BetaNews Staff

Microsoft launches public preview of Defender Application Guard for Office

Microsoft Office is one of the most popular pieces of software in the world, and the fact that it is so widely used means that it is often targeted for malicious reasons. Just as viruses tend to target Windows rather than macOS or Linux simply because of the sheer number of people using the operating systems, so Office's popularity means that it can often be attacked by malicious files as well.

But Microsoft has a way to offer protection. In addition to the Windows Defender anti-malware tool that is built into Windows, the company has now just released a public preview of Microsoft Defender Application Guard for Office.

Continue reading

Making the case for Trust in Zero Trust

Trust card

As WFH continues and bad actors and cyberthreats thrive, it is more critical than ever before for organizations to have a robust cybersecurity strategy in place. The best way to get started? Leverage Zero Trust.

The chief concern security teams have is keeping threats and attacks out of their organizations. This is why CISOs make significant investments in security controls that protect important vectors like the network, data center, cloud, email and endpoint. This defense-in-depth approach is essential to detect and block threats, but they need to be bolstered with Zero Trust capabilities. Why? Simply put, because attacks and breaches continue to occur. In fact, we know that 64 percent of CISOs believe their organization is more likely to experience a data breach due to COVID-19, and an additional 30 percent of CISOs have seen more attacks on their IT systems as a direct result of COVID-19.

Continue reading

These 5 trends in employee payments show the advance of American businesses

Businesses must constantly adjust to innovation. This year, American companies have incorporated new digital currency trends like never before. From cryptocurrency to AI, these offerings have revolutionized how employee payments operate.

Here are the top five trends in employee payments.

Continue reading

Microsoft launches Expressive Pixels app to help you create animations

Microsoft has launched a new open source app for Windows 10 which has been designed to help users create and share animated content. The company says that the primary target for these animations is small, third-party LED panels but Microsoft Expressive Pixels can also be used to turn creations into animated GIFs which can be used in a variety of ways online.

While animations can be as simple or as complex as you like, the tools you're presented with in the app serve to make the entire creation process as easy as possible. It does not really matter if you have never used an animation tool previously, as Microsoft Expressive Pixels works very much like a standard image editing tool, albeit it one that lets you easily build up a series of frames into a looping  animation.

Continue reading

The many privacy concerns surrounding contact tracing efforts for COVID-19

Contact tracing is being touted as the best way to keep the novel coronavirus under control and avoid yet another country-wide shutdown, at least until a vaccine can be developed. The process has many benefits and was seen as integral to the success in staunching the spread of COVID-19 in a few different cities in Asia. However, there are quite a few hurdles to overcome in the process of implementing successful contact tracing efforts in the United States.

For starters, manual contact tracing requires a large workforce as well as time and money. Apps, on the other hand, can be implemented quickly and for a relatively low cost.This option seems simple and unproblematic enough at first glance but, upon further inspection, poses a threat to the privacy of any and all users. Despite their promise of aiding in the eradication of COVID-19, If left unregulated, contact tracing apps put your personal information at risk and open up potential abuses of that information for decades to come.

Continue reading

Why is the UK government prone to IT disasters?

Back in March, at the height of the nationally imposed lockdown, Health Secretary Matt Hancock promised a solution in the form of a coronavirus tracing app that would see us all out of lockdown safely. Although the much-touted NHSX app was said to be at the heart of the strategy to contain the spread of Covid-19, months later, it was ditched due to security concerns, forcing the Government to change tack to work with tech giants Apple and Google on a new app, shifting its strategy to work with human tracers instead.

With measures easing and life now the most 'normal' it has been for quite some time, the newest iteration of the app is still yet to be released. It is clear that even in the midst of an international health crisis, the public sector has defaulted to looking only to big vendors to provide technical solutions -- and to its own detriment.

Continue reading

How a cloud-based infrastructure can accelerate IT Initiatives

Cloud access

There’s no doubt about it, we are living in a cloud enhanced world. No matter what is happening in life, whether it’s uploading pictures of the family, keeping track of friends on social media, or working remotely, the fact remains that the cloud is a part of our everyday lives in one way or another.

So why are organizations so hesitant to adopt a cloud infrastructure? From speaking with customers, the reason extends across infrastructure, business as well as, let’s face it, an overall new way of thinking about what is the best way to mitigate risk.

Continue reading

Disaster recovery vs. business continuity

disaster plan

IT professionals thinking about disaster recovery configurations for critical SQL Server deployments in Windows environments naturally think in terms of remote sites and recoverability. If the primary datacenter goes offline in a disaster, the organization needs to be able to fail over to a separate datacenter somewhere unaffected by the same disaster.

But disaster recovery and business continuity -- your ability to rapidly resume critical business functions during emergency events -- are not the same. Planning for business continuity is a much more holistic endeavor, and while disaster recovery is an important part of that plan, it is just that: part of the plan. Before you can effectively figure for disaster recovery, there needs to be agreement among your organization’s key stakeholders about which elements of your IT infrastructure are truly mission-critical. Once that’s been agreed upon -- and that’s not always an easy -- you’re in a position to implement a disaster recovery plan that will truly reflect the business continuity goals of the organization.

Continue reading

Sony's latest free app lets you use your digital camera as a webcam

Sony has released a new app which makes it possible to use your regular digital camera as a webcam. The app is called Image Edge Webcam and it is only available for Windows 10 -- it's not clear if Sony intends to release a macOS or Linux version as well.

Sony is not the first company to have released software that transforms digital cameras into webcams recently. It is thought that the move is likely a response to the number of people currently working from home, and the shortage of webcams that this has led to.

Continue reading

Microsoft Inspire key takeaways

Microsoft wrapped its annual Microsoft Inspire 2020 partner conference in July. This is one of the first events of the "big tech" conference season and a good precursor to what trends we can expect to see in 2021. For the first time ever, the global event was 100 percent virtual and available to all attendees at no cost. While Microsoft offered less "net-new" vision at this year’s conference, it strongly reinforced the company’s existing reputation as the dominant technology platform for enabling business results for technology intensive companies globally.

Microsoft spends millions on market research and R&D and based on past events we have found that there is a lot to learn at these events that can add value to technology strategies and plans. Here are four key takeaways from Microsoft Inspire 2020 that capture what Microsoft is up to, the direction the company is taking and often a good indicator of the market over the next 12 months.

Continue reading

Shadow IT in the 'Age of Coronavirus'

Shadow IT

"May you live in interesting times!" This is one of the expressions that has received a lot of airtime in recent months. Clearly as a society we weren’t prepared for a pandemic and all the collateral impact that has resulted. But spare a thought for the IT and security teams that have recently dealt with perhaps the "most interesting" times. Everything they knew and trusted about their environment changed overnight. Think: remote workers, new insider threats and challenges associated with shadow IT.

To be fair, shadow IT was already a problem before the pandemic; our research shows the typical organization is aware of less than 50 percent of the digital assets that exist in their environment. However, in their race to ensure access to data and systems needed while sheltering in place, many end-users (inadvertently perhaps?) added significantly to the shadow IT problem. All of this is occurring as attacks have escalated with adversaries trying to take advantage of the chaos. So, what’s a security team to do about it?

Continue reading

Pro tips for writing better code

Developer at work

Beginning coders often learn quickly that the ability to simply code in a particular language is only half the battle. The ability to write clear and reliable code is a different story -- one that requires knowledge of best practices, attention to detail, and experience with reviewing and editing code to optimize it.

Typically, when code is completed for a certain portion of a project, it gets passed on to another person (or multiple people) for review, revision, and extension. With this being the case, keeping your code clear and logical is essential to allow other team members to work efficiently. So how do you write better code? While certain programming languages have their own unique best practices, there are some general guidelines that you can follow no matter if you write with Python, Ruby, JavaScript, or your own preferred programming language.

Continue reading

Upgrade to Windows 10 Professional for just $39.99 and use Group Policy Editor to tweak and secure your computer

Windows 10 Home offers you a number of personalization, customization and tweaking options, but Windows 10 Professional takes things even further. Thanks to the inclusion of Group Policy Editor, not only can you tweak the hell out of the operating system, but also lock it down for ultimate security.

Group Policy Editor is unique to the Professional edition of Windows 10, and it gives you access to hundreds of settings that are either simply not available in the Home edition, or have to be implemented through awkward registry edits.

Continue reading

LibreOffice 7 lands with a new look, better compatibility, Vulkan acceleration and more

LibreOffice has long offered itself up as a free alternative to Microsoft Office, and today a major new version has been released. LibreOffice 7.0 sees a number of key changes and improvements, not least of which is greatly improved compatibility with Microsoft's suite.

Performance improvements come courtesy of Vulkan GPU-based acceleration which lands in LibreOffice following a switch from Cairo code to Google's Skia Library. For fans of aesthetic change, there is a new look in the Sukapura icon theme -- which is the default theme for macOS users. But these are just a few of the changes in this major update.

Continue reading

How to manage remote teams and keep your company secure

remote work

The shift to remote work has brought on a new set of operational and security challenges for many organizations. A majority of employees will not be returning to the office anytime soon, evidenced by Google’s recent expansion of its work from home (WFH) mandate until July 2021, along with the current state of the world in general. With the future of work now a reality, it is pivotal that organizations learn how to effectively manage remote teams securely.

There are many steps managers and organizations can take to ensure their remote workforce is operating at its best while remaining secure. The key to this whole practice is treating offsite employees the same as in-house by implementing new endpoint management, IT, and security processes that lead to the same end results that were achieved when folks were in the office. But what are the key steps managers should keep in mind to navigate these unchartered waters? What can organizations do to better manage and secure their remote workforces? 

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.