BetaNews Staff

How to ensure communication security when working from home

With millions working from home for the first time thanks to coronavirus, many businesses have had to act quickly in order to facilitate remote communication which may never have been an option before the virus struck. Though these businesses may have already made the switch to internet-hosted calls and communications at work, providing access to all employees from home will not have been common. One of the most common concerns of using internet communication software is its security capacity, so how secure is it? And how can business leaders ensure the highest levels of safety for a remote workforce?

From news stories of vulnerable video conferencing software to threats from less secure home networks, navigating the security issues of a remote workforce may be a trial by fire for businesses attempting to maintain levels of normality during this time. Therefore, it will be important to understand both the benefits and drawbacks of internet communications to know what to look out for and how to inform staff of the best practice.

Continue reading

Can AI bring back productivity that other technology has squandered?

intelligence

How do you know you had a good day at work? If you did, how would your boss know?

These questions are especially important in the current environment where so many people are working from home without the insight that watercooler discussions, office pop-ins and other face-to-face contact would typically provide. Our reliance on technology to get work done has been growing for decades, but work-from-home orders due to the coronavirus pandemic have accelerated that reliance even more.

Continue reading

6 tips to maximize security while working from home

Cyberattacks are on the rise as cybercriminals look to exploit the current COVID-19 pandemic which has left an unprecedented amount of people working from home which is highly unlike any normal working from home situation. As many begin to adjust to life away from the office, it is critical that people remain vigilant and have the knowledge of basic cybersecurity practices which can be easily implemented while working remotely.

Here are some of our top tips for how you can remain digitally secure while working from home and reduce your risk of becoming a victim of a cybercrime.

Continue reading

EssentialPIM 9.0 is here with added dark mode, new tagging options and additional mail rule options

A good personal information manager (PIM) is a great way to stay on top of the information you need on a daily basis, such as email, calendar, tasks and notes. EssentialPIM has long offered an approachable and powerful way to access such information, and now EssentialPIM 9.0 has been released with a range of new features.

From an aesthetic point of view, there's a new dark mode option, but this is a significant release which is about much more than just a new coat of paint. There are also new rules to help you manage an unruly inbox, bookmark-style anchors to make it easier to navigate notes, and a powerful tagging system that not only lets you organize a range of different data together, but also to quickly jump to it using keyboard shortcuts.

Continue reading

Cross-platform torrent client Transmission 3.00 arrives after two years of development

BitTorrent clients are plentiful, but many leave a lot to be desired. While numerous clients have fallen by the wayside, there are some names that have stuck around. One such client is Transmission, and after a two year wait, we're finally being treated to a new version.

Transmission 3.00 is a significant release, and there are numerous new options and features in the latest version of the open source, cross-platform client. Improvements have been made to the client across all platform -- Windows, macOS, Linux and the web -- including the option of allowing the RPC server to listen on an IPv6 address.

Continue reading

When your barista is a robot

As the name implies, a robot arm is identical to a human arm not only in appearance but also in its uses and functions. To carry out movements like that of a hand, the robot arm also has an end effector.

These machines are usually used for cutting, processing, and other industrial applications. But have you thought about combining it with a brewing device? This transforms the normal robot arm into a unique robot barista.

Continue reading

How COVID-19 has accelerated the move from a 'cloud first' to a 'cloud now' approach

Cloud visibilty

Recent market data from Synergy Research Group via CRN suggests 2019 was a milestone for IT and that for the first time ever, enterprises are spending more money annually on cloud infrastructure services than on data center hardware and software. For example, total spend on cloud infrastructure services reached $97 billion, up 38 percent year over year, whereas total spend on data center hardware and software hit $93 billion in 2019, an increase of only 1 percent compared to 2018.

This means that many companies that have historically owned, maintained, and managed their own IT operations in their own data center are now evolving how they support their business operations by transforming their IT to cloud.

Continue reading

Securing the cloud for healthcare

The Cloud is a $200 billion business that analyst firm IDC expects to nearly double in valuation by 2022. It enables collaborative productivity apps, on-demand entertainment, and promises much needed advances in telemedicine. But all this potential will come crashing to a halt unless we take seriously the corresponding rise of cloud-based cybersecurity threats. The increase we have seen in cyber-attacks seeking cloud-based data is worrisome and the potential for crippling the healthcare industry is high especially given the current global climate and their dependency on cloud-based services.

Recent warnings and actual attacks are a prominent example of the active and persistent threats to our global healthcare networks, economy, and connected infrastructure. Organizations involved in national and international COVID-19 responses are being actively targeted by hacking teams and threat groups. This is according to a recent alert from DHS ‘s Cybersecurity and Infrastructure Agency (CISA) Europe’s largest hospital.  In addition, the Czech Republic warned of expected cyberattacks targeting healthcare systems designed to damage or destroy computers in critical healthcare infrastructure.  And last month, Interpol announced that its Cybercrime Threat Response team had detected a significant increase in ransomware extortion schemes against healthcare organizations and infrastructures.  The list goes on…

Continue reading

Awareness of the digital accessibility divide: A silver lining of The COVID-19 crisis?

Most of us have adapted quickly -- perhaps seamlessly -- to increased reliance on digital devices for the day-to-day processes of life and business. For many people with disabilities however, it’s a very different picture.

Today is Global Accessibility Awareness Day, so for a few minutes let’s put ourselves in the place of a person with a visual, hearing, motor or cognitive disability. With many physical places of business now closed, essential activities like banking, shopping and working must be solely conducted online or at great personal peril.

Continue reading

3 reasons passwords need to die in 2020

Written passwords

The headlines still haunt me.

May 7, 2020 marked "World Password Day," the kitschy, but pertinent annual reminder to clean up the logins that control access to our modern lives. For days, titles like "Time to Prioritize Passwords" and "Tips for Managing Your Passwords" popped up in newsfeeds and tips from experts flooded in. "Vigilantly change your passwords" and "use a different password for each account" they said, as if new configurations of characters and symbols were cures rather than curbs to cyberattacks. The problem is passwords don’t protect us anymore. Gartner predicts that by 2022, 60 percent of large businesses and nearly all medium-sized companies will have cut their dependence on passwords by half. But with COVID-19 requiring many of us to work from home in insecure environments, 60 percent is not enough, and 2022 is too late. 

Continue reading

IoT: With great convenience comes even greater risk

IoT grid

IoT devices are skyrocketing in popularity -- almost everything can connect to the internet these days. You may have some of these in your home or business and not even realize it. Smart bulbs that sync with home management apps, IP camera systems, weather displays on smart refrigerators, smart thermostat -- basically all of the devices you would not expect to have an internet connection that do. This is highlighted further by the ongoing coronavirus pandemic now that the workforce is 100 percent remote and IT teams had to quickly enable remote work, all while ensuring security.

IoT devices make our lives a little easier and more convenient, but they come at a price as they provide new attack vectors for savvy cyber attackers. Gartner forecasts that there will be over 20.4 billion connected IoT devices in 2020, giving those attackers a lot of targets to choose from. On top of that, recent research indicated that IoT device hacks have increased by 300 percent, furthering the point that unprepared home network devices are easy targets for cybercriminals.

Continue reading

How to use AI to drive targeted customer acquisition in 2020

intelligence

Today, 80 percent of digital marketers feel growing pressure to meet customer acquisition and revenue goals, saying they feel like they are "running on a never-ending hamster wheel."

And that’s true: You may be overstretching your marketing muscle to get your customers to find you through organic search -- but it’s something you have little control over and is reactive. Traditional advertising media is becoming more obsolete, but the problem is that many businesses still don’t realize how technology can reverse that. Take the example of the automotive industry, where customer acquisition is still very reactive. The majority of customers still find the auto dealer and brand, and not the other way round. A recent study found that car dealers' first point of contact with more than half of their buyers is when they physically walk into the dealership, essentially leaving it to chance that their dealership or brand gets picked for a walk-in. There’s no doubt that companies across the board are rapidly experimenting with adopting artificial intelligence (AI) in various departments, including business performance and automating the human tasks, the low-hanging fruits. But it’s time you thought about bringing it in to enhance your customer acquisition strategy.

Continue reading

Web accessibility platform accessiBe secures $12 million to make the entire web accessible

Web accessibility platform accessiBe announced that it has secured funding from global investment firm K1 Investment Management, LLC. The $12 million capital will be used to help the company grow its market in North America and improve its services for its customers and partners.

The internet remains largely inaccessible to people with disabilities. Up to 98 percent of websites fail to fully apply the necessary standards to ensure that those afflicted by impairments are still able to use and navigate websites. This is despite the fact that the Web Content Accessibility Guidelines (WCAG) and laws such as the Americans with Disabilities Act have already been around for more than a decade, both of which identify what websites need to become accessible.

Continue reading

5 phishing attack methods every business should know in 2020

Phishing

There was a time when the main tech-based worry for any business were viruses. Large companies spent thousands of dollars on antivirus software, while those that didn’t paid the price when one of their client machines became infected, crippling their infrastructure and effectively grinding the whole operation to a screeching halt. In the modern era, pretty much every computer terminal you can buy comes with some sort of virus protection, which tends to do a pretty decent job so long as the security patches are installed promptly on all machines across the business.

In addition, companies are also taking advantage of the internet. Many now have various components of their infrastructure such as workstations, servers, and web applications that are connected online. Hackers try to breach company networks by exploiting these components. Fortunately, their attempts are now easily thwarted by the use of web application firewalls (WAF) which can block malicious traffic and unauthorized requests sent to these devices.

Continue reading

FBackup 8.7 released with backup plugin support for iTunes and Spotify -- Backup4All 8.7 Professional is 67% off MSRP

We're constantly told to back up our data -- but if we're honest, very few of us actually get around to doing so. There are a number of reasons for this, the first of which can be not knowing quite what needs backing up. The next obstacle is knowing how to do it, which tool to use, and how much it will cost you.

Then, of course, there is the question of carving out time to get a backup configured and schedule updates so you don't have to think about it again. It's little wonder that so many people simply don't bother. To make things easier, FBackup 8.7 is now available and is our recommended tool for backing up your most important data.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.