Security is a major concern in the IT industry

pixel padlock

Security, and pretty much everything related to security, is the biggest challenge the IT industry is facing nowadays. Those are the results of a new annual research conducted by IT management and innovative security systems provider Shavlik.

The key takeaway point from the report is that 58 percent of IT professionals are more concerned about system security than they were 12 months ago, and we have all the high-profile security breaches that happened recently to thank for that.

Continue reading

IT pros: Storing data in the cloud is safer than on-premise

Cloud storage

IT professionals believe their organization's data is more secure in the cloud than in on-premise machines, a new survey by Evolve IP, entitled 2016 Cloud Adoption suggests.

To be more precise, private clouds are the most popular solution, followed by public clouds, followed by on-premise machines. The survey polled more than 1,080 individuals and has unveiled that 91 percent of all organizations have at least one service in the cloud.

Continue reading

How would a Brexit impact UK's tech sector?

Brexit EU European Union flag UK

With the UK’s EU referendum less than four months away, the UK’s thriving economy of fast-growth, tech, and digital business are weighing up the pros and cons of leaving the EU and what a Brexit would mean for the sector.

Without doubt, the main fear of the UK tech and digital sector, if the result of 23 June is to leave the EU, is the adverse impact this would have on the ability to recruit and retain tech talent from within the EU.

Continue reading

Only half of businesses believe eCommerce maximizes profits

eCommerce

A recent poll into the state of eCommerce has unveiled that half of businesses believe their eCommerce sites help them be as profitable as possible.

The results were released late last week in the 2016 State of the Digital Commerce report, published by Salesforce eCommerce integration company CloudCraze.

Continue reading

German startup has greener data center than Facebook and Google

tree-green-environment

You might think Apple or Google have the greenest datacenters, but it’s actually a German startup called Cloud&Heat that takes the crown.

The company said it managed to realize the lowest energy consumption and has "undercut Google’s optimum value by 40 percent".

Continue reading

One in three laptops will ship with an SSD in 2016

SSD

The average contract price of mainstream PC-Client OEM SSDs in Q1 of 2016 has dropped, a new report by TrendForce’s DRAMeXchange suggests.

MLC-based SSDs, as well as their TLC-based counterparts have seen their prices drop 10-12 percent, and seven-12 percent respectively.

Continue reading

How to successfully start a new IT project

Start Track Run Line

Fear of failure is the most powerful barrier that can stop any professional from getting started on a new project. You have to think over hundreds of details before you make any single step towards your new project implementation. You have to pull the team together, push it towards its goals, work out a strategy, manage the resources, etc. Great efforts are required to fulfill all the conditions. This period is rightfully considered as the most stressful among all the steps of the process.

In order to successfully start up a project, first you have to duly establish communications and project organization. If you have settled these two aspects, difficulties and stressful situations will arise much less frequently all along the way. And even if there is any, they will be solved by synergistic actions with impunity. This is a weighty argument to step over your angst and start your project roadmap planning.

Continue reading

7 things needed for a successful cyber attack

Cyber attack

While it is true that pretty much every network is vulnerable to a cyber attack, it is also the case that attackers must follow a certain formula of actions to compromise these systems. Industry research has shown that, on average, advanced attacks nest inside organizations for 200 days before discovery. That’s a long time for an attacker to stealthily gather private data, monitor communications and map the network.

However, once we understand the steps of a successful cyber attack from an attacker’s point of view, then it is possible to, at the very least, shorten the amount of time it takes to detect it; or mitigate it entirely.

Continue reading

One in five Brits blocks ads

block_ads

An increasing aversion to online ads amongst British adults is posing a threat to online publishers, new figures show.

The latest figures from IAB in conjunction with YouGov reveal that more than one in five British adults, or 22 percent, are now using ad-blockers, representing a four percent rise compared to previous results in October 2015.

Continue reading

Here are the passwords cybercriminals are most likely to use in hacking attempts

Hacker

The security group Rapid7 has released a new report that may prompt some alarm from web users who are heedless when it comes to choosing their online passwords.

Instead of using the passwords that internet users are the most likely to pick, the group took a different route and examined the passwords that cybercriminals are actually trying to use to hack into a number of systems including POS systems, kiosks, and computers.

Continue reading

It's time to get serious about Internet of Things

Internet of Things IoT

The Internet of Things (IoT) is the newest technology mega-trend, according to Goldman Sachs, and it’s easy to see why. Cisco’s IoT study suggests that the number of connected devices is expected to grow to 50 billion by 2020, leading to a global economic impact of $10 trillion.

Connected devices are set to change the very fabric of the world we live and work in. However, the buzz around gadgets such as connected fridges and smart kettles being developed by consumer goods manufacturers have been a distraction from the IoT’s true potential. Indeed, research from Embarcadero Technologies revealed that just 16% of those developing IoT solutions are targeting consumers.

Continue reading

Unified communication tools boost productivity and satisfaction for remote workers

remote work

Cloud unified communications specialist Outsourcery says that the full potential of remote working can only be achieved if strong UC tools are in place. Skype for Business, Slack or Trello, just to name a few, are proven to boost productivity and the possibility of working from virtually anywhere, anytime, has great effects on employee satisfaction.

There have been numerous studies about the benefits of remote working, and all of them came to the same conclusion -- this is something all of us should be implementing. One of those studies was recently published by Lancaster University’s Work Foundation, which suggests that by 2017, more than half of all UK businesses will have employed flexible working at some parts of their organization.

Continue reading

Is MasterCard's 'selfie pay' too much of a security risk?

risk jigsaw piece

Biometrics were the talk of the town last month in Barcelona. As the world’s mobile technology companies gathered for their largest annual event, Mobile World Congress 2016, talk centered firmly around authentication and identity.

Whilst MasterCard announced it will accept selfie photographs and fingerprints as an alternative to passwords when verifying IDs for online payments, security company Vkansee was demonstrating how easy it was to create a spoof finger with clay and a pot of Play-Doh.

Continue reading

Malvertising campaigns now use fingerprinting techniques

Malware

Cyber-criminals are now using fingerprinting techniques in their malvertising campaigns, researchers from security firms Malwarebytes and GeoEdge have reported.

Fingerprinting is an evasion technique in which crooks, through snippets of code, check if the targeted machine is a honeypot set up by malware researchers or an actual machine belonging to a potential victim.

Continue reading

In Apple vs FBI, it's our freedom at stake

Freedom

Ever since it was announced that all iPhones would be encrypted by default with no reasonable way for Apple to unlock them, the FBI has been locked in an ever more acrimonious deadlock with the company. In the latest and most explosive development, the FBI has chosen its battle well: could there be a more emotive subject, or seemingly good reason for Apple to comply, than a demand to decrypt a single phone that belonged to a known terrorist?

By drawing its battle-lines in this way, the FBI achieves two things. On a basic level, it makes Apple look unreasonable for refusing, and therefore makes it easy to paint Apple as the "bad guy" who is preventing the "good guys" from protecting the American people against terrorists. This is a powerful argument, and certainly seems to have persuaded all front-running politicians.

Continue reading

Load More Articles