BetaNews Staff

Firewalls give enterprises a false sense of security

Puzzle key

The recent US elections served up plenty of drama and even more suspense as the campaign entered its final stretch. Pollsters and forecasters crunched data continuously to accurately predict the paths to victory or defeat for both parties.

One of the most publicized concepts was the supposed "blue firewall", a group of states that had consistently voted for the Democratic party in past elections. If the Democrats could hold onto their lead in these states, they’d all but guarantee victory, or so the polling experts predicted…

Continue reading

The 3 ’esses’ of continuous database processes -- Speed, Scale and Simplicity

database

The driving force behind the shifts we’ve seen to Agile, DevOps and Automation, are the business needs of the companies we serve. Doing more with less and delivering it sooner than the competition is what differentiates leading companies from the rest of the pack.

Once a competitor delivers relevant features, which are faster and better quality, you WILL lose market share. In the age of Agile Development, enterprises must be capable of moving rapidly to deal with ever changing requirements, while still providing quality results, all while dealing with limited resources.

Continue reading

Why cybersecurity is an essential part of any enterprise’s security plan

security padlock

Online, hooked up, plugged in and "on the cloud". Whether it is your own personal information such as saved passwords or credit card information or if it is your client's’ personal information, so much of our personal lives can now be easily accessed just with a little Wi-Fi. With our new found accessibility -- everything at the click of a button -- our lives have become all that much more convenient, and our businesses and assets have become all that much more vulnerable. Cybercrime has boomed over the last decade and has become a real problem for businesses, large and small alike.

In the U. S. alone, more than 35,000 computer security incidents happen each day, and that is only the reported attacks. Many more attacks happen but go unreported as businesses aren’t legally required to report some types of attacks. According to PwC’s 2015 US State of Cybercrime Survey, a total of 79 percent of respondents detected a security incident in the past year. The security firm Gemalto estimated that in 2015 alone, more than 700 million data records were compromised, but unfortunately only 37 percent of organizations have implemented a dedicated cyber incident response plan.

Continue reading

6 IoT devices you may not have considered

Internet of things

The Internet of Things, or IoT, seems to be the big headline in tech news lately.

Perhaps you’ve heard of smart remotes, outlets, thermostats or alarm systems, but with all the recent development in this area, there are probably quite a few devices that you haven’t yet considered. Here are six worth adding to your tech radar.

Continue reading

Employees' bad security habits put businesses in danger

Business mobile devices

Employees have poor security practices and use completely unsecured private devices for work, putting their organizations at huge risk of cyber-attacks, a new report by WinMagic says. After polling workers in the UK, the report says more than four in ten (42 percent) use private devices for work, accessing corporate data and e-mail accounts.

More than half (52 percent) use private accounts, including enterprise file sharing services (EFSS), which they use to either store or access corporate files. Only a third (34 percent) say they had never done so. Laptops, smartphones and USB devices are the top three personal devices used for work, and Hotmail, Gmail and Dropbox are the top three online services used by employees.

Continue reading

Optimizing your website for Google's mobile-first index

smartphone browsing

Google have begun rolling out their new mobile-first index. This update will prioritize the mobile version of your website for its ranking signals, falling back on the desktop version when there is no mobile content. In short, this means Google will create and rank its search listings based on the mobile version of content (even for listings that are shown to desktop users).

If you have neglected mobile SEO in the past, it’s now more important than ever that you up your game. Here are 10 tips to future-proof your website, and make sure it succeeds in the new mobile-first index.

Continue reading

Many of UK's NHS trusts continue to rely on Windows XP

Phone shocked

Nine in ten NHS trusts still rely on Windows XP, even though Microsoft stopped supporting the platform with new patches and security fixes a year and a half ago.

This information was released by Citrix, and it is based on a Freedom of Information (FoI) request. Out of 63 trusts Citrix reached out to 43 responded, and 90 percent say they still use Windows XP.

Continue reading

Managing collaboration tools in the enterprise

office-collaboration_contentfullwidth

Most companies have some sort of electronic communications policy. It’s probably been updated ad-hoc over the last few years to include new communications applications, but often lacks the enforcement tools that companies initially used when email first came about. With Facebook looking to take center stage in business communications with Workplace it’s time for organizations to start taking the governance of social and collaboration platforms more seriously.

For heavily regulated industries, such as financial services, the initial driving force behind managing data communications more effectively was compliance with a myriad of acronym loaded legislation from MiFID II (Markets in Financial Instruments Directive II) to MAR (Market Abuse Regulation). But there was a significant upside for firms achieving compliance -- improved security and reduced exposure to internal fraud and litigation.

Continue reading

Artificial intelligence can improve productivity

AI

There is a challenge, both within and out of the workplace, which we have all faced at some point when tackling a task. We have the skills. We have the ability. We know what we need to do, and yet an activity becomes a chore, and a time-consuming burden.

The productivity puzzle is a broad, complex one, but this is undoubtedly one facet of it. Mundane activities without question are often crucial to our day to day, and need to be done. But as humans we need mental stimulation, and the creative applications of our skills to keep us engaged. When these creative opportunities are limited, when occupations risk becoming a cycle of repetitive or dull activity and productivity suffers.

Continue reading

The benefits of cloud-connected spreadsheets

Cloud

This year has been the year of spreadsheet distress. Spreadsheet errors have been blamed for a number of high profile corporate meltdowns including one in the rail franchise bid process for the West Coast mainline that is said to have cost the tax payer around £60m.

Spreadsheet calculations represent up to £38 billion of private sector investment decisions per year and simple errors could be putting billions of pounds at risk. With so many high profile incidents filling the newswires, it may seem unlikely that the spreadsheet is set for a reprieve in 2017. However, new developments in IT are set to allow businesses to cling on to their beloved spreadsheets in 2017 and make them robust enough to satisfy regulators and auditors who have already indicated that they consider them, in their existing state, to be a major potential risk.

Continue reading

Senior leaders holding new tech adoption back

Stop

IT managers in UK organizations believe their senior leaders are intentionally holding back the adoption of new technologies, as they fear that could endanger their position within the company. This is according to a new report by global cloud communications provider 8x8, which surveyed 260 IT managers in UK organizations.

Almost half (45 percent) of IT managers are suspicious senior leaders are holding technology back for reasons of "self-preservation". Same IT managers, a third of them (34 percent), believe their company is making full use of the latest technology. Among C-suites, that percentage is up to almost a half (49 percent).

Continue reading

GDPR predictions for 2017

data protection jigsaw

The European Union’s General Data Protection Regulation (GDPR) is due to come into force on May 25, 2018. This means that IT teams have more than a year to audit their IT systems, check existing customer records and data, and ensure that these systems respect the new set of rules that will be in place.

However, the gap between intentions and actions can be a big one. So what do I predict will happen around GDPR in 2017?

Continue reading

Low-code platforms help businesses quickly create apps

App development smartphone

Although we’ve long since entered the digital age, many organizations remain saddled with legacy IT systems, unable to keep up with the growing and ever-changing demands of the business. Not only that, with resources stretched, many IT departments are left with no choice but to prioritize day-to-day management over business innovation. And yet despite considerable challenges like these, there’s also good news: Low-code platforms are helping to bridge the gap between business needs and IT capabilities.

Low-code platforms give businesses the ability to create the apps they need quickly and simply, taking much of the pressure off IT. The result is secure, reliable apps that meet critical business needs while also ensuring that IT maintains control over key business functions such as data management.

Continue reading

HP announces printer security services

HP logo sign

HP has redesigned the way it protects printers, setting a new industry standard, the company announced in a press release this week.

Its new Secure Managed Print Services (MPS) offer "advanced" security professional services and solutions, as well as expanded core delivery capabilities, which now include a new remote fleet security management service. The company also says it will be pre-configuring its print devices for security.

Continue reading

The big security problems in 2017

looking ahead

If there’s one thing you can say with certainty about cyber-security in 2017, it’s that many companies are going to fail because they are simply not doing the right thing. Fundamental flaws still exist.

Until the technical people lift their heads up and see that security and business are different sides of the same coin, we will inevitably see more damaging attacks. When security people learn to speak in the language of business they will begin to understand just where in the organization they need to apply their expertise.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.