<![CDATA[Blog]]> https://www.thesilvercloudbusiness.com/blog/rss Our Blog en Thu, 05 Feb 2026 06:28:06 +0000 Artificial Intelligence,  will it be a help or a threat to your business? https://www.thesilvercloudbusiness.com/blog/artificial-intelligence-will-it-be-a-help-or-a-threat-to-your-business https://www.thesilvercloudbusiness.com/blog/artificial-intelligence-will-it-be-a-help-or-a-threat-to-your-business <p>AI is all the talk at the moment, so much so that all of the technology trend analysis for 2026 and the technology roadmaps all list predominantly AI.  Gartner, one of the leading technology strategy businesses lists the following ten things to look out for in 2026:</p> <ol> <li>AI-Native Development Platforms</li> <li>AI Supercomputing Platforms</li> <li>Confidential Computing</li> <li>Multiagent Systems</li> <li>Domain-Specific Language Models</li> <li>Physical AI</li> <li>Pre-emptive Cybersecurity</li> <li>Digital Provenance</li> <li>AI Security Platforms</li> <li>Geopatriation</li> </ol> <p>The list is very AI heavy, even where something doesn't specifically have AI in the title, it will most likely either be driven by AI or have elements of AI in the solution.</p> <p><strong>So...AI is a good thing, right? </strong></p> <p>Well.... yes and no. <span style="font-size: 1.15rem;">Yes, AI can be immensely beneficial to your business but something commonly overlooked is that it's also immensely beneficial to other organisations as well, namely criminal ones.  One of the startling things about any new technology is that some of the biggest early adopters are the bad guys, criminals, who often identify how they can exploit the new technology way before commercial organisations have even started looking at the basics.  </span></p> <p><span style="font-size: 1.15rem;">It is a common theme, where criminals look at ways to utilise new technology to use it to exploit others and benefit from it either financially or transactionally, the bottom line being they will use AI to either gain money, data, control or use it for exploitation such as blackmail or social engineering.</span></p> <p><span style="font-size: 1.15rem;">Anyone that has done Cyber Essentials and Cyber Essentials Plus over the past few years can't but help to have noticed that each year it is becoming more stringent in order to pass, it is no surprise, because as the attacks become more sophisticated, so much the protection and accreditation to prove it.</span></p> <p>Fortunately if you look at the Gartner list above, there is a lot of focus around security, AI powered security for both internal and external threats.</p> <p>AI is being used to target AI attacks, the good guys are training AI to be good to combat the AI trained by the criminals to be bad. </p> <p>One of the biggest weaknesses in AI is the ability for an AI to role play, which allows a criminal to get around any moral safety nets the AI developers have baked in.  For example, if you were to ask AI if it would kill someone, it would say no, it's moral code would not allow it to, even to save itself.  <br /><br />If you ask AI to role play as a villain then ask it to kill someone, it will play along in that role and happily do it, it would kill in the role play scenario that has been set up.  The same goes with any of the other moral codes they may try to incorporate in AI to prevent it from being used in a criminal way.  All the criminal has to do is just ask it to role play with a certain characteristic and it bypasses any morality that may have been there, AI will then behave badly.</p> <p><strong>What can you do to combat AI ?</strong></p> <p>The simple answer is to fight fire with fire.  Fortunately cyber security vendors are developing AI powered security protection which is more able to spot AI driven attacks.  Think of it like an arms race between good and evil, with us rooting for the goodies and with us being very wary of the baddies because they want to do harm, which will disrupt business.</p> <p>In order to help protect our client's businesses we have identified and partnered with our chosen suite of vendor platforms.  We have chosen different vendors that we use to try to mitigate risk, something that could slip past one vendor could be detected by another, no one is 100%.</p> <p>Our chosen vendors are </p> <ul> <li>For endpoint protection we use<strong> Sophos, </strong>which also offers a subscription option of AI powered and human SOC (security operations centre) to deliver the best of both worlds in terms of endpoint security.  AI power to spot threats quickly combined with the experience real world human security experts have.  AI is good, but it is still learning based on data, the bit it often struggles to mimic is human experience and instinct and being able to think like a criminal. </li> <li>We couple this with <strong>Barracuda</strong>, adding another layer of threat detection which is also AI powered and combats threats in email as well as impersonation detection and suspected account take over</li> <li>All of which sits on top of the Microsoft Defender suite of protection, providing another layer of the security solution.</li> </ul> <p>Think of it like a security onion.</p> <p>If you would like more information about AI powered security, give us a call to arrange a demo on <strong>01722 411 999</strong></p> Wed, 04 Feb 2026 00:00:00 +0000 Do you know your single points of failure? https://www.thesilvercloudbusiness.com/blog/do-you-know-your-single-points-of-failure https://www.thesilvercloudbusiness.com/blog/do-you-know-your-single-points-of-failure <p>IT is so embedded in our lives these days that we don't even notice how much we rely on it, until it stops working.  This is true in both our personal and business lives, and it is only when something stops working that we notice how much we either rely on it or simply use it for our day to day activities.</p> <p><strong>So what is a single point of failure?</strong></p> <p>A single point of failure is usually a bit of equipment, that when it fails, it can affect an organisation.  For example, a business often relies on a computer network, so if a network switch (the bit that allows computers to connect to the wired network) were to fail, all of the devices that connect to it, would lose their network connectivity, so it is often a really good idea to understand all of the single points of failure and work out what you could do to mitigate any failures.</p> <p>Different failures can have different levels of impact depending on how wide the failure impacts people, the failure can be something that impacts one person, some people or all people. </p> <p>These are some of the things to consider:</p> <ul> <li><strong>Internet connectivity</strong> - Most businesses use cloud based services, relying on internet connectivity to be able to access services.  If a business loses its internet connection it would typically impact everyone.  </li> <li><strong>Network connectivity</strong> - if you don't have a working network, it has the same impact as losing the internet, this is applicable to both wired and wireless networks.</li> <li><strong>Power cuts</strong> - if there is no power, it is difficult to work with electronic devices</li> <li><strong>Power surges</strong> - if there is inconsistent power, it can damage equipment, resulting in a costly replacement process</li> <li><strong>Data</strong> - loss of critical data that has not been backed up</li> <li><strong>Security</strong> - protecting access to your business and data</li> <li> <p><strong>Work spaces</strong> - if you lose access to your work space, either through flood, fire or evacuation, what is the impact</p> </li> </ul> <p>A lot of these can be mitigated with some simple planning such as:</p> <ul> <li><strong>Internet</strong> - having a secondary internet connection using mobile or satellite data that can be used if your primary connection fails. </li> <li><strong>Network</strong> - factor in some additional capacity into your network infrastructure, have more than one network switch with enough capacity that if one switch fails there is enough capacity in the remaining switches to move the connections to it until a replacement device can be installed. </li> <li><strong>Power cuts and power surges</strong> - these can be mitigated with individual UPS (uninterruptible power supplies) which have built in surge protection, this can provide enough time for data to be saved and computers to be shut down in the event of a long power outage.  Alternately, more robust, building wide power solutions could be implemented to keep the office running in the event of a power outage, using the ability to generate power using a generator to power the battery backup powering the building. </li> <li><strong>Data</strong> - a lot of data is business critical, but a lot of businesses find out too late that a lot of what is critical, is not protected or protected sufficiently.  Cloud storage is not a backup, it is just using someone else's storage infrastructure elsewhere, it doesn't mean data is backed up so if the cloud provider has an incident, your data is not typically backed up so you could lose it, unless you have a separate dedicated backup.  </li> <li><strong>Security</strong> - this is both physical and logical, utilising physical measures such as locks and access controls and logical, using tools like anti-virus, anti-ransomeware, user access controls, multi-factor authentication and role based access controls, granting staff access only to what they need.</li> <li><strong>Work space</strong> - one thing that Covid resulted in was businesses adopting work from anywhere allowing the majority of businesses to continue to function even remotely, however this is not always the case, especially with work spaces that are used for manufacturing, and alternate locations in the event of an incident that prevents access should be identified. </li> </ul> <p>The above list is just a few things to consider for starters.  We have a vast wealth of experience, having helped businesses plan for unforeseen issues, mitigating against single points of technology failure and business continuity planning (BCP) and disaster recovery (DR).  If you would like more information, please call us on <strong>01722 411 999 </strong>and we would be happy to help.</p> Wed, 28 Jan 2026 00:00:00 +0000 Protect yourself from accidentally sending an email before you are ready in "New Outlook" https://www.thesilvercloudbusiness.com/blog/protect-yourself-from-accidentally-sending-an-email-before-you-are-ready https://www.thesilvercloudbusiness.com/blog/protect-yourself-from-accidentally-sending-an-email-before-you-are-ready <p>Have you ever hit "Send" either intentionally or accidentally on an email and instantly wished for a magical rewind button to roll back time.  Maybe you spot a typo, or in hindsight think your message sounds a bit too blunt, or remember you forgot to add an important attachment just a second too late.  </p> <p>It might be you meant to send the email to Bob Smith at Company A but when you type Bob in the <strong>To</strong> field it picks Bob Jones from Company B and you don't notice it and you are about to send the email to the wrong recipient.</p> <p>We’ve all been there where rushed emails can quickly snowball into confusion, awkward moments, or result in a flurry of follow-ups and subsequent mistakes compounding the issue.</p> <p>That’s why giving yourself a digital safety net with delayed or scheduled sending is like having a secret safety net.</p> <p>It buys you those precious extra moments to double-check content, polish the message, or just make sure your email lands at the perfect time like not in the middle of someone’s lunch break or protect you from an accidental data security breach. </p> <p>In the previous version of Outlook there was an option of <strong>Delayed Send</strong> which helped prevent this by placing the email in the Outbox, but this option is missing in New Outlook, instead there is the option to schedule sending, here is how to use it:</p> <p><strong>How to build in your email safety net in New Outlook</strong></p> <ul> <li>When you start your email put in the recipient and subject</li> <li>Create your email as per usual</li> <li>When you are ready to send</li> <li>Click on the <strong>Options</strong> tab</li> <li>Choose <strong>Schedule Send</strong> and then set the specific date and time if you want your email to be sent</li> </ul> <p>This then sends the email to the <strong>Drafts</strong> folder where you can go on to re-read or edit the email or check it has the correct attachment before it sends it.</p> <p>Give it a go.  Alternately, if you use Microsoft 365 and have fewer than 200 users, you can speak to us <strong>01722 411 999</strong> about how Microsoft Exchange can be configured and setup to stop an email being sent and instead ask the sender to double check the email and authorise the email being sent as an additional check of the email content before sending. </p> Wed, 21 Jan 2026 00:00:00 +0000 How to get more out of AI https://www.thesilvercloudbusiness.com/blog/how-to-get-more-out-of-ai https://www.thesilvercloudbusiness.com/blog/how-to-get-more-out-of-ai <p>There is a lot of hype around AI at the moment, with people getting inundated with how it will be changing our lives, yet often the lived experience of today is often poles apart from what we are told the future will be, and to be honest here is why.</p> <p>When first working with AI, think of it along the lines of a brand-new employee, and just like someone new in any business, AI can do basic tasks but ask it to do more complicated tasks, and it can start to fail.  All because it doesn't have enough information.</p> <p>Probably the best way to think of initially working with AI is to think of asking an average teenager to do a task.  To get the best results you need:</p> <ul> <li>To be specific with your instructions</li> <li>Either provide all of the information needed to do the job or tell the AI where it can get the information it needs to do the job</li> <li>Provide context to the instruction</li> <li>When you get the first results back, add more details or instructions to distil the results </li> <li>Regenerate the results and give feedback to the AI tool </li> <li>Check the output, don't trust it to be correct, AI is not always accurate and it may be using inaccurate sources, it is not infallible</li> </ul> <p>If you got a new employee it takes them a while to get up to speed in the business, the same goes with AI when you first start working with it. </p> <p>One of the words that often leaves people scratching their heads is that AI needs training, which sometimes conjures up images of an AI tool being told to sit, stay, roll over.  But the reality is that AI does need some training, just like a new employee does.  You don't expect a new employee to know where all the company data is, they need to be told or trained.  The other thing with a new employee is that you need to provide them with feedback on what they are doing, they don't know if they are doing their job right, they assume they are, or they may be looking for guidelines to ensure they are doing what is expected. </p> <p>The same goes with your chosen AI tool, it needs to get feedback, it needs to learn what you expect from it, in order to improve. which is why it is imperative you stick with your chosen AI tool and work with it to help it learn what you are are looking for so it can become more useful to you.</p> <p>The more you do the, the more accurate the AI tool becomes, the more useful it is to you and the more accurate the output each time.</p> <p>If you would like more information about how AI could help your business, contact us on <strong>01722 411 999</strong> and we will show you AI in action.</p> Wed, 14 Jan 2026 00:00:00 +0000 Technology to keep an eye on in 2026 https://www.thesilvercloudbusiness.com/blog/technology-to-keep-an-eye-on-in-2026 https://www.thesilvercloudbusiness.com/blog/technology-to-keep-an-eye-on-in-2026 <p>2026 is expected to see these continued technology trends grow. These trends include artificial intelligence that will develop using agents and an increase in small language model AI.  We also expect to see growth in sustainable IT as well as AI powered proactive cyber security to combat ever changing threats. But today we will focus on the growth trend in edge computing</p> <p><strong>What is "edge computing" and why is it growing?</strong></p> <p>Edge computing is where data is processed at the edge or periphery of a network rather than sending any data that has been collect by a device to a centralised data centre for processing.  The idea being that data is processed as close to the source rather than increasing the latency of processing the data further away in a data centre.   </p> <p>Examples of edge compute are:</p> <ul> <li>Smart cameras processing images locally without needing to send the data away for processing for data analysis such as foot fall or generating an alarm</li> <li>Autonomous self driving cars </li> <li>Smart home connected devices like Amazon Alexa and Nest</li> <li>Smart watches tracking health data</li> <li>Manufacturing controls such as monitoring quality</li> <li>Video conferencing technology such as Teams and Zoom</li> <li>Retail inventory tracking and stock control system</li> </ul> <p>Edge compute devices have the power to process the data they collect locally rather than being a dumb device that relies on a centralised data centre to compute the data.  So instead of collecting raw data and sending it over a network to a centralised location, an edge compute device can process the data in situ.  This reduces the time it takes for certain actions to take place.</p> <p>The increase in rollout of 5G and the ongoing development of 6G networks is seeing more and more devices that are always on, always connected and always able to share processed data with back end systems. </p> <p>However edge compute devices are not independent, they are still reliant on additional infrastructure to help process, collate and store information, but they help offload a lot of the processing that was traditionally all done centrally, increasing productivity whilst simultaneously reducing the reliance on expensive central compute power in data centres.</p> <p>As 2026 continues, we will see more and more interconnected edge compute devices with the ability to process data locally, providing more functionality and interaction with the user, coupled with legislative changes allowing it to be used more widely.</p> Wed, 07 Jan 2026 00:00:00 +0000 Christmas IT Jokes that are so bad even the cracker factory didn't want them! https://www.thesilvercloudbusiness.com/blog/christmas-it-jokes-that-are-so-bad-even-the-cracker-factory-didnt-want-them https://www.thesilvercloudbusiness.com/blog/christmas-it-jokes-that-are-so-bad-even-the-cracker-factory-didnt-want-them <p>We thought we would change it up slightly this week in the run up to Christmas with some really bad, no, woefully bad IT Jokes just to make you appreciate the ones you get out of Christmas Crackers even more! </p> <p><strong>Buckle up</strong>, here goes....</p> <p>_____________________________________________________</p> <p>Q. How many computer programmers does it take to change a light bulb?<br />A. None - it's a hardware fault</p> <p>_____________________________________________________</p> <p>Q. Why did the keyboard maker get sacked in the run up to Christmas?<br />A. He kept forgetting to put in his "Shifts"</p> <p>_____________________________________________________</p> <p>Q. What is the difference between an ordinary computer keyboard and a Christmas computer keyboard?<br />A. Not much really apart from the Christmas keyboard has "No L"</p> <p>_____________________________________________________</p> <p>A network engineer finds himself shipwrecked on a desert island, not knowing what to do, he decides to take a quick inventory of what he has with him.<br />He has a pocket knife, a candy bar and a reel of network fibre cable.<br />While he ponders his fate, he uses the pocket knife to cut a bit off the candy bar and comes up with a plan.<br />He digs a trench, buries the cable, then waits....<br />30 minutes later, a utility companies turns up, and true to form, digs up the exact same spot on the ground severing the fibre.<br />The engineer got his rescue.</p> <p>_____________________________________________________</p> <p>A programmer is going to the shops so his wife says to him "can you get a loaf of bread, and if they have eggs, can you get a dozen." <br />About 2 hours later, the programmer comes back with 12 loaves of bread. <br />His wife says "why did you get so much bread?" <br />He says, "because the shop had eggs."</p> <p>_____________________________________________________</p> <p>A man is flying in a hot air balloon when realizes he has no idea where he is. <br />He lets out some hot air from the balloon to reduce altitude until he is low enough to be withing shouting distance of a man on the ground.<br />He leans over the edge of the basket and shouts "Hello, you down there, can you tell me where I am?"<br />The man on the ground says, "Yes, of course. You're in a hot air balloon, about 20 feet above me, flying over a field"<br />The man in the balloon replies "You must work in IT"<br />"I do", says the man on the ground, who then goes on to say "How did you work that out?"<br />The man in the balloon replies "whilst what you told me is technically correct, it's of no use to man nor beast"<br />The man on the ground thinks for a bit then replies "You must be a Business Manager."<br />"I am" replies the astonished man in the balloon, who replies "tell me, how did you know?"<br />"Well", says the man on the ground, "you don't know where you are, OR where you are going, BUT you expect me to be able to answer your questions. You're still in the same position you were before we met, but now it's all my fault."</p> <p>_____________________________________________________</p> <p>Q. How can you tell if a programmer is an extrovert?<br />A. He stares at <em><strong>your</strong></em> shoes when he talks to you.</p> <p>_____________________________________________________</p> <p>Q. What does an HTML coder and a spider have in common?<br />A. They both make web sites</p> <p>_____________________________________________________</p> <p>Q. Why was Microsoft Outlook wearing reading glasses?<br />A. Because it lost its contacts</p> <p>_____________________________________________________</p> <p>A customer rings up their IT support company saying "Help, for some reason my computer keeps on singing the theme song to Skyfall"<br />The IT engineer replies "Don't worry, that's normal for A Dell"</p> <p>_____________________________________________________</p> <p>Q. What is a hackers favourite hobby?<br />A. Going Phishing</p> <p>_____________________________________________________</p> <p>Q. Why are the mummies from the pyramids insecure?<br />A. Because they were unencrypted</p> <p>_____________________________________________________</p> <p>Q. How did the hacker escape when being chased by the police?<br />A. He Ransomware</p> <p>_____________________________________________________</p> <p>Q. Why are email security gateways so lonely?<br />A. They are afraid of attachment(s)</p> <p>_____________________________________________________</p> <p>Q. Why did the programmer leave his visit to the countryside early?<br />A. He found too many bugs</p> <p>_____________________________________________________</p> <p>There are 10 types of people in this world... those who understand binary and those that don't</p> <p>_____________________________________________________</p> <p>Q. How do computer nerds start a speed dating session?<br />A. "Singles, sign on"</p> <p>_____________________________________________________</p> <p><strong> Stop groaning</strong>, I said at the start they were awful!!</p> <p>Wishing you all a very Merry Christmas and  a prosperous New Year.  To see our office opening hours over Christmas <span style="text-decoration: underline;"><strong><a href="blog/christmas-opening-hours" target="_blank">click here</a></strong></span></p> <p>We will be in touch with our customers in the new year with some exciting offers and ways to save money, helping your budget go even further!</p> Wed, 17 Dec 2025 00:00:00 +0000