IT workers will not put up with pirated software

Pirates can upgrade to Windows 10 for free but they won't be supported by Microsoft

Workers in the IT and telecoms industry are more prepared to blow the whistle on illegal activities in the office than any others, a new report suggests.

The report, released by BSA | The Software Alliance, looked at unethical and illegal practices in the office, relating mostly to the use of unlicensed and pirated software.

Continue reading

UEBA is only one piece of the cyber risk management puzzle

Cyber attack

Just like perimeter protection, intrusion detection and access controls, user and entity behavioral analytics ("UEBA") is one piece of the greater cyber risk management puzzle.

UEBA is a method that identifies potential insider threats by detecting people or devices exhibiting unusual behavior. It is the only way to identify potential threats from insider or compromised accounts using legitimate credentials, but trying to run down every instance of unusual behavior without greater context would be like trying to react to every attempted denial of service attack. Is the perceived attack really an attack or is it a false positive? Is it hitting a valued asset? Is that asset vulnerable to the attack? It is time for cyber risk management to be treated like other enterprise operational risks, and not a collection of fragmented activities occurring on the ground.

Continue reading

Dell Venue 8 Pro 5855 is an attractive business tablet [Review]

Dell Venue 8 Pro front

The first generation of Dell’s Venue 8 tablet hit the market back in 2013. In January of this year the company launched the updated version that we have here, which comes with a faster Intel Atom X5 processor and 64-bit Windows 10 as standard.

So, how does this latest version measure up, and is it a good option for business users?

Continue reading

Cyber-criminals run things like a business

Hacking

This cyber-crime thing has gotten to a point where we now really need a digital Batman to fix everything. Security firm Symantec has recently released its Internet Security Threat Report, revealing that cyber-criminals are almost as good as state-sponsored attackers.

They’re highly skilled, well-organized and structured like a business. Here’s what Kevin Haley, director at Symantec Security Response says:

Continue reading

Hackers love Microsoft's PowerShell

powershell

PowerShell, a scripting language inherent to Microsoft operating systems, is largely used to launch cyber-attacks, a new report suggests.

The Unified Threat Research report, released by next-generation endpoint security (NGES) firm Carbon Black, says that 38 percent of incidents reported by Carbon Black partners used PowerShell.

Continue reading

Another quarter, another PC sales drop

decline graph

The PC market has started off 2016 quite poorly according to both Gartner and the IDC. Worldwide shipments have fallen 9.6 percent to 64.8 million units in the first quarter of the year, according to Garner’s estimates. This makes it the first quarter since 2007 that fewer than 65 million PCs have shipped globally.

Lenovo, HP, Dell, Asus and Apple were the top PC manufacturers in Q1 2016 with only Asus and Apple seeing an increase in the number of units shipped. Lenovo and HP have been hit the hardest this quarter with Lenovo shipments down seven percent and HP’s down nine percent.

Continue reading

Box customers can now choose where to store their data

Cloud storage

Online file sharing company Box today announced a new service, allowing businesses to store their cloud data across Europe and Asia.

The service, announced at the Box World Tour Europe, is called Box Zones, and it will allow Box customers to choose whether they want to store their data in Germany, Ireland, Singapore or Japan.

Continue reading

Software-defined data center adoption will grow in 2016

buisness growth graph

Business and IT executives in the UK and the US (62 percent) expect a higher adoption of software-defined data centers (SDDCs) this year, but the projection for faster deployment is slightly higher in the UK (67 percent), compared to the US (64 percent).

Those are the results of a new study conducted by security, compliance and control software company HyTrust, and co-sponsored by Intel. The study takes a look at the issues and trends among businesses migrating to the cloud and software-defined data centre.

Continue reading

Jaguar Land Rover is building an Uber competitor

Jaguar logo

Jaguar Land Rover has announced the launch of a new business, which is basically an Uber competitor. According to the company’s press release, the new technology start-up called InMotion will "build apps and on-demand services to overcome modern travel and transport challenges".

The start-up will soon start testing a couple of different services related to car sharing and car ownership. The testing will take place in North America, Europe and Asia "in the coming months".

Continue reading

BlackBerry will release two mid-range Android phones in 2016

BlackBerry logo

BlackBerry will be moving back into the mid-range smartphone market in order to appeal to enterprise customers who were unable to justify the Priv’s $700 retail price.

John Chen, the company’s CEO, has revealed that BlackBerry is planning to release two mid-range Android smartphones during 2016. One will include a physical keyboard to appease fans of the company’s iconic handsets and the other will sport a full touchscreen to appeal towards consumers who have adopted the modern smartphone form factor.

Continue reading

Contactless payments market to reach $95 billion by 2018

mobile payment

The global value of contactless payment market will reach almost $100 billion by 2018, a new study by market analysts Juniper Research says.

According to the research, entitled Contactless Payment: NFC Handsets, Wearables & Payment Cards 2016 - 2020, the market will hit $95 billion in two years, up from $35 billion in 2015.

Continue reading

Will robotics bring a new dawn for digital transformation in the UK?

robot office worker

Digital transformation has become a popular term in IT circles, fast becoming a priority for organizations across the private and public sectors. The UK government’s shift to digital services and departments has been a longstanding goal over the last three years and continues to be a long-term objective, as success across online services has created more efficiency for both workers and UK citizens. It’s surprising therefore that this year’s Budget, as delivered by George Osborne, was a little light on the technology front and neglected the next chapter in the government’s digital story.

IT and technology sectors are considered to be the foundation points for economic growth and needs to continue to be a priority for organizations to get more done. Productivity plays a crucial role in sustaining this growth, but continues to be an area where the UK falls short. Just recently, the Smith Institute found that while UK workers continue to work longer hours, they are less productive. Academics have questioned whether technology has a role in solving this puzzle.

Continue reading

Brief WordPress database guide for the absolute beginner

WordPress and other CMSs are 'inherently insecure'

WordPress is the finest content management system. Its popularity is proof of that. Websites on WordPress perform great and the platform is easy to use. However, the same cannot be said about managing its database.

If you are a beginner in using this CMS then you might get a migraine or two whenever you try to understand the tons of content available online concerning WordPress databases.

Continue reading

How phone agnostic beacon technology will revolutionize mobile payments

Mobile payments (2)

Mobile payments are gaining momentum in the UK. Apply Pay has an initial monopoly, Google recently announced its UK launch and Samsung is planning to follow suit later this year. Countries across the globe are increasingly moving towards cashless societies thanks to advances in contactless payments. The UK is a leader in contactless payments and, thanks to technology such as Oyster cards, mobile payments are catching on quickly.

Instead of carrying a physical wallet with cash and bank cards, mobile wallets are becoming an increasingly popular method of payment.

Continue reading

5 common data migration mistakes

Data migration

Every once in a while you will have to migrate data from one system to another. This could be for reasons of upgrading your systems or for development of infrastructure. When you want to test your new apps during the development process, you will need to use the data that your business has generated. The test data is really hard to access simply because of the migration work. It is hard for the developers to migrate data from the full sandboxes to the developer sandboxes.

It is only left to the imagination how difficult migrating all of your business’ data can be. There are so many mistakes that you are most likely to make during the data migration process. You should beware of these pitfalls and learn how to avoid them. If you fall into them, you are going to spend a huge amount of money and time repairing the errors that they will cause. Here are some of those challenges.

Continue reading

Load More Articles