BetaNews Staff

Exchange 2010 end of support: How IT pros can leverage Microsoft’s impending deadline into new business

For businesses that still rely on Microsoft Exchange 2010, the time to upgrade is now.

That’s because on Oct. 13, 2020, Microsoft will discontinue support for Exchange 2010. This end-of-support deadline raises a host of potentially disastrous implications for organizations still using this software. There will be no more technical assistance from Microsoft regarding documentation, phone support or general troubleshooting. There will be no more updates for bug fixes or security patches to protect users and data within Exchange 2010, increasing the risk of ransomware and malicious cyberattacks. Finally, running outdated or unsupported software poses risk for being out of compliance, which can present legal issues for certain businesses depending on their industry’s regulation standards.

Continue reading

Cross-Site Request Forgery: How to protect your app from CSRF attacks

The rise of cyber-attacks in the last few years is stunning. The list of targeted organizations includes big name retailers like Macy’s, social sites like Twitter, banks, hospitals, utility companies, governments, military installations… no organization is exempt from this growing threat.

It’s a massive -- and expensive -- problem to fix. The cyber security market is predicted to grow from $150 billion in 2018 to $250 billion by 2023, to help protect apps and businesses from these risks. One of the most common, yet potentially highly dangerous, risks is known as Cross-Site Request Forgery or CSRF.

Continue reading

5G has arrived: What you now need to know

5g smartphone

5G, the latest in mobile technology, strives to make mobile communication better and faster than ever before. However, a challenge 5G has that its predecessors did not, is the amount of devices, not just mobile phones, looking to benefit from the new technology. From smartwatches to internet-connected doorbells to even impending autonomous trucks, each of these devices will be looking to connect to the 5G network.

5G is already in use by several cities across the US with other countries not far behind. In fact, a recently released Ericcson Mobility Report predicted that by the end of 2024, there will be 1.9 billion 5G subscriptions, 35 percent of traffic will be carried by 5G networks and up to 65 percent of the global population could be covered by the technology. So the current questions are not when or what, but who will have access and how secure is it?

Continue reading

How a 0G network can make smart cities using IoT that much smarter

smart city

The IoT has the power to unleash the smart city, providing data-backed insights that can be used to inform sustainability initiatives, enhance operations and influence municipal planning and budgeting. However, the potential of this technology is currently capped by a few critical barriers -- namely, security and cost.

To capitalize on insights derived from the IoT and truly become "smart," resource-strapped cities need a solution that 1) requires lower upfront investment than traditional options, and 2) ensures top-notch security. What is that solution? It could be a 0G network.

Continue reading

WeChat and WhatsApp: How to safely embrace these business essentials

WhatsApp on a phone on a stone background

In today’s digital workplace, taking advantage of digital collaboration and social media tools is a business imperative. With global social media use greater than ever before, and still very much on the rise, it comes as no surprise that it has embedded itself into the workplace. Just like email, social media and instant messaging apps like WeChat and WhatsApp are becoming business essentials.

We’re all familiar with the shadow IT problem and how many IT departments are still unaware of all the applications and channels their employees are downloading and using for business conduct. Today, the social media channels and instant messaging apps needed to communicate with customers and cultivate new business are both easier for an average employee to use and come with much greater risks. This ease of use and popularity also means that several departments within a company like marketing and sales are both vulnerable to and responsible for preventing a variety of threats that they’re simply not equipped to handle.

Continue reading

What the 'Summer of Outages' showed us, and what we can do about it

Summer 2019 was a rough one for the internet, with systemic outages occurring frequently and in quick succession.

Some of these outages were caused by internal errors, others external, but two overriding causes emerged: greater network complexity and the frequency and pace of code change. In aggregate, these outages serve as a painful reminder of just how fragile the internet is, especially as networks and services grow increasingly interconnected and co-reliant.

Continue reading

Ashampoo releases Backup 14 with fuss-free cloud support

Although we understand backing up our data is essential, finding the right backup tool isn’t easy at all. Many are just too complicated, designed to offer every possible option to suit advanced users. Problem is, most people who need a backup tool just need to get things backed up, swiftly.

You could turn to the cloud yourself, and simply use the storage to keep your files secure, but this isn’t the right solution if you want a backup of your system drive. If you suffer from a ransomware attack or a system meltdown, you’d still need to go through the slow process of re-installing Windows and your applications. With this in mind, we recommend making a system backup rather than individual files and folders.

Continue reading

The breach prevention playbook

It seems like every day we hear of a new, high-profile data breach. No longer are we shocked when some major brand is exposed for having lost data at the hands of external bad actors or unwitting internal parties. The question has switched from 'will I be breached?' to 'when will I be breached?'

In football, there’s an adage that the best offense is a good defense. In the battle against cyber attacks, it’s all about choosing the right defense to combat the ever-changing tactics used by bad actors both outside and inside your organization. In order for a team to succeed, it must find and exploit weaknesses in the opposing team’s defense. Cybersecurity is no different.

Continue reading

How the data talent gap risks our AI future

Artificial intelligence

Data workers are at the center of our ambitious targets for universal artificial intelligence adoption as they are the ones responsible for building the technology on a strong and stable foundation. However, there is one significant hurdle that stands between data workers and designing the perfect AI solution; the talent gap. Recent research has revealed that 44 percent of data workers are wasting time every week because they are unsuccessful in their activities, as they face challenges such as lengthy data preparation processes and a lack of collaboration. If organizations can't attack the data and analytical talent gap head-on, they will increasingly be buried under rising data volumes, complexity and an incomplete understanding as to whether their workflows are doing the job they want.

Without a productive workforce, organizations simply cannot proceed to tackle the technical challenges existing in a data-driven industry, such as reversing the inconsistencies and set-backs with data-led AI projects. With the right analytics platform, data capabilities can be put in the hands of the business experts who not only have the context of the problems to solve but the data sources needed to deliver insights quickly and efficiently. By alleviating data workers of some of the mundane, day-to-day tasks that are consistently clogging up their to-do lists, more time can be allocated to pushing through large-scale AI projects.

Continue reading

A primer on migrating SQL Server 2008/2008 R2 databases to the Azure cloud

cloud migration

System and database administrators are now being forced to do something about legacy SQL Server 2008 and 2008 R2 database applications. The reason is the end of Extended Support in July 2019. Extended Support will also end for its common companion Windows Server 2008 and 2008 R2 in January 2020. Upgrading to the latest versions is always an option, of course, but Microsoft is providing an attractive alternative when upgrades are not viable or cannot be cost-justified: Migrate the database to the Azure cloud and get three more years of Extended Security Update support at no additional charge over the standard virtual machine pricing.

This article highlights important considerations for migrating mission-critical legacy SQL Server 2008/R2 databases to the Azure cloud to help administrators make more informed decisions. Among the key considerations is knowing which options are and are not available.

Continue reading

The hidden costs of third-party data breaches -- and how to avoid them

data breach

Recent studies show that third-party data breaches are the most expensive cyber incidents for businesses today. The rise in associated costs has prompted not only security leadership but also executives and boards to pay close attention to the cyber risk that comes with doing business with their biggest vendors and partners. But what many business leaders don’t realize is that the biggest third-party cyber risks can come from the smallest, most seemingly innocuous places.

Take, for example, the Docker Hub cyberattack that took place this past May. While in the grand scheme a given business ecosystem, Docker Hub’s role -- a container used by developers to store image files -- is small, the extent of the damage to its customers was not.

Continue reading

Geekbench 5 arrives, offers new CPU and GPU benchmarks

Primate Labs has announced the release of Geekbench 5.0 for desktop, Android (later this week) and iOS. Geekbench 5 makes huge changes to the way it benchmarks your CPU and GPU, as well as going 64-bit and Windows 10 only.

Other changes include a brand new Dark Mode (confusingly, currently macOS only with iOS 13 to follow, but not for Windows 10) and a 50 percent launch sale if you were considering upgrading.

Continue reading

GDPR and Brexit -- Is your cloud provider ready for the UK 'being treated like a third country'?

The UK government has always maintained that following Brexit, the European Union’s General Data Protection Regulation (GDPR) will be absorbed into UK law. This means that there will be no material changes to the data protection rules that organizations in the UK will need to follow.

However, the French data protection regulator has recently said that in the event of a no-deal Brexit and absence of an adequacy decision, it will treat the UK like any other country that is outside the European Economic Area. In other words, it will treat the UK as a "third country."  It’s likely that other EU country regulators will take this approach too -- and such decisions have legal implications for organizations.

Continue reading

Global growth is driving a fundamental shift in enterprise IT

business globe

Organizations are going global and their infrastructures, thanks to the cloud, are going global as well. Today, mid-sized and even small companies are doing business on a global stage. Whether this global growth takes place by opening new offices or by acquiring them, one of the thorniest challenges is enabling collaboration between them, because it requires sharing large, unstructured data and application files across vast distances. And this task only becomes more complex and difficult as both files and the number of people who need to work with them simultaneously grow larger. This shift toward more companies going global creates a distinct need.

The traditional IT infrastructure -- one in which the corporate data center is located at the headquarters -- is not at all suited for providing collaboration with large files at scale. What's required is a new, disruptive technology category, with platforms that combine the control and performance of network attached storage (NAS) with the unlimited capacity and economy of the cloud.

Continue reading

Four great summer reads for technology executives

As a co-founder of a digital health startup, my daily reading list typically consists of industry news. When I have some downtime, however, I tend to lean towards books that will help me grow as a leader or run our business better.

Below are four books for tech execs that are looking for advice, insight or inspiration this summer:

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.