Majority of CEOs are not engaging with social media

laptop over head

A new study into the social media habits of Fortune 500 CEOs reveals that only 40 percent were active on one of the six major social networks (Twitter, Facebook, Google+, Instagram, LinkedIn and YouTube) in 2016.

The study from business cloud platform Domo and CEO.com also shows that despite 75 chief executive changes occurring in this group in 2016 there's been no significant impact on social media use.

Continue reading

Unsecured IoT devices pose major security risk

Internet of things

New research from the Ponemon Institute and risk assurance body Shared Assesments reveals a high level of concern among organizations about the security of IoT, yet a gap in understanding of how to mitigate and communicate the risks, especially as it relates to third parties.

The study of 553 individuals in industries such as financial services and healthcare reveals that 76 percent say a DDoS attack involving an unsecured IoT device is likely to occur within the next two years.

Continue reading

MicroStrategy enterprise analytics platform comes to AWS

Data analytics

Businesses are collecting more information than ever before, and they need a reliable and accessible way of analyzing it.

Enterprise analytics specialist MicroStrategy is making its business intelligence platform available on AWS, giving users an on-demand solution that can be up and running fast.

Continue reading

Judy malware could affect over 36 million Android devices

mobile-skull-crossbones

Millions of Android devices could have been affected by a new auto-clicking adware program found in apps developed by a Korean company.

Uncovered last week by security company Check Point malicious apps included a series of casual cooking and fashion games under the 'Judy' brand.

Continue reading

WannaCry was most Americans’ first experience of ransomware

Ransomware skull

Although ransomware in some form has been around since 2005, a new survey of 5,000 US consumers reveals that for 57 percent the recent WannaCry attack was their first exposure to how it works.

The study by endpoint security company Carbon Black also shows that seven out of 10 consumers would consider leaving a business if it were hit by ransomware.

Continue reading

Dynamically generated whitelists help stop hackers

endpoint protection

Whitelists have traditionally been used as a way of limiting what users can do, but they're time consuming to maintain and keep up to date.

Florida-based Terra Privacy is addressing this with a system where destinations are continually inserted and removed from the whitelist in real-time, in concert with the user's activities.

Continue reading

83 percent of security staff waste time fixing other IT problems

desktop support

A new survey of security professionals reveals that 83 percent say colleagues in other departments turn to them to fix personal computer problems.

The study by security management company FireMon shows a further 80 percent say this is taking up more than an hour of their working week, which in a year could equate to more than $88,000.

Continue reading

Intelligent bot software can automate up to 80 percent of business processes

robot office worker

Bots are increasingly being used in the automation of business processes, but up to now their capabilities using rule-based Robotic Process Automation (RPA) have tended to be somewhat limited.

But now Automation Anywhere is launching what it calls IQ Bots, software bots capable of studying, learning and mimicking human behavior for intelligent process automation.

Continue reading

Current enterprise networks are not ready for Office 365

Tech suport

Business are keen to take advantage of the advantages offered by Office 365, but a new study reveals that often their networks are not up to handling it.

The survey from cloud security company Zscaler finds that majority of respondents (64 percent) are concerned about the impact Office 365 has on their bandwidth and latency.

Continue reading

One year from GDPR, organizations are struggling to get compliant by the deadline

Data protection

The EU General Data Protection Regulation (GDPR) comes into force on May 25th 2018, but a new survey by data protection company Varonis shows companies are struggling to meet the deadline and are pessimistic about its effects.

The results from 500 IT decision makers in the UK, Germany, France and the US, reveal that 75 percent of organizations say they will struggle to be ready for the deadline.

Continue reading

New digital assistant answers data-related questions

data magnifier

In our private lives we're used to getting answers quickly from digital assistants. So far though this is something that hasn't really taken off in business environments.

That could be about to change as data search specialist Knoema launches Yodatai, a bot that's designed to answer data-related questions.

Continue reading

HP software helps turn old PCs into thin clients

HP Thin Client

As software moves towards the cloud, many companies are opting for thin client architecture on the desktop. But this involves an investment in new hardware that may strain restricted budgets.

HP has used this week's Citrix Synergy event to launch its Thin Client Conversion Suite, allowing old PCs to be turned into a thin client solution at low cost.

Continue reading

Kaspersky launches Threat Intelligence Portal for businesses

unknown threat

Companies have to deal with an increasing number of cyber threats. To allow them to stay in touch with this ever evolving landscape they need up to date intelligence.

With the launch of its Threat Intelligence Portal, Kaspersky Lab is enabling security operation center operators to be able to work more efficiently while facing hundreds and thousands of threat alerts.

Continue reading

Credential stuffing tools help hackers break into accounts

credential hacker

With thousands of stolen account details available for sale on the web, cyber criminals are turning to new methods using them efficiently to try to break into accounts.

According to a new report by risk analysis specialist Digital Shadows, 'credential stuffing' tools are the latest technique being used to automate attempts at account takeover.

Continue reading

Emails beat social media in the battle for consumer engagement

Marketing compass

It's easy to believe that marketing to younger generations would be best conducted via social media, but a new survey shows that email is still a more effective tool.

The study from email marketing brand Campaigner looks at the preferences of online shoppers and revealed insights into how to most effectively market to different consumer generations.

Continue reading

Load More Articles