All posts by Paul Stradling

Tech Tip – A Fast Way To Open Items From Your Taskbar

If you’d like super-fast and easy way to open the items/programs that are pinned to your Taskbar in Windows 10, here’s how:

– Look at the Taskbar and note which number order (left to right) the item/program is that you’d like to open.

– Use the keyboard shortcut Windows key + [Number key], with the number key corresponding to the position of the pinned program on the Taskbar. For example, Windows key + 2 will open the second pinned item on the Taskbar.

Tech News : World’s First “Living Robots” Can Now Reproduce

US-based scientists have reported creating “living robots” that can now re-produce.

Next Step From Last Year

Last year, a team of US scientists reported creating ‘living robots’ which were actually bundles of stem cells from African clawed frogs. The researchers discovered that they could ‘program’ these cells to accomplish certain tasks, hence the robot comparison. The cells were dubbed ‘robots’ because they could act on their own (on behalf of people).

In the research, the cells, about the size of grain of sand and dubbed ‘xenobots’, could move microscopic objects, move quickly round Petri dishes and even heal themselves.

Latest Research Reveals Reproduction

The latest research from the same team, published in the Proceedings of the National Academy of Sciences (US), revealed that the ‘robots’ (synthetic multicellular assemblies) could spontaneously (i.e. over a couple of days) reproduce by replicating kinematically through moving around and compressing other dissociated cells in their environment together to make functional self-copies.

Never Observed Before

Whereas (known) reproduction in life forms involves growth within or on the body of an organism, followed by splitting, budding, or birth, what is amazing about the xenobot ‘robots’ is that they could perform non-growth based kinematic replication. This means that they could make copies of themselves by gathering cells from around them with their ‘mouths’ and assembling them into baby blob-like bots. Based on this, the researchers claim that this kind of kinematic replication has never been observed before, nor was it known whether multicellular systems were even capable of it. Some scientists suggest that although it has not been observed before, it may have been essential in the origin of life.

AI Used To Design

Not only did the researchers make ‘robots’ that could assemble copies of themselves, but they also used artificial intelligence (AI) and a supercomputer to try and discover the best body shapes and configurations for xenobots that could most effectively build new baby bots. The AI work concluded that a C-shaped bot was most effective at gathering cells to make baby bots, and this program influenced how the xenobots behaved in doing so.

What Does This Mean For Your Business?

In addition to being an incredible discovery in itself, the research suggests that, with more development, xenobots could create new opportunities such as their use in medicine (e.g., to help deliver drugs within the body), or in other valuable ways such as cleaning up environmental contaminants. The research has also challenged traditional machine self-replication knowledge and assumptions and highlighted how reconfigurable organisms and kinematic (rather than growth-based) replication could lead to many more discoveries that could help in many different sectors. Given the speed of the move to the development of robots that can re-produce, many may also feel that, as with AI, regulation will need to keep up in order to prevent this science moving too quickly into areas of real danger.

Featured Article : A Business Continuity Plan : The Essentials

In this article, we take a look at what a Business Continuity Plan is, what it should contain, and why it’s such an important document.

Preparing

Accepting that the unexpected and disasters will happen (and that you can plan how to maintain business continuity while you deal with them) is an important step in safeguarding your business. Maintaining the ability to ensure that core functions and critical systems remain in place in the event of such a situation involves planning, an important part of which is the business continuity plan (BCP).

What Kind Of Events?

The kind of events that create the need to have a BCP in place and ready to go include:

– Hardware failures/server failures.

– Outages and/or file corruption.

– The effects of cyber-attacks.  For example, 53% of senior managers believe that a cyber-attack is the most likely thing to disrupt their business (Sungard) and the effects could include damage to / locking out of systems (malware and ransomware), fraud and extortion, data breaches (which could also attract fines under GDPR, damaging publicity and loss of customers).

– Important 3rd supplier failure or the loss of key employees.

– Failures of part / a component of a network.

– Environmental/natural disasters (e.g. fire and flood).

– Theft or loss of equipment holding company data.

– Financial and cashflow issues.

The Business Continuity Plan

The goal of a BCP is to ensure that resources are available to ensure continuous operation and disaster recovery following an emergency. A BCP, therefore, is the plan/document that contains all the details of just how a business will continue operating during any kind of unplanned disruption in service.

Not The Same As A Disaster Recovery Plan

A disaster recovery plan (DRP) is part of the BCP. The DRP is the part that focuses mainly on the restoration of IT infrastructure and operations following a crisis rather than focusing on the entire organisation which is the job of the BCP.

How To Make A BCP

There are several stages to making a workable BCP. These are:

Create the team to develop the plan.

This stage will ensure that the plan actually gets made and updated and is able to take into account the main issues.  This involves getting support from top management, assigning a person to manage the process, and putting together a team consisting of key people from each business department who can feed into the plan. The team should also decide upon the scope of the plan.

Start documenting the details of the BCP from the outset.

Everything decided in the making of the plan should be documented. This is something that should be set up at the beginning so that each new element can be added and checked and so that at least something is available if anything happens during the planning process. The plan should be securely stored off-site (e.g., in the Cloud) and each relevant person given access.

Conduct a full risk assessment.

This involves generating a list of all the known possible man-made, natural, and environmental risks and threats that could disrupt the continuity of the business and prioritising this list in terms of how serious the impact could be. This prioritisation of risk and threats will indicate which areas of the BCP should be tackled first.  The kinds of risks and potential threats that could be taken into account include:

– Natural and environmental risks related to geographic location weather patterns. These could include floods, storms (esp. lightning), earthquakes, landslides and more.

– Technology-related issues, such as human error and the effects of cyber-attack, loss of telecommunications, vital equipment/hardware failures, data outages and corrupted data, power failures, loss of Local Network Services, and prolonged technology outages.

– Market and financial-related risks and threats. These could include trends and movements in the market, cashflow issues, and stakeholder issues.

– Facility-related issues and internal hazards e.g., fire, electrical failures, water leaks, HVAC failure, chemical spills/leaks, strikes and more.

Create recovery plans for each function.

With the risks and threats identified and prioritised, the next stage is to:

– Generate a list of the critical functions of the business/organisation.

– Look closely at how each risk could affect each critical function of the business/organisation.

– Create individual recovery/continuity plans for each situation where you have identified how a risk could adversely affect that function. These mini-plans could include details such as creating data backups or maintaining a secondary location.

Define who does what.

Where each of the smaller plans has been created to tackle risks and threats to critical functions, the next stage is to assign responsibility to staff members who will be needed to undertake and co-ordinate the plans and to detail protocols they need to follow. This should mean that key staff know what to do and have a plan to refer to in the event of incidents and emergencies.

Test and update the plan.

The plan should be viewed as a living document and not a one-off exercise. Your BCP should be regularly reviewed and updated, e.g. if there are changes/additions to the risks and threats, or changes to key staff members.  Also, the plan and its key elements should be tested to ensure relevance and effectiveness.

What Does This Mean For Your Business?

The survival of a business depends upon not just accepting that bad things do happen, but on making the effort to prepare for at least what can be reasonably foreseen. Downtime and disruption can very quickly have a serious and costly effect on a business in terms of lost revenue, lost customers, reputational damage and more. Businesses also have a responsibility to stakeholders to ensure that risks and threats are identified and planned for where possible. Creating and maintaining a BCP, therefore, should be given a high priority as it can protect the life of the business itself.

Tech Insight : Email Security

In this tech insight, we take a look at the many threats to email security that businesses face and what businesses can do to mitigate them, together with what help is available to help tackle those threats effectively.

Email Accounts For Most Security Breaches

Prioritising email security is important because most cyber-security breaches involve email, with social engineering a strongly favoured tactic favoured by cyber-criminals and 99 per cent of email attacks relying on victims clicking links (Proofpoint Annual Human Factor Report).

Types of Email-Based Attacks

The many different types of email attack threats that businesses face include targeted phishing schemes, business email compromises, and ransomware attacks. For example:

– The Check Points mid-year security report in August this year showed that ransomware attacks (for extortion) have increased dramatically over the past year, with 93 per cent more attacks carried out in the first half of 2021, and with ransomware now appearing in 10 per cent of breaches (Verizon).

– Phishing. This cheap, easy, and highly effective tactic uses emails purporting to be from reputable sources containing links that (if clicked-on) direct the victim to pages where payment and other personal data is stolen or malware is downloaded. For example, at the end of 2019, Thomas Cook customers were targeted by phishing attacks in the wake of the travel company going into receivership. Verizon’s 2021 Data Breach Investigations Report shows that phishing increased by 11 per cent from Aug 2020 to Aug 2021 and that phishing is present in 36 per cent of breaches. The National Cyber Security Centre offers advice on how to protect your business/organisation from phishing attacks here: https://www.ncsc.gov.uk/guidance/phishing.

– Malware attachments to emails. It is estimated that a business is targeted by a ransomware attack every 11 seconds (Kaspersky) and Between 2019 and 2020, ransomware attacks rose by 62 percent. Malware is now involved in over 70 per cent of system intrusion (Verizon). Common forms of malware include viruses, worms, Trojan Horses, spyware, adware, and ransomware. Remote Access Trojans (RATs), for example, are malicious programs that can arrive as email attachments and provide a ‘back door’ for administrative control over the target computer, and can be adapted to avoid detection and to carry other types of attack tactics including disabling anti-malware solutions and enabling man-in-the-middle attacks.

– BEC and VEC. Whereas Business Email Compromise (BEC) attacks have been successful at using email fraud combined with social engineering to bait one staff member at-a-time to extract money from a targeted organisation, security experts say that this kind of attack is morphing into a much wider threat of ‘VEC’ (Vendor Email Compromise). This is a larger and more sophisticated version which, using email as a key component, seeks to leverage organisations against their own suppliers.

– AI-based threats.  Many technology and security experts agree that AI is likely to be used in cyberattacks in the near future and its ability to learn and to keep trying to reach its target (e.g. in the form of malware) make it a formidable threat. Email is the most likely means by which malware can reach and attack networks and systems, so there has never been a better time to step up email security, train and educate staff about malicious email threats, how to spot them and how to deal with them. The addition of AI to the mix may make it more difficult for malicious emails to be spotted. The good news for businesses, however, is that AI and machine learning is already used in some anti-virus software (e.g. Avast) and this trend of using AI in security solutions to counter AI security threats is a trend that is likely to continue.

Protecting Your Email From Common Threats

Ways to protect your email from common security threats include:

– Always keeping anti-virus and patching up to date.

– Staff education and training; e.g. how to spot suspicious emails and what to do/what not to do, such as not clicking on links from unknown sources.

– Disabling HTML emails if possible (text-only emails can’t launch malware directly).

– Encrypting sensitive data and communications as an added layer of protection.

– Getting into the routine of checking your bank account’s activity for suspicious charges.

– Making sure important and sensitive company data is backed up and including business email compromise (BEC) in business continuity planning and disaster recovery planning.

– Preventing email archives from being publicly exposed; e.g. by making sure that archive storage drives are configured correctly.

– Monitoring for any exposed credentials (particularly those of finance department emails).

– Using two-Factor Authentication (2FA) where possible, and enterprise users may wish to block .html and .htm attachments at the email gateway level so that they don’t reach members of staff, some of whom may not be up to speed with their Internet security knowledge.

– Not using the same password for multiple platforms and websites (password sharing). This is because credentials stolen in one breach are likely to be tried on many other websites by other cyber-criminals (credential stuffing) who have purchased/acquired them (e.g. on the dark web).

Broad Methods and New Approaches

Other broader methods that companies can use to protect their email security include:

– Adopting a ‘zero-trust’, “never trust, always verify” approach to company cyber security. The control that administrators have, and the monitoring and alerting can help dramatically reduce risk, including with company emails.

– Moving from perimeter to pervasive email security, e.g. as suggested by Mimecast’s CEO Peter Bauer.  This involves dealing with threats to the perimeter, from inside the perimeter, and from beyond the perimeter, plus an API-led approach to help deliver pervasive security throughout all zones.

Tech Company Help

Ways offered by tech companies to help businesses and organisations keep their email secure include:

Microsoft

Outlook’s Junk Email Filter, and the Report Message add-in for Outlook.

– Office 365’s Advanced Threat Protection (ATP) plans.

– Secure Score for Office 365 / Microsoft 365 Defender portal – a way to measure and get suggestions about how to protect your business from threats, all through a centralised dashboard – find out more here: Microsoft Secure Score | Microsoft Docs

– The “campaign views” tool in Office 365 that is designed to offer greater protection from phishing attacks by enabling businesses to be able to spot the pattern of a phishing campaign over individual messages.

– Offering online advice for protecting Outlook email accounts – see Help protect your Outlook.com email account (microsoft.com).

– Microsoft is making its plus addressing (disposable email address), custom email feature available to all Office 365 users by adding it to Exchange Online.

Google

Google also offers a number of tools and suggestions, including:

– Advanced Gmail security for phishing and malware for G Suite administrators  – see Advanced phishing and malware protection – Google Workspace Admin Help.

– Offering steps to identify compromised accounts – see Identify and secure compromised accounts – Google Workspace Admin Help.

– Advice on Firewall settings.

–  Blocking malicious emails before they reach email boxes.  For example, on its Cloud blog on 16 April 2020, Google reported that Gmail blocks more than 100 million phishing emails each day.

What Does This Mean For Your Business?

With so many types of attacks relying upon email as a way in (e.g. phishing), effective email security is vital. Businesses and organisations need to make sure that they are prepared to not just effectively defend against the whole range of email attacks but are be able to spot and eliminate threats as they arrive, and ensure that staff are aware of email threats and know what to do when faced with suspicious emails and links. Also, attackers adapt their campaigns and methods very quickly, and use methods that can evade the more common protection solutions (i.e. ‘polymorphic’ attacks) so businesses and organisations must find ways to get a fuller picture of the email threats they face and find solutions that can focus effectively on zero-day and targeted attacks in addition to known vectors. With the threat of AI-based attacks now on the horizon too, there has never been a more important time for businesses to take a very close look at what more they could be doing to maximise their email security.

Tech News : Twitter Bans Sharing ‘Private’ Images & Video Without Consent

In a change to its Private Information Policy, Twitter has banned the sharing of personal media, such as images or videos without the subject’s consent.

Why?

Twitter says that as part of its ongoing work to align its safety policies with human rights standards, it needs to take action to tackle the possible misuse of media and information that is not available elsewhere online as a tool to harass, intimidate, and reveal the identities of individuals.  Twitter says that it is particularly concerned about how sharing images or videos, without consent, could have a disproportionate effect on women, activists, dissidents, and members of minority communities in terms of violating their privacy or even leading to emotional or physical harm.

Existing Policies and Rules Not Enough

Twitter’s existing policies and rules only cover explicit instances of abusive behaviour. The update to the Private Information Policy, however, means that Twitter can now take action on media that is shared without any explicit abusive content, but is posted without the consent of the person depicted.

What Can’t You Share Anyway?

The existing aspects of Twitter’s policies mean that users can’t share the following media or information without the consent of the subject / the person it belongs to:

– Home address or physical location information, including street addresses and GPS coordinates.

– Any identity documents e.g., government-issued IDs and social security or other national identity numbers.

– Contact information, including non-public personal phone numbers or email addresses.

– Any financial account information e.g., bank account details or credit card details; other private details such as biometric data or medical records.

How Will The Change Work?

The change to the Private Information Policy means that if Twitter is notified by the individuals depicted (or by an authorised representative) that they did not consent to having their private image or video shared, Twitter will remove it.

Exceptions

Twitter has said, however, that the policy is not applicable to:

– Media featuring public figures or individuals when media and accompanying Tweet text are shared in the public interest or add value to public discourse.

– Situations where images or videos of private individuals are shared in an effort to help someone involved in a crisis situation e.g., the aftermath of a violent event.

– Situations where the ‘context’ dictates that the image/video should stay e.g., where the image/video has been made publicly available and/or is being covered by mainstream/traditional media.

Criticism

The policy change received criticism online for lacking clarity e.g., about who is considered to be a public figure and what can be defined as “private” images. Some critics also questioned how the policy would be enforced and suggested that the policy may end up disproportionately affecting those marginalised individuals that Twitter claims it will protect.  Twitter sought to clarify its position by posting on its own platform to say that images/videos showing people participating in public events such as large-scale protests, sporting events, etc. would not generally violate the policy and that they would require a first-person report of the photo/video in order to review the media before any enforcement action could be taken.

What Does This Mean For Your Business?

With the strengthening of data protection laws (e.g. GDPR in Europe) and social media companies now under serious scrutiny over how they protect their users (e.g. the recent Facebook Whistleblower allegations), it is not surprising to see social media platforms announcing new safety measures.  For Twitter, this strengthening of an existing policy to deal more effectively with image and video privacy and security issues sounds helpful and responsible but, as critics have said, needs further clarification and still relies upon Twitter’s own judgements about context, public interest, and other (often grey) areas. This illustrates how complex the matter of sharing, consent, and social platform self-policing and policies have become. This expansion of an existing policy is one in what is likely to become a long line of incremental changes for Twitter to try and show that it can keep its own house in order, dodge being cast as a ‘publisher’ rather than a ‘platform’, and thereby avoid the need for more regulation.

Tech Tip – Using Google To Search Within A Website

If you’d like to quickly search within a whole website (e.g. a competitor’s website for specific term or subject) here’s a quick way to do so using Google.

– Go to Google.

– In the search field, type “site:” followed by the URL of the site and your search terms. For example: site:bbc.co.uk Christmas

– This should return all pages (and many images) in the website that feature the search term you’ve specified.

Tech Insight : How To Know If Someone Has Read Your Email?

In this tech insight, we take a look at the better-known ways of being able to tell if someone has read your email.

The Usual Suspects

The main ways to tell if a person has read your email include:

– Request a read receipt when you compose the email.  The read receipt is then sent to you as an email with the time and date of when your message was opened.  For example, in Gmail, when composing the email, bottom right, click “More options” > “Request a read receipt”. In Outlook, Go to File > Options > Mail, and Under Tracking, select “Read receipt” which confirms that the recipient viewed the message checkbox.

– Delivery receipt. This is a way of confirming (by receiving an email back) if an email message has been delivered to the recipient’s e-mail server.  In Outlook, for example, go to File > Options > Mail, and Under Tracking, select “Delivery receipt”. Although it will directly confirm if the email has been read, it will confirm if the email address you sent to exists.

– Tracking pixels. A tracking pixel / marketing pixel / spy pixel is a 1×1 pixel graphic that can be hidden in anything from banner ads to emails and used to track user behaviour.  Tracking pixels can be inserted in emails and used to log if and when an email is opened, how many times it’s opened, and what device / devices are used. It can also use the (IP) address to get a rough idea of the recipient’s physical location.

– LinkedIn’s Inmail.  This service, within LinkedIn, allows one LinkedIn member to directly message another LinkedIn member that they aren’t connected to. LinkedIn allows read receipts on its internal messages so that the sender can see if the email has been read.  These receipts can be requested by clicking on the ‘Me’ icon at the top of the page, and selecting “Settings & Privacy” (dropdown list), “Communications” > “Messaging experience” > “Change”, and next to “Read receipts and typing indicators” turning the toggle to ‘on’.

– Third-party mail marketing programs and CRMs. Mailchimp, for example, can track who opened your marketing email (sent to their email address), and how many times. Zoho can track emails but requires a read-receipt request to see if the email has been opened (using the “Ask Receipt” feature).

– Third-party email tracking tools/ apps. Many of these work as an extension in Google Chrome, for example, Right, SalesHandy, Mailtrack, Streak, or MailTracker.

– Using codes. With Campaign Monitor, for example, UTM codes can be set within the emails to tell the analytics tool which recipients visited from your email campaigns, thereby confirming that the email has been opened.

Fooling Read Receipts?

App security and the option to opt-out/turn-off features like receipts mean that in many cases, it’s possible to fool these features. There are, however, some ‘hacks’ and methods for some apps posted online. One example involving WhatsApp, involves recording a voice note (in WhatsApp), where a sender can see if a recipient has played the recording, even if the recipient has disabled the ‘Read Receipt’ feature.

What Does This Mean For Your Business?

For business, marketing (and sometimes legal reasons), it is often important and helpful to know if a person has seen and opened your email. Emails, however, are private communications involving the management of personal data and, as such, there are relatively ways to monitor email openings (e.g. requesting a read receipt or other methods described earlier). For businesses, this may be an ongoing marketing challenge but, as individuals, there is value in maintaining our own email privacy and security.

Featured Article : Digital Markets Act Could Protect Whistleblowers

The EU’s adoption of a proposal on the Digital Markets Act (DMA) on Tuesday not only offers the potential to help tackle the market dominance of big tech businesses but could also protect whistleblowers.

What Is The Digital Markets Act?

Currently at the proposal stage, the Digital Markets Act (DMA) from the European Commission is designed to ensure a higher degree of competition within the European Digital Markets, by preventing large companies from abusing their market power and by allowing new players to enter the market. The idea is to create more of a level playing field for businesses which the EC believes could help to foster innovation, growth, and competitiveness. The DMA will apply to businesses, and the EC has another initiative called the Digital Services Act (DSA) which will be used help protect the rights of users of digital services.

DMA Will Apply To “Gatekeepers”

One of the core ideas of the DMA is that rules are needed to govern “Gatekeeper” online platforms. These “Gatekeepers” are defined as “digital platforms with a systemic role in the internal market that function as bottlenecks between businesses and consumers for important digital services”.  For a large online platform to qualify as a “Gatekeeper” and, therefore, be subject to rules of the DMA, the EC says that the criteria to be met are that a company has:

– A strong economic position, significant impact on the internal market and is active in multiple EU countries.

– A strong intermediation position, meaning that it links a large user base to a large number of businesses.

– An entrenched and durable position in the market, meaning that it is stable over time.

To be more specific, a Gatekeeper platform has:

– A core platform in at least three EU countries with at least 45 million end users, and more than 10,000 business users.

– A business that operates in the European Economic Area (EEA), and generates €8 billion (£6.7 billion) in annual turnover, and has a market capitalisation of at least €80 billion (£67 billion).

Recent Whistleblower Allegations

Antitrust allegations, arguments about paying tax, and criticism about how big tech platforms are (or aren’t) policing themselves (with issues such as harmful content and misinformation) have long been made against the big tech platforms. The recent allegations by Facebook employee-turned-whistleblower, Frances Haugen, has shone a strong light on the subject.  Haugen alleged that Facebook, now ‘Meta’, which could be described as a “Gatekeeper”, is putting profit before people, and not addressing alleged issues about the safety of young users (Facebook and Instagram). For example, Frances Haugen claimed that Facebook was “unquestionably” making online hate worse, and told UK MPs that safety teams were under-resourced, and that “Facebook has been unwilling to accept even little slivers of profit being sacrificed for safety” and being “more dangerous than other forms of social media”.

Why Whistleblowers Are Important

Whistleblowers are insiders who take an ethical stance (or have other motivations) by publicly speaking-out about a company/organisation’s wrongdoing or questionable behaviour, often at their own expense.  Some of the reasons why whistleblowers are important are that they:

– Protect a company’s customers, employees, and other stakeholders.

– Protect an organisation by helping to combat fraud and misconduct.

– Help enforce the general rule of law by shining a light on law-breaking.

– Point to areas that may have been causing problems to the business itself and this can lead to the creation of a better culture and greater transparency which can business perform better.

Whistleblowing, however, is often unwelcome as it can show individuals and companies in a negative way and can lead to retaliation against the whistleblower. Given the power imbalance between the organisation and the individual who speaks out, plus the barriers of being able to speak out, companies need to have systems in place to allow reporting of concerns, and there needs to be protection for whistleblowers.

Already A Whistleblowing Directive

The EU already has a directive (DIRECTIVE (EU) 2019/1937) which came into force in October 2019 which is specifically designed to protect whistleblowers by stipulating that companies working in the EU with 50 or more employees must create internal reporting systems in order to help employees and third parties report violations of EU law and to protect those persons from retaliation when they speak up.

How The DMA Will Protect Whistleblowers

The DMA proposal states that Internal Market MEPs should ensure adequate protections are afforded to any whistleblowers at companies who come under the DMA’s remit and violate the DMA’s rules. This should help protect whistleblowers from retaliation by big tech “Gatekeeper” platforms.

Other Points in the DMA

Other important things that DMA seeks to do include:

– Protecting personal data-collection consent under GDPR, particularly where the data of minors is concerned in relation to direct marketing or targeted advertising strategies.

– Strengthening existing laws to give greater powers to help tackle absolute market dominance of big online platforms in the EU.

The Punishments

The proposed punishments for big digital platforms that the DMA rules against could be fines of no less than 4 per cent and no greater than 20 per cent of the gatekeeper’s global turnover. Given the size of a big digital platform’s operations, this could represent a significant punishment.

What Does This Mean For Your Business?

For the household-name digital platforms, this means a toughening-up of regulations in the EU area and could represent a threat to what many perceive to be their huge market dominance and, therefore, their profits. Greater protection for whistleblowers could also represent a threat in terms of allowing yet more damaging and costly bad publicity. For other, smaller digital companies operating in the EU area, the DMA is likely to be a welcome step, allowing them more of a chance to compete and gain more share in a market dominated by giants for so long. Big digital platforms, however, already operate in a highly regulated environment and whistleblower revelations, such as Frances Haugen’s, illustrate that they may still be able to operate in ways that could be perceived as questionable. The wealth of digital platforms may, however, mean that the threat of smaller fines may not be such a big deterrent. As such, it remains to be seen how much difference the DMA can make when it is finally introduced.

Tech News : Hamster Crypto-Croaks

Max, a.k.a. “Mr Goxx”, the hamster that found Internet fame through outperforming many human cryptocurrency-traders, has died.

Experiment With ‘Wheel’ Results

The hamster’s life as a crypto trader was down to him being used as part of an experiment by an anonymous German lecturer and prototyping specialist duo who set out to demonstrate the randomness of the crypto markets.

How?

Max’s cage (“office”) contained an ‘intention wheel’ used to select different crypto-currencies, and two tunnels, one for ‘buying’ and one for ‘selling’. A run on the wheel, followed by which tunnel he chose to walk through, decided which cryptocurrency would be bought/sold. His ‘office floor’ activities were shown on ‘Twitch’ (a video live streaming service).

Live Fast, Die Young

The hamster’s financial predictions only began in June this year but in his short time as an unsuspecting crypto-trader, he occasionally came out slightly ahead of Bitcoin, gained followers around the world on Twitter, and even attracted the attention of multi-billionaire Elon Musk.

Finished On A High

Following his last trading session on 20 November, Mr. Goxx was reported to have been up 19.72 per cent, apparently outperforming Warren Buffet’s company, Berkshire Hathaway.

The Point

The duo behind the experiment, who always stressed that Mr Goxx’s predictions should not be taken as any kind of real financial advice, were making the point that for most people, the world of cryptocurrencies is baffling, and lacks transparency. For example, the pair are quoted as saying that “It seems like most people from our generation see no other chance than throwing a lot of their savings on the crypto market, without having a clue what’s going on there”.

One-Third of Investors Know Little To Nothing About Crypto

The point of the Mr Goxx experiment is also illustrated by a report from Cardify (March 2021) which showed that only 16.9 per cent of investors who have bought cryptocurrency “fully understand” its value and potential. The survey also showed that 33.5 per cent of buyers have either little or zero knowledge about cryptocurrencies and would describe their understanding of the subject as “emerging.”

What Does This Mean For Your Business?

Many businesses are likely to share the view that despite much of the hype and news about the benefits and the apparent volatility of cryptocurrencies to date, there is still a lack of clear information and guidance about how crypto-currency investment can be undertaken successfully, and how it can be used to benefit businesses. Whereas blockchain (the technology behind cryptocurrencies like bitcoin) is already being used successfully in multiple business sectors, if the random choices of a hamster can outperform the deliberate moves of renowned investors business, trust in crypto-trading is likely to remain very low, scepticism will remain high, and all things crypto-currency are likely to remain a mystery. For those businesses already involved or thinking of getting involved in crypto-currency investment, some of the suggested guidance includes setting limits on investment amounts and which currencies, having a diverse portfolio, taking a long-term view, as well as using automated purchases, and possibly using trading bots. Without the knowledge and understanding of crypto-currencies, however, many may be tempted to seek the help of professionals in crypto-investment.

Tech News : Self-Powered Mobile Masts Could Beat Remote Off-Grid Challenges

Vodafone’s announcement that it aims to deploy self-powered ‘Eco-Tower’ mobile masts across the UK could mean connections for remote areas as well as environmental benefits.

Wind and Solar Powered

The new masts will be self-powered, using wind turbine technology, combined with new solar and battery technologies developed through Vodafone working with renewable energy technology specialist Crossflow Energy over the last two years.

Most Remote Sites Can Now Be Connected

One of the big civil engineering challenges of expanding phone networks with new mast sites has been, up until now, the need to connect them to the grid. Being able to generate their own power on-site, anywhere, means that the new masts are a promising way to provide connections to even very remote areas. This could help people in rural communities and help Vodafone to grow its network while achieving its energy-saving ambitions (reducing Vodafone’s energy consumption), and provide a more environmentally friendly and sustainable solution to connection challenges.

Other Benefits

Vodafone has highlighted other possible benefits of the self-powered Eco-Towers as being:

– Reducing the environmental impact of each site by using locally generated renewable power.

– A reduced reliance on diesel generators for back-up power thanks to the increased renewable contribution from the combination of wind and solar, together with battery storage systems on-site.

– The ability to be sited in the most sensitive of sites, including Areas of Outstanding Natural Beauty, because of the quiet, bird-friendly turbine of each Eco-Tower.

– A more secure power supply. I.e. it will not be affected by problems associated with the grid.

Helping Vodafone To Meet Targets

The Eco-Towers also provide a way for Vodafone to meet two important targets, which are:

– The Shared Rural Network (SRN) initiative, whereby all four mobile network operators have agreed to deliver 95 per cent combined coverage across the whole of the UK by the end of 2025.

– Vodafone’s own commitments to remove all carbon emissions from its own operations from 2027, remove all carbon emissions from its operations and the energy it purchases (across 21 countries) by 2030, and reduce all its global carbon emissions to net zero by 2040.

Sustainability

Andrea Dona, Chief Network Officer, Vodafone UK, said: “Our approach to managing our network as responsibly as possible is very simple: we put sustainability at the heart of every decision. There is no silver bullet to reducing energy consumption, but each of these steps forward takes us closer to achieving net zero for our UK operations by 2027.”

What Does This Mean For Your Business?

This is likely to be good news for businesses in rural areas that have struggled to get any reliable phone connections due to their distance from the grid, and any masts. It also provides a promising way for Vodafone to meet its environmental targets and commitments, as well offering a source of competitive advantage for Vodafone. The company also plans to deploy a new 43 per cent more energy efficient 5G radio unit which could decrease the energy consumption of its future 5G network once deployed, thereby giving it even more efficient operations going forward. Whilst the environmental and practical benefits of Eco-Towers are clear, Vodafone customers may hope that an expanding network won’t contribute to higher bills and that the efficiencies of the new 5G radio unit may also be a way to keep prices down.