New software aims to make employees central to the workplace

office workers

With automation and artificial intelligence becoming increasingly important for business, many employees are worried about what that means for their careers and future as part of a human workforce.

IT solutions specialist BMC is launching its new Digital Workplace, a cloud-based service that enables IT, HR, legal, facilities management, and any other line-of-business groups to offer employees a one-stop-shop for the tools and information they need to do their work.

Continue reading

Less than one percent of UK charities are protected against email fraud

Email fraud

Charities, just like other organizations, rely heavily on email for their communications, but a new study reveals that in the UK most are not protected against the risks of fraudulent emails and phishing attacks.

The study by platform-as-a-service provider Red Sift analyzed the email domains of over 78,000 charities and found that under one percent have adequate protection using DMARC authentication.

Continue reading

Petya ransomware goes global -- what's happening and how to protect yourself

ransomware cash

The ransomware attack we reported yesterday may have begun in the Ukraine, but it spread rapidly across Europe and has now hit companies in Australia and the US including pharmacy giant Merck.

A variant of the Petya ransomware now being dubbed 'NotPetya', it spreads initially by phishing emails and once on a system the ransomware demands $300 in bitcoin. When it's installed on one system behind a firewall it's able to spread rapidly to others on the same network.

Continue reading

Major ransomware attack spreads rapidly across Europe

Ransomware skull

Companies, government departments and airports in the Ukraine have been hit by ransomware this afternoon and the attack now appears to be spreading across Europe.

In Ukraine, government departments, the central bank, a state-run aircraft manufacturer, Kiev airport and the metro network have all been hit. In the UK, the advertising company WPP says its systems have also been taken down, and Danish transport company Maersk reports sites and business units shut down by the attack.

Continue reading

New platform takes the hard work out of acquiring mobile users

Mobile apps

Companies are keen to make use of mobile apps to reach their customers. But the volume of apps available makes it hard to acquire those users. This in turn leads to businesses having to split their efforts across different channels all of which require time consuming management.

Mobile marketing specialist AppScotch wants to make the process easier with the launch of Acquired.io, a centralized platform to manage user acquisition across multiple channels like Snapchat, AdColony, Chartboost and more.

Continue reading

Platform enhancements protect enterprise mobile data without harming usability

mobile cloud enterprise

As companies face ever greater demands for flexible working and BYOD use, it places an added stress on the need for securing mobile data.

Mobile app management specialist Apperian is addressing this with the launch of several enhancements to its platform aimed at increasing the security of enterprise mobile app data, without compromising usability.

Continue reading

Comodo launches free endpoint detection for enterprises

Network security

Hot on the heels of its enterprise threat analysis tool released last month, cyber security specialist Comodo is now launching another free enterprise tool with its endpoint detection and response (EDR) solution.

The fully-featured, enterprise-class, cWatch EDR solution is being made available at no charge to customers. This move enables any size of organization to better detect malware on endpoints, and investigate and respond to security incidents.

Continue reading

New service helps enterprises buy and manage software

Enterprise software

As enterprises grow in size it becomes harder for them to manage their software assets. Systems get decentralized and employees aren't always sure what tools are available, which can lead to the adoption of shadow IT.

Leading systems integrator World Wide Technology (WWT) is launching a new service called EA+ which guides enterprise buyers through the entire process of defining, choosing and implementing a complete software stack.

Continue reading

New platform aims to speed up digital transformation

digital transformation

Companies are increasingly competing to transform their IT infrastructure to take advantage of the cloud, containers and other technologies that offer greater agility.

California-based appOrbit is launching a new application platform that will allow customers to automate the modeling, delivery, and management of enterprise software onto any modern infrastructure.

Continue reading

UK parliament cyber attack highlights the shortcomings of passwords

identity login

As we reported over the weekend the UK parliament's email system was subject to a brute force attack using passwords stolen in the 2012 LinkedIn breach.

Security experts have been quick to point out the inherent weakness in large organizations and government departments relying on passwords to protect highly sensitive data.

Continue reading

Cloud-native workloads gain momentum

Cloud

A new survey shows that 18 percent of organizations now have more than half of their workloads in cloud-native environments. In addition many are moving from on-premises and self-hosting toward shared environments, distributing workloads across multiple providers.

The study by cloud security and network software firm Cohesive Networks also finds 57 percent of respondents say that cloud-native workloads make up at least 20 percent of applications in Infrastructure-as-a-Service (IaaS).

Continue reading

The value of information on the dark web

hacker

We're all familiar with the concept of the dark web where information gained from hacks and data breaches is traded amongst cyber criminals. But just how much are your identity and account credentials worth?

Password manager and digital vault app Keeper Security has produced an infographic looking at how much various pieces of information trade for.

Continue reading

Facts you didn't know about email marketing

infographic header

Despite newer developments like social media and mobile, email remains a powerful and effective marketing tool.

Website tool comparison site WebsiteBuilder has put together an infographic looking at why email marketing works, the techniques used, and more.

Continue reading

UK consumers want an end to misleading 'fibre' broadband advertising

fibre broadband

Using the word 'fibre' to describe broadband services which are partly delivered using copper cable is misleading consumers according to the UK's Advertising Standards Authority (ASA).

Conducted by specialist research agency Opinion Leader, using focus groups and in depth interviews with residential and business broadband users, the research shows that adverts using the word fibre don't enable people to make an informed choice.

Continue reading

Mobile employees are willing to place security above privacy

tablet worker

Given the recent increase of violent incidents around the world, in addition to everyday risks and natural disasters, businesses are naturally concerned about protecting their staff.

New research by enterprise safety application company Everbridge  shows that mobile workers expect that their companies will be able to provide safety information to them should something happen or should they be in the proximity of a serious event. It also shows staff are willing to sacrifice privacy to achieve this.

Continue reading

Load More Articles