Latest Technology News

IT outages cost over $12,000 a minute

The average cost of an IT Outage is $12,913 per minute according to a new report from AIOps automation specialist BigPanda.

Produced in conjunction with Enterprise Management Associates (EMA), the report also finds a correlation between IT outage costs and the size of an organization, as businesses with more than 20,000 employees lose an average of $25,402 per minute due to outages, translating to more than $1.5 million per hour.

Continue reading

Nudge, nudge, block no more...

Why do people try to circumvent security controls -- for example to access an unapproved SaaS application or cloud service?

New research from Nudge Security suggests it may simply be down to poor user experience of the security process. "We now have evidence to suggest that improving the employee experience of security can actually lead to better security outcomes," says Russell Spitler, CEO and co-founder of Nudge Security.

Continue reading

Enterprises urged to be transparent about employee monitoring

employee snoop

With larger numbers of people working remotely, employers are keen to understand the effect this has on productivity. They're using technology like facial recognition and other tools to monitor the use of apps and gather other information.

However, software adoption platform Pendo is calling on companies to be more transparent with employees about what they do and don’t monitor, and why.

Continue reading

Top tips to create a culture of security (Hint: it's not more training)

security padlock

Enterprises investing ample time and money in secure email gateways are still seeing fraudulent messages being delivered to their users’ inboxes undetected. In fact, phishing attacks are the origin of most breaches today.

Many organizations have therefore turned towards user security awareness programs; training staff to recognize and avoid the threats that make it into their inboxes. Why then, despite these efforts, have the number of breaches originating from phishing attacks grown every year since 2017?

Continue reading

Linux Lite 6.2 is based on Ubuntu 22.04.1 and available for download right now

Last week, the Linux community was abuzz with excitement over the release of Zorin OS 16.2. That operating system is notable for being designed for Windows switchers. Today, yet another such distribution that focuses on former Windows users is released -- Linux Lite 6.2.

Linux Lite 6.2 is is based on the excellent Ubuntu 22.04.1. The distribution uses Linux kernel 5.15.0-52 and Xfce 4.16 desktop environment. It comes with some excellent software pre-installed, such as Google Chrome 107, GIMP 2.10.30, Thunderbird 202.2.2, VLC 3.0.16, and LibreOffice 7.3.6.2.

Continue reading

What popular culture gets wrong about hacking [Q&A]

hacker

It's safe to say that Hollywood and pop culture have not always been kind to the tech and cybersecurity industry.

Throughout the years, movies and TV shows have established a stereotype of how IT and security experts should look, with one of the biggest stereotypes being the representation of a hacker.

Continue reading

New gangs and new tactics mean more victims of ransomware

ransomware key

Ransomware actors have been forming affiliate gangs and using new tactics in order to lure additional victims, according to a new report.

The latest 2022 Bi-Annual Cyber Threat Report from Deep Instinct reveals changes in the world of ransomware gangs, including LockBit, Hive, BlackCat, and Conti.

Continue reading

Mitigating kneejerk digitalization: How to futureproof your eCommerce operation

eCommerce

The last three years have presented particularly unsettled waters for eCommerce leaders to navigate. eCommerce was already transforming, but the pandemic led to a period of massive growth that forced rapid change. At the same time, the fallout from events like Brexit caused operational challenges for many organizations. To cope, eCommerce leaders had to accelerate their digital plans -- meaning many discarded existing strategies and condensed three to four years of digital transformation into a matter of months.

In the short term, this "kneejerk" digitalization allowed businesses to spin up an eCommerce website or app quickly. But in the longer term, many risk being left with a technology stack that is neither futureproof nor fit for purpose. In fact, despite the increase in spend, our research finds businesses lost an average 10 percent in revenue due to downtime and website performance issues in the last two years. That’s the kind of loss that cannot be absorbed more than once.

Continue reading

7 ways eCommerce businesses use alternative data in 2022

eCommerce

Staying competitive in the eCommerce landscape requires agility and flexibility to pivot business strategies and adjust to changing consumer preferences and economic conditions.

Alternative data from websites, desktop/mobile applications, and other online sources gives managers the critical information they need to make effective decisions. While once confined to investors, eCommerce businesses are also adopting alternative data to refine their marketing strategies, improve product offerings, obtain demographic insights, track brand mentions, and improve SEO rankings.

Continue reading

3 tips to get your c-suite on board with an improved supplier data platform

When things are going right in an organization, it’s easy to put supplier data on the back burner. When things go wrong in an organization, most people hesitate to invest in quality supplier data tools. In a world where most of the population has access to technology, it’s easy to assume that the large procurement technologies are working with accurate and up to date supplier information. However, this assumption is wrong, and when procurement technology fails to deliver promised results, supplier data is usually the point of breakdown. Companies of all sizes require better supplier data, and up until now, doing this has been a demanding endeavor without much success. Thankfully, there are tools on the market that can help take the burden of supplier data off the hands of employees and countless working hours working on manual tasks.

Once this conversation starts, those presenting should highlight how poor supplier data has held the company back. Oftentimes, the ROI for better supplier data is hidden within increased compliance on other modules. Adding specific examples of how insufficient supplier data affects the company and sharing how each of those situations could have been avoided can share a viewpoint that has possibly been looked over in the past. Here are three tips to get c -suite leaders on board with improving the company’s supplier data platform.

Continue reading

Microsoft warns that October 2022 security updates can cause problems joining domains in Windows 11 and older

Microsoft logo on glass building

Microsoft is warning users of every from Windows 11 down to Windows 7 that this month's security updates -- in particular the KB5018427 update -- could lead to issues joining a domain. The company says that those affected by the problem will see 0xaac (2732) errors.

Despite flagging the matter in the known issues section of Windows release health, Microsoft says that the behavior is intentional. There is, sadly, no proper fix right now, just some advice and workarounds -- but this should change soon.

Continue reading

How much is your data worth?

The birth of the Internet in the 1990s and its subsequent expansion into every aspect of our lives began a digital revolution that has since refused to slow down. With it has come unimagined functionality, equipping us with instant access to information and communication. Those born before the Digital Enlightenment could never have imagined the power to cast aside unanswered questions with a mere "Google". Gazing across the digital expanse with our infantile stare, we failed to notice another set of eyes looking back at us. Those eyes belong to the world’s largest companies -- Big Tech giants like Facebook and Google -- who are continuously monitoring our movements across the Internet.

Every time we open a website or App, our journeys are tracked and hunted down by a pack of algorithms designed to determine our interests -- products, ideas, and brands that we may feel positively towards. This data is coveted by advertisers; it is the elixir that enhances their powers of persuasion and consumer targeting and, inevitably, sales. This insatiable demand has propelled Big Tech’s rampant profiteering and extraction of consumer data.

Continue reading

Brave new (virtual) world? cyber security considerations in the Metaverse

When the likes of Meta and Microsoft spend billions to kick-start what they see as the next big tech gold rush, it’s worth taking notice. We are, of course, talking about the Metaverse, a prospect so compelling that it prompted Facebook’s corporate rebrand alongside an investment in the region of $10 billion per year.

According to their launch content, the money is going towards the creation of a "hybrid of today’s online social experiences, sometimes expanded into three dimensions or projected into the physical world. It will let you share immersive experiences with other people even when you can’t be together."

Continue reading

Microsoft issues emergency patch after breaking OneDrive with Windows 10 update

Windows 10 logo on a beach

Windows 10 users who installed Patch Tuesday updates this month have reported that OneDrive and OneDrive for Business is broken.

The problem relates to the KB5018410 update and others released after it. People affected by the issue report app crashes, being unable to sign out of OneDrive, problems with syncing, and various other symptoms. Microsoft acknowledged the problem fairly quickly and has now issued an emergency fix (the KB5020953 update).

Continue reading

Will new CISA guidelines help bolster cyber defenses?

Do you know what IT devices are in your business or on your network right now? If not, it’s not just cybercriminals that might be knocking on your door very soon, but the White House.

Binding Operational Directive 23-01, or BOD 23-01, is a new directive from the U.S. Cybersecurity and Infrastructure Security Agency. CISA has issued a Binding Operational Directive (BOD) that orders federal agencies in the country to keep track of their IT assets and any vulnerabilities on their networks.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.