Archiving partnership aids financial services compliance

Archive

For the financial services industry, compliance is a major issue as there's a need to archive communication from many different sources.

To provide a solution to the industry's unique demands, financial services software specialist IPC Systems has announced a collaboration with communications compliance and archiving company Actiance. This will use Actiance's Alcatraz solution to offer IPC's financial services customers a holistic archival solution across a range of digital communications, including voice.

Continue reading

Microsoft Teams vs Slack -- how do they compare?

Teams v slack header

Last week Microsoft rolled out its Teams collaboration app to Office 365 users. Teams has been widely billed as a competitor for Slack, but how do the two big players in this space measure up against each other?

Internet marketing company TechWyse has put together an infographic giving an easy-to-follow overview of how the features of Teams and Slack compare. Slack is the more expensive option for paid users, but it does offer a Freemium model which Teams lacks.

Continue reading

How big data is being used and what's holding it back

big data cube

Big data has been something of a buzz word in IT and in enterprises in recent years, but while many people are enthusiastic about its potential there are fewer examples of its tangible benefits.

Canadian printing company Colourfast has produced an infographic looking at what benefits big data is actually bringing to companies.

Continue reading

Storm Stella leads to spike in malware infections

umbrella-storm

Earlier this week, Storm Stella not only left parts of the North East US with up to three feet of snow, it led to an increase in malware infections too.

According to data released by Enigma Software, the company behind SpyHunter, infections jumped by between 15 and 90 percent in some areas hit hard by the storm.

Continue reading

The security threats that businesses will face in 2019

crystall ball

The cyber security landscape is a constantly evolving one. The organizations best able to cope with it are the ones that can look beyond today's threats to those they'll face in future.

London-based Independent security body the Information Security Forum has released its Threat Horizon 2019 report which is developed for business leaders who need to rapidly grasp emerging information security threats and assess the potential business impacts.

Continue reading

Malware hidden deeper in installer packages to evade detection

Threat

Microsoft's Malware Protection Center has identified a new wave of NSIS (Nullsoft Scriptable Install System) installers that seek to evade detection by burying malware deeper in the code.

The changes have been seen in installers that drop ransomware like Cerber, Locky, and others. The installers try to look as normal as possible by incorporating non-malicious components that usually appear in legitimate installers.

Continue reading

People who identify as 'tech savvy' are 18 percent more likely to suffer ID theft

Identity theft

Identity theft is a growing problem, but who is falling victim to online ID fraud, why is it still happening, and how can you protect yourself?

IT training specialist CBT Nuggets has carried out some research among more than 2,000 people in the US to find out, with some intriguing results.

Continue reading

Businesses deploy sensitive data to new environments without adequate security

Cloud security

According to a new report, 93 percent of enterprises will use sensitive data in advanced technology environments (such as cloud, SaaS, big data, IoT and container) this year.

But 63 percent of those respondents also believe their organizations are deploying these technologies ahead of having appropriate data security solutions in place. These are the findings of the latest Data Threat Report from Thales e-Security and 451 Research.

Continue reading

Women still underrepresented in information security

Female developers

Women make up only 11 percent of the cyber security workforce according to the latest report from the Center for Cyber Safety and Education -- formerly the (ISC)² Foundation -- and the Executive Women's Forum (EWF).

The survey of more than 19,000 participants around the world finds that women have higher levels of education than men, with 51 percent holding a master’s degree or higher, compared to 45 percent of men.

Continue reading

The challenges of adopting DevOps

DevOps

DevOps has become enormously popular as a means of speeding up tech projects, but a new study reveals the challenges that organizations face in adopting it.

The survey from sandbox specialist Quali finds the top barriers to DevOps success include the respondent's company culture (14 percent), challenges of testing automation (13 percent), legacy systems (12 percent), application complexity (11 percent), and budget constraints (11 percent).

Continue reading

Sleeper accounts wait for at least a week before launching cyber attacks

Sleep

Sleeper cell accounts which appear normal and hide among normal users, waiting for long periods of time to age the account before striking, are the latest technique being used by cyber attackers.

These accounts are often used for testing or carrying out the attack in stages, according to fraud and financial crime detection service DataVisor.

Continue reading

Secret Double Octopus eliminates enterprise passwords

security flaw

No, we're not talking about the James Bond of the cephalopod world getting his tentacles on your security. Secret Double Octopus is an intriguingly named Israeli company that’s launching a new authenticator app for enterprises.

Authentication systems have traditionally relied on a single layer of protection, such as SMS, tokens, push notifications and biometrics. Secret Double Octopus uses a multi-shield authentication process for users to verify or reject a login attempt, payment or transaction.

Continue reading

Businesses deploy technology in search of the 'continuous enterprise'

DevOps

Today's technology companies are focused on delivering new ideas fast, resulting in systems being rebuilt around the needs of developers, and companies piloting and adopting new technologies like microservices and containers in search of speed.

Automation specialist Chef Software has released the results of a survey of over 1,500 IT practitioners and decision-makers across app, infrastructure, security and cross-functional teams. The findings show technology rollout increasing faster than headcount.

Continue reading

Microsoft Teams rolls out to Office 365 users around the world

Microsoft Teams

As we reported last week, Microsoft is today launching its own business collaboration tool in an effort to fend off the challenge from Slack.

Teams is now available to Office 365 users in 181 markets and 19 languages. Where Teams is likely to score over its competitors is in its close integration with other Office products and with Skype for Business.

Continue reading

IT security pros expect a rise in Industrial Internet of Things attacks

Internet of things

The Industrial Internet of Things (IIoT) is used in many businesses, including critical infrastructure sectors such as energy, utilities, government, healthcare and finance. No surprise then that it's a likely target for attack.

A new survey from security and compliance specialist Tripwire of more than 400 IT security professionals shows that 96 percent expect to see an increase in security attacks on the IIoT in 2017.

Continue reading

Load More Articles