Server sales are up, but revenue is down

rack room servers IT

New research has revealed that despite increased server sales, revenue has continued to decline for the companies responsible for manufacturing and shipping servers worldwide.

The analyst firm IDC brought this information to light in its new Worldwide Quarterly Server Tracker report, which covered server market share and revenue from April to June 2016.

Continue reading

DDoS attacks rarely strike businesses just once

ddos_attack

A company is rarely attacked by a DDoS (distributed denial of service) just once. If it happens once, it will probably happen again, which is why constant preventive measures are required, if a company wants to keep their online services operational.

These are the results of a new report by Kaspersky Lab. Entitled Corporate IT Security Risks 2016, it says that one in six companies were victims of DDoS attacks in the past 12 months. The majority of those attacks were aimed against construction, IT and telecommunications companies.

Continue reading

Salesforce launches Einstein AI platform

salesforce

Salesforce has announced the launch of its new Einstein artificial intelligence (AI) platform that has already been implemented into a number of the company's existing cloud services including Sales Cloud, Service Cloud, Marketing Cloud, Analytics Cloud, App Cloud, Commerce Cloud, Community Cloud and IoT Cloud.

The company has also announced that it has formed a new unit called Salesforce Research that will be exploring deep learning, natural language processing and computer vision. The new unit's aim is to improve Salesforce products and it will be led by the company's chief scientist Richard Socher, who is responsible for co-founding the A.I. startup MetaMind which Salesforce acquired earlier this year.

Continue reading

Ransomware is lucrative: Attacker's profits near $100 million

hack money

Hackers are increasingly targeting healthcare institutions with malware because of their poor cyber-security posture, reliance on legacy IT systems, third-party services and the need to access information as soon as possible in order to deliver great patient care. These are the conclusions released in a new report entitled McAfee Labs Threats Report: September 2016.

It says that hospitals paid almost $100,000 (£75,500) to a specific bitcoin account. In the first half of 2016, one "actor" (it could be a single hacker, but more likely a group) apparently received $121 million in ransomware (189,813 bitcoin), targeting various industries. This actor, according to the report, has had profits of $94 million in the first six months of this year.

Continue reading

Dell announces Latitude 13 3000 Series convertible laptop

Dell Latitude 13 3000

Dell has announced a new hybrid device to help small businesses with tight budgets. The convertible laptop, a Latitude 13 3000 Series 2-in-1 comes with a few important features which budget devices usually lack, like the USB Type-C port or Windows Hello support. The new device, available now on Dell's online store, comes with a starting price of $699 (£530).

"Staying abreast of the latest form factors and solutions is critical in today’s competitive business landscape", wrote Raza Haider in a blog post, announcing the new device. "Specifically, the growth of 2-in-1 devices are revolutionizing the way workers perform day-to-day jobs, from data entry in the field, to visual design, virtual collaboration and any number of other tasks in the office and beyond".

Continue reading

HP launches new ProBook 400 G4 laptops

HP Probook

HP has announced a new series of laptops aimed for small business owners whose employees are style-oriented millennials. Truth be told, if you're a bit older, but would still like a fairly cheap, well-designed laptop, there's nothing stopping you from getting your hands on the new HP ProBook 400 G4 Series.

It comes with the latest seventh-generation Intel Core processor, or seventh-generation A-Series APUs from AMD. Its graphics are powered by the NVIDIA GeForce 930MX, and is paired with 16GB of RAM. It has full HD displays, USB-C ports, and enterprise-grade security. Most importantly, the company significantly improved its battery life, and promises up to 16 hours on a single charge.

Continue reading

European workers vulnerable to social engineering attacks

hacker

Hackers are using social media to gather information about their next victim. They use that information to form sophisticated strategies and deliver advanced threats into networks.

These are the results of a new Blue Coat Systems report, based on a poll of 3,130 workers in various industries in Great Britain, France and Germany. Key takeaway from the report is that user behavior has not improved much since last year. This year, 42 percent of respondents say they only accept friend requests from people they know.

Continue reading

The best of both worlds regarding storage and the cloud

Hybrid Cloud

It might shock you to hear that managing data has never been more difficult than it is today. Data is growing at the speed of light, while IT budgets are shrinking at a similar pace. All of this growth and change is forcing administrators to find more relevant ways to successfully manage and store data. This is no easy task, as there are many regulatory constraints with respect to data retention, and the business value of the data needs to be considered as well.

Those within the IT world likely remember (with fondness) the hierarchical storage management systems (HSM), which have traditionally played a key role in the  information lifecycle management (ILM). Though this was once a reliable and effective way to manage company data, gone are the days when businesses can put full confidence in such a method. The truth of the matter is that things have become much more complicated.

Continue reading

How to plan for and recover from IT emergencies

emergency

Bugs in the software, mistakes in configuration files, even the infamous "fat finger" -- all are responsible for service outages at cloud-based services, data centers, enterprise networks, and any other IT installation, large or small.

There are just too many things that can go wrong. Even if an organization takes care of everything humanly possible, there are still the monkeys. That's a lesson the folks at KenGen, Kenya's electric company, have learned the hard way.

Continue reading

Ads drive most Internet traffic in Europe

ads

With all the buzz and fuss over ad blockers and how they hurt the internet we know today, it's interesting to see just how much traffic these ads actually drive. As it turns out, more than you'd expect. According to a new report by Adobe Digital Insights, more than two thirds (68 percent) of all European traffic is driven by ads. General traffic is also growing. In Europe, more than half (54 percent) of sites grew their traffic in the last three years.

Also, mobile advertising is catching up. Personal advertising, an ads strategy which seems to be working quite nicely, is not as popular in Europe as it is in the States, the same report says. Personalized ads, such as direct emails or social advertising, accounted for 36 percent of new traffic for growing U.S. websites. In Europe, that percentage is at eight.

Continue reading

Time to learn Pig Latin, your devices are listening

Listen

While it’s convenient to turn lights on, lock doors, check humidity levels and monitor energy use in your home with your smartphone, those conveniences come at a cost; even something as seemingly harmless as monitoring calorie burn with a connected device can lead to a breach. Billion dollar companies are having a hard time shielding themselves against hackers, insider threats and data leakage, let alone a single device in your home.

When you register devices and tie them to your email account and address you are opening that information up to be invaded. Additionally, fitness trackers are revealing whether you have met your goals, coffee pots are recording how quickly you go through your favorite brew and thermostats are recording what time of day you are home. All of this information is valuable to companies because it can be sold to other businesses that can customize ads to fit the data you are inadvertently feeding them. Even the FTC has expressed concerns over what the Internet of Things will mean for the future of privacy and security. 

Continue reading

IBM Cloud adds mobile security service

lock key smartphone iPhone

When it comes to corporate IT security, one of the biggest pain points is the mobile device. With almost every employee having one, and many bringing their own, the cyber-attack surface increases dramatically, putting corporate data at huge amounts of risk. Now, IBM is stepping into the game with a service of its own, which aims to protects mobile devices, via IBM Cloud.

The mobile-security-as-a-service, called IBM MaaS360, aims to help IBM’s clients address local data protection standards. It is currently in operation in the US, Germany and Singapore, with France and India already in the works. They will be followed by an "additional eight countries" planned for the next two years. IBM didn’t go into further detail, but we’re hoping the UK will be among them.

Continue reading

Public cloud services market to reach $208.6 billion in 2016

cloud money dollars

Both businesses and consumers have embraced the cloud and Gartner projects that the worldwide public cloud services market will grow by 17.2 percent by the end of this year.

In 2015, the public cloud services market was worth $178 billion. Gartner's projection that it will grow by 17.2 percent in 2016 will bring that number up to $208.6 billion, which is a testament to the way in which the cloud has matured and won over businesses and consumers.

Continue reading

What to do if your Samsung Galaxy Note7 explodes

Note7 fire

The Samsung Galaxy Note7 is a new phone that’s on fire. Literally. The phones are catching on fire, forcing Samsung to make the unprecedented move to recall all of the phones from around the world.

Cell phone batteries occasionally explode because they utilize lithium ion battery packs. The liquid lithium is highly flammable. Modern phones are designed incredibly thin, so there’s only a slight barrier between the positive and negative sides of a battery. If that barrier is punctured, electricity flows in and heats up the flammable lithium. That’s when an explosion occurs.

Continue reading

One in 50 employees could be a malicious insider

hacker

If your company counts 50 people, at least one of them might be a malicious insider, according to new studies. Imperva has released a report which says that 36 percent of surveyed companies suffered a security incident involving malicious insiders in the past year. One in every 50 employees is considered to be a malicious insider.

Another interesting finding is that not all malicious insiders are disgruntled former employees looking to inflict some damage as they close the door on their way out. There are people who are using their position to transform confidential data into a second stream of income. The ramifications of such behavior can be dire -- in one example, a company has had to shut down operations for three weeks, after an attack, and another had its banking system hacked.

Continue reading

Load More Articles