Enterprises should prioritize availability, not backups

Backup key

With today being World Backup Day 2016, many companies are rightly preaching the importance of regular backups. However, Veeam is bucking the trend by saying that -- in the enterprise space -- just backing up is no longer enough.

The company thinks that the most important question for enterprises now should be "are we always available?" and has thus declared today as "World Availability Day". The argument is that for consumers, just having backups in place is sufficient, but enterprises are expected to be up and running 24/7 and downtime is no longer tolerated in today’s fast-paced world.

Continue reading

Foxconn buys Sharp for $3.5 billion

handshake

Last month Sharp announced that Foxconn would be acquiring the company for $6.2 billion. However Foxconn was concerned with the financial future of Sharp and decided to put the deal on hold in order to renegotiate some of the terms.

Now the deal is finally complete and Foxconn has acquired a 66 percent majority stake in Sharp for around $3.5 billion. This is the largest overseas investment in a Japanese company to date and its proposal caused quite a stir in Japan.

Continue reading

Would you like a digital passport on your smartphone?

visa passport

I’m sure most of you will be familiar with the frantic scrabble to find the correct documents at the airport, resulting in a mild heart attack when your passport isn’t where you thought it was. FYI, it’s probably in your back pocket.

Well, this could soon be a thing of the past thanks to a company called De La Rue, which is working on creating digital passports on your smartphone that can be used at airport immigration, making travel an entirely paperless experience.

Continue reading

Businesses want their infrastructure in the cloud, but it will take time

Cloud storage

IT management software firm SolarWinds recently polled 166 IT practitioners, gaining valuable insights into business cloud adoption, security concerns and new and valuable skill sets. The results are quite interesting -- 92 percent said cloud adoption is important to their business, while 27 percent said it was "extremely important".

However, despite cloud technology growing rapidly, businesses are not eager to place their entire infrastructure in it -- 43 percent believe half or more of their infrastructure will be in the cloud within the next three to five years. Sixty percent believe their organization will never fully migrate.

Continue reading

FBI issues warning over MSIL/Samas ransomware

Warning Sign Sky Cloud Cloudy

The FBI has began seeking the assistance of companies in the US to streamline its investigation on an increasing ransomware threat in the country.

The FBI is looking into a strain of ransomware called MSIL/Samas, which has been encrypting data across entire networks rather than single computers, Reuters reports. The ransomware infects machines before encrypting data and asking for money in return of the access.

Continue reading

Samsung Pay arrives in China

Samsung-Pay

Samsung Pay made its debut last year in South Korea in August and then launched in the US in September. At the end of 2015, the company announced that it was bringing its mobile payment service to China.

After a one month beta period, Samsung Pay is now available for local users with a Galaxy S6 edge Plus, Galaxy Note 5, Galaxy S7 or Galaxy S7 edge.

Continue reading

Two key challenges of using open source in the enterprise

open source

A myriad point-tools are involved in every organization's software production. Some of our enterprise customers report using over 50 tools along their pipeline, from code development all the way to releasing into production. For the majority of development organizations today, these tools are comprised of a mix of commercial and open source technologies.

Existing open source tools can be found throughout your software development and operations teams -- from programming languages, infrastructure and technology stacks, development and test tools, project management and bug tracking, source control management, CI, configuration management, and more.

Continue reading

How to mitigate ransomware risks

Ransomware

Ransomware has already caused businesses real trouble this year and recently, security firms have warned about a sudden surge in junk mail messages containing this kind of malware. It seems that organized criminals are now increasingly targeting businesses, which can offer them bigger returns than going after individuals.

The first wave of ransomware started in 2005 and was called Trojan.Gpcoder. Now the security industry (and many unfortunate users) are discovering new variants almost every day. For example, a strain called Locky, discovered only two weeks ago is now the second most prevalent form. Currently, it asks for three Bitcoins (about £885) as payment for the decryption key.

Continue reading

The implications of remote working for GDPR compliance

remote work

Every day across the UK, around 1.5 million professionals work from home; and are more productive, happier in their role, and measurably less stressed, perhaps. At the same time, however, they may be increasing the risk to your sensitive business data.

Since the government has recently given all employees the right to request flexible working, the number of home-workers, and the associated information risk, looks set to increase -- just when the stricter EU General Data Protection Regulations (GDPR) are set to come into force.

Continue reading

7 words to never use in your emails and their replacements

hand stop

It is estimated that in 2014, 191.4 billion emails were sent and received each day with about 108 billion of those being from the business sector. If you are a business owner, there’s a good chance that you’re a part of that ever-growing statistic. Emails are becoming one of the most common forms of communication between businesses and clients, so it makes sense that we brush up on our etiquette every so often.

With the knowledge that a few choice words could make or break your chances at making a potential connection or client, it’s safe to assume that just about everyone wants to avoid these costly word mistakes.

Continue reading

IT budgets will mostly go towards buying mobile devices, security

Business mobile devices

IT budgets for businesses in the US will be mostly spent on security, and mobile devices allowing employees remote working, a new survey has shown.

According to a new survey by Wakefield, 30 percent of US businesses will spend most of their IT budgets on network and data security, and 28 percent will spend it on mobile devices allowing employees to work remotely.

Continue reading

The benefits and challenges of building a hybrid cloud

Hybrid Cloud

The growth of cloud computing over the last decade has been unprecedented. From a relatively unheard-of concept, the cloud has become a key part of the boardroom conversation amongst CIOs and IT directors at companies across industries, sizes, and revenues for its promise of organizational transformation.

A large amount of enterprises have already built their own private cloud networks, hosting essential applications and providing anywhere, anytime access to mission critical data for employees scattered across the world. In many cases, the effort pays off, resulting in increased productivity, reduced costs and ease of access.

Continue reading

Using the 'physical web' to boost in-store sales

Geo-location marketing shopping

Bricks and mortar businesses have been in the dark. They were blinkered to what was happening within their locations, and how customers were interacting with the space. There was huge potential to fail to engage with customers effectively, repeating marketing mistakes continuously.

Meanwhile, their online counterparts had a huge advantage -- website analytics. It gave them an expanse of data sources to explore. If they asked the right questions and found the answers, they could understand every step of their customers’ journeys. They could continually optimize their offer -- and give customers what they wanted.

Continue reading

The importance of in-store mobile technology

student coffee cafe laptop woman

Over the last decade we’ve seen a significant increase in mobile technology and it is now becoming the heart of customer experience; forcing retailers to figure out how the digital and physical relationships can work together.

Retailers must now decide whether to equip their personnel with mobile devices, introduce more self-service kiosks or expand mobile technology even further; all in the aid of delivering a personalized approach and improving the in-store experience for shoppers.

Continue reading

The dangers of using public Wi-Fi hotspots

Public wi-fi

There are hundreds of thousands of free public Wi-Fi spots throughout the UK. Widespread connectivity and free accessibility are two appealing features that tempt users to open up their devices for on-the-go convenience.

However, uncontrolled access to public Wi-Fi hotspots and robust mobile security often conflict with one another. Cyber-criminals now find it increasingly easy to attack public Wi-Fi networks using Man-in-the-Middle (MitM) techniques which allow the attacker to clearly view all information transmitted across networks.

Continue reading

Load More Articles