value.

– Value-based pricing. UBP aligns with the value that the software provides to the customer. If a customer is using the software frequently, then they will pay more, while a customer who uses it less will pay less. This model can create a stronger connection between the value the software provides and what the customer is paying for it.

– Customer acquisition. By using UBP, SaaS companies can attract and retain customers who might be hesitant to commit to a fixed per-user fee. This pricing model can be more attractive to customers who are new to a particular software solution or are just testing the waters. UBP can also help companies to acquire and retain customers who have variable usage patterns.

– Competitive advantage. Offering UBP can give SaaS companies a competitive advantage over their competitors. By providing flexible and cost-effective pricing, SaaS companies can differentiate themselves from their competitors and attract more customers.

– Improved customer retention. UBP can lead to higher customer retention rates since customers are only paying for what they use. If customers feel they are getting value from the software and the pricing is fair, they are more likely to stay with the company over the long term.

Changing – A Move Towards Hybrid Pricing 

In addition to showing how popular UBP still is, the report also highlights the fact that today’s SaaS companies are now turning to more complex, hybrid pricing models, and that usage-based models exist somewhere in the middle of a pricing method spectrum.

Figures show that it’s not simply a case of usage-based pricing or subscriptions and that the share of companies with a largely usage-based or pay-as-you-go model has declined year-over-year (22 per cent to 15 per cent).

The report makes the point that hybrid pricing models appear to be more effective in today’s uncertain market conditions, e.g. mass tech layoffs and the rise and fall of company valuations and can help companies win deals and meet customers where they are.

The future of SaaS pricing, therefore, appears likely to continue being more blurred, with companies using blended models, e.g. Zapier, offering subscription tiers that include consumption as one of its main variables.

Stacking 

One of the other SaaS pricing features noted by the report was that new stacks of products are being introduced by SaaS companies to help them offer more complex pricing and as a way of experimenting with (and changing) their pricing.

What Does This Mean For Your Business? 

Broadly speaking, although UBP for SaaS companies is still on the way up, recent uncertain market conditions have seen many SaaS companies moving to hybrid models. Combining elements of different pricing models and creating new stacks of products have helped SaaS companies to take advantage of more complex pricing and have made them better able to weather the current economic challenges. It appears, therefore, that although UBP has many advantages and is still popular, the future is more blurred, hybrid pricing and UBP will exist in the centre of a spectrum of pricing model mixes rather than replacing other pricing models.

Tech News : 2FA Storm At Twitter

Twitter-owner Elon Musk’s latest decision to turn off SMS 2FA after 20 March unless you pay for Blue Tick has caused another storm of criticism.

What And Why? 

On 15 February, Twitter announced that: “starting today, we will no longer allow accounts to enroll in the text message/SMS method of 2-Factor Authentication unless they are Twitter Blue subscribers.” Twitter Blue is Twitter’s own paid-for authentication service which was ramped-up recently as a way of giving Twitter another revenue stream to get away from its near total reliance upon ad revenue.

Twitter justified the change by saying that: “unfortunately we have seen phone-number based 2FA be used – and abused – by bad actors”. 

SMS 2FA Known To Be Insecure 

It’s true to say that SMS as a form of 2FA has been known (for several years) to be much less secure for authentication than some other methods. For example, cyber criminals operate SIM jacking and SIM swap hacks and obtain leaked credentials like a username, cracked password, and phone number, enabling them to get past 2FA, e.g. using a password reset and fooling the device.

That said, at least having SMS 2FA is much better and more secure than having no second authentication factor enabled.

Non-Twitter Blue Users Have 30 Days  

Twitter also announced that for non-Twitter Blue subscribers (i.e. the vast majority of Twitter users) who are currently using SMS as their 2FA method on the platform, it’s a case of being given 30 days to disable SMS and find another third-party 2FA solution, after which time, SMS 2FA will be switched off. Twitter says that “After 20 March 2023, we will no longer permit non-Twitter Blue subscribers to use text messages as a 2FA method. At that time, accounts with text message 2FA still enabled will have it disabled”. 

What Are The Options? 

Twitter recommends using an authentication app or security key method instead. Examples of popular authentication apps include Google Authenticator, Microsoft Authenticator, Authy, and LastPass Authenticator. A security key can use a USB based method, or some people connect wirelessly or through Apple’s lightning port. Examples of popular security keys include Yubico Yubikey, Kensington VeriMark USB-C, and Nitrokey FIDO2.

What If You Haven’t Found An Alternative In That Time? 

One of the main criticisms within the online storm following the announcement is that if non-Blue Tick users don’t get an alternative in place before 20 March they’ll simply be left with no protection and, presumably, open to security threats.

Others have questioned the fact that if Twitter’s move was motivated by security, wouldn’t they want their paid accounts to have a more secure method of 2FA than SMS too?

What Does This Mean For Your Business? 

Although it’s accepted that SMS for 2FA is one of the less secure methods, it seems likely that this change is more about money. For example, the Blue Tick service is a way to create a revenue stream beyond advertising and although it appears a little heavy handed, this announcement may get more Twitter users to sign up. Also, sending SMS messages costs money and Twitter presumably needs to save more money right now wherever possible. It’s not surprising that many users may feel a little concerned about being given a time limit and being essentially told to go and sort their own security arrangement out but given the troubles at Twitter lately, they may not be too surprised. That said, one positive aspect may be that it may increase awareness about the different types and brands of authenticators and security key options available and their pros and cons, and it may actually mean that non-Blue Tick accounts will be more secure and less at risk as a result.

Tech Insight : What Are SPF, DKIM, And DMARC Records?

In this insight, we look at the popular email authentication protocols SPF, DKIM, and DMARC, how they work, why they’re important, and what happens if they’re not set up properly.

What Is SPF? 

SPF, or Sender Policy Framework, is an email authentication protocol used to verify the sender of an email message. It is used to detect and prevent email spoofing, a common tactic used by spammers and cybercriminals to send email messages that appear to come from a legitimate source.

How Does SPF Work? 

SPF works by allowing the domain owner to publish a list of authorised email servers in the DNS record of their domain. When an email message is sent, the receiving mail server checks the SPF record of the sender’s domain to verify that the email was sent from an authorised server. If the sending server is not on the list of authorised servers, the receiving mail server may mark the email as spam or reject it outright.

Why Is SPF Now So Important? 

SPF is one of several email authentication protocols that can be used to combat spam and other forms of email fraud.

What Is DKIM? 

DKIM, or DomainKeys Identified Mail, is an email authentication protocol that is designed to verify the authenticity of an email message and detect email spoofing. Like SPF, DKIM is used to combat spam and other forms of email fraud.

How Does DKIM Work? 

DKIM works by adding a digital signature to the header of an email message. The signature is generated using a private key that is known only to the sender’s domain. When the email message is received by the recipient’s mail server, the server can verify the signature using a public key that is published in the sender’s domain’s DNS records. If the signature is valid, the email is considered to be authentic, and the receiving server can then deliver the email to the recipient’s inbox.

DKIM can also help protect the reputation of the sender’s domain. By signing their email messages with a DKIM signature, legitimate senders can provide a mechanism for email receivers to determine that the message is legitimate, which can reduce the likelihood that the message will be marked as spam or rejected outright.

Why Is DKIM So Important? 

In combination with other email authentication protocols like SPF and DMARC, DKIM can provide a strong defence against email spoofing and other forms of email fraud.

What Is DMARC? 

DMARC, which stands for Domain-based Message Authentication, Reporting, and Conformance, is an email authentication protocol that is used to combat email fraud and phishing attacks. DMARC is designed to give email domain owners greater control over how their emails are processed by receivers and provides them with visibility into how their domain is being used to send email.

How Does DMARC Work? 

DMARC works by allowing the domain owner to publish a DMARC policy in their DNS records that instructs receiving mail servers how to handle email messages that fail authentication checks. The DMARC policy can be set up to instruct receivers to either quarantine, reject or allow email messages that fail authentication checks (such as SPF and DKIM).

DMARC also provides feedback to the domain owner about how their emails are being processed by receivers. This feedback can include information about how many emails are passing or failing authentication checks, which email services are processing emails on behalf of the domain owner, and more.

Why Is DMARC So Important? 

By using DMARC, email domain owners can better protect their brand reputation, improve their email deliverability and reduce the likelihood that their domain will be used for fraudulent or malicious purposes. DMARC is often used in combination with other email authentication protocols such as SPF and DKIM to provide a more comprehensive email security solution.

What can happen if SPF, DKIM, and DMARC are not set up properly? 

If SPF, DKIM, and DMARC are not set up properly, it can leave a domain vulnerable to email-based attacks such as phishing, spamming, and spoofing. For example:

– If SPF is not set up properly, it can allow unauthorised senders to use a domain name to send email messages, which can lead to email spoofing. This can result in the recipient receiving a message that appears to be from a legitimate sender when, in fact, it is not.

– If DKIM is not set up properly, it can also allow unauthorised senders to use a domain name to send email messages. In addition, it can result in messages being marked as spam or rejected by email receivers, even if they are legitimate.

– If DMARC is not set up properly, it can result in a lack of visibility into how a domain is being used to send email, which can make it difficult to identify and respond to email-based attacks. It can also lead to email messages being marked as spam or rejected by email receivers, even if they are legitimate.

-Without proper setup of SPF, DKIM, and DMARC, legitimate email messages may not be delivered to the intended recipient’s inbox, while malicious or spam messages may pass through to the inbox, potentially leading to security threats or the compromise of sensitive information.

What Does This Mean For Your Business? 

Email is one of the most common attack vectors used by cybercriminals, with a considerable proportion of security threats arriving in emails. According to various studies and reports, the majority of cyberattacks and security threats are initiated through email. For example, the 2021 Verizon Data Breach Investigations Report found that 85 per cent of all data breaches involved a human element, with phishing and credential theft being the top methods used by attackers. Additionally, the report found that 36 per cent of all breaches involved the use of stolen or compromised credentials, many of which were obtained through phishing attacks.

Also, the 2021 Microsoft Digital Defence Report found that phishing attacks were the most common type of threat observed, with attackers using a range of social engineering tactics to trick users into providing sensitive information or downloading malware.

Similarly, other studies have shown that a significant proportion of malware is delivered via email. For example, a 2020 report by cybersecurity company Symantec found that email was the most common vector for malware attacks, with over 70 per cent of all malware being delivered via email.

Overall, therefore, email should be a critical area of focus for businesses cybersecurity professionals, and it is essential that businesses and organisations take steps to protect themselves against email-based attacks. This can be done through the use of email authentication protocols like SPF, DKIM, and DMARC, as well as through user education and training on how to identify and respond to phishing and other email-based threats. Therefore, it’s important for email domain owners to properly set up and maintain these email authentication protocols to ensure the security and integrity of their email communications.

Sustainability-in-Tech : Search Engine Sustainability Shock

With the integration large language models (LLMs) into search engines, some are predicting that the massive increase in computing power needed could mean huge carbon emissions.

What Are Large Language Models? 

Large language Models (LLMs) are types of artificial intelligence (AI) models that are trained on vast amounts of text data to understand natural language. These models are typically based on deep learning architectures such as neural networks, and are capable of generating human-like language and carrying out a variety of natural language processing tasks. OpenAI’s ChatGPT and Google’s Bard chatbots are examples of LLMs.

Integrating LLMs Into Search Engines 

Following the massive success of OpenAI’s ChatGPT (OpenAI has close working links with Microsoft), both Google, Microsoft, and now Chinese search company Baidu have all announced plans to upgrade their search engines by integrating generative AI tools which use LLMs to enable their search engines to understand and respond to complex questions. This is intended to give search engine users a better search engine experience and enable the search engines to compete with eachother in this new area.

For example:

– Microsoft has announced that it is to introduce a “new, AI-powered Bing search engine and Edge browser” (in preview Bing.com), using OpenAI’s LLM, to “deliver better search, more complete answers, a new chat experience and the ability to generate content.”  

– Google has announced that it is testing and will soon be introducing its own conversational AI chatbot, powered by LaMDA, Google’s own AI, and that it will be integrated into the Google search engine.

Environmental Implications 

In addition to worries about inaccuracies in the answers given by chatbots e.g., Bard’s recent costly wrong answer given in an advert for the chatbot, one major concern that many have overlooked is how much carbon emissions could be increased through the wider use of LLMs.

How And Why? 

As highlighted in quotes from University of Surrey Professor Alan Woodword (in Wired), “There are already huge resources involved in indexing and searching internet content, but the incorporation of AI requires a different kind of firepower.” Professor Woodword is referring to his view that the wider use of LLMs could be a step change in online processing that could massively increase the power and cooling resources needed by large processing centres which could, of course, have a much bigger environmental impact i.e., more carbon generation. There may also be increased challenges in how data centres will deal with the extra heat produced.

How Much? 

An idea of how big environmental problem this could be may come from a third-party study published on a Cornell University arXiv archive which states that “larger models translate to greater computing demands and, by extension, greater energy demands.” The research paper highlights how training GPT-3, autoregressive language model that ChatGPT is partly based on, consumed 1,287 MWh and that this led to emissions of more than 550 tons of carbon dioxide equivalent. To put the figure in perspective, this is the same amount of CO2 that would be produced by a single person taking 550 roundtrips between New York and San Francisco. Adding to this the fact that more LLMs are being introduced, and integrating chatbots into search engines such as Bing and Google which have tens of millions of users per day has some tech commentators, such as Martin Bouchard of Canadian data centre company QScale to estimate that this will mean “at least four or five times more computing per search.” In order to process this demand, more hardware and more data centres will be needed, which is an unwelcome prospect considering that data centres already account for one per cent (IEA) of the world’s greenhouse gas emissions. This may also make it very challenging for big tech companies to meet their green targets e.g., Microsoft aiming to be carbon negative by 2050.

AI Can Also Help Reduce The Impact Of Itself 

That said, there are several ways that AI could be used to help offset the extra energy and carbon impacts that the increased use of Large Language Models (LLMs) produce. For example:

– Helping to develop more energy-efficient training methods. AI researchers can use machine learning algorithms to optimize the training process and reduce the number of computations required to train a model, which can significantly reduce the energy consumption.

– Cloud providers can use AI to optimise their data centres and reduce their energy consumption. For example, machine learning algorithms can be used to predict the demand for cloud resources and allocate them more efficiently, reducing the number of idle servers and minimising energy waste.

– Researchers are also exploring the use of green computing technologies to reduce the energy consumption of LLMs. AI algorithms can be used to optimise the scheduling of computing tasks and reduce the number of idle processors, which can significantly reduce the energy consumption.

– Sustainable computing practices can be adopted to ensure that LLMs are developed and used in an environmentally responsible way. This includes using renewable energy sources, reducing waste, and recycling materials whenever possible.

What Does This Mean For Your Organisation? 

So much has been reported about the amazing capabilities of LLMs and the new generation of chatbots led by the arrival of ChatGPT, and of how search engines could be seriously upgraded by incorporating them, that the possible environmental impacts appear to have been overlooked and under-reported until now. Data centres are already struggling to cope with demand and the need to reduce energy consumption and carbon emissions, and incorporating chatbots (which already have large energy requirements) into search engines which process hundreds of millions of searches per day looks likely to have a huge negative environmental impact i.e., higher energy requirements, greater carbon emissions, and the need for even more data centres. Now may be the time for tech and computer giants to get together and focus on finding new and innovative ways to minimise the environmental impact of these new technologies e.g., perhaps using more environmentally friendly AI-based solutions. Also sourcing more green and sustainable energy and being transparent and ethical in the use of data could help, but in the short term, it looks as though the rise of these new super-powerful chatbots is likely to create more environmental challenges than solutions.