People just aren't switching to Windows 11
When Microsoft announced Windows 11 a year ago, it also said it would continue to support Windows 10 until (at least) 2025.
Knowing this, users have largely opted to stay with Windows 10 -- better the devil you know, right? -- and that’s a trend that doesn’t look set to change any time soon.
Microsoft is not investigating Windows 11 2022 Update gaming performance issues, but AMD is
For many people, the release of Windows 11 2022 Update transformed Windows 11 into the operating system it should have been when it was first launched. But for others, the first major update to the OS has been a serious headache. The latest group of users to have cause for complaint are those with certain AMD CPUs.
There are numerous reports from people with systems powered by Ryzen 7000 series processor chips that there are worrying performance issues when gaming. This is not the first time there have been game performance problems in Windows 11, and it is just the latest in a seemingly never-ending list of issues that are being discovered.
IT outages cost over $12,000 a minute
The average cost of an IT Outage is $12,913 per minute according to a new report from AIOps automation specialist BigPanda.
Produced in conjunction with Enterprise Management Associates (EMA), the report also finds a correlation between IT outage costs and the size of an organization, as businesses with more than 20,000 employees lose an average of $25,402 per minute due to outages, translating to more than $1.5 million per hour.
Nudge, nudge, block no more...
Why do people try to circumvent security controls -- for example to access an unapproved SaaS application or cloud service?
New research from Nudge Security suggests it may simply be down to poor user experience of the security process. "We now have evidence to suggest that improving the employee experience of security can actually lead to better security outcomes," says Russell Spitler, CEO and co-founder of Nudge Security.
Enterprises urged to be transparent about employee monitoring
With larger numbers of people working remotely, employers are keen to understand the effect this has on productivity. They're using technology like facial recognition and other tools to monitor the use of apps and gather other information.
However, software adoption platform Pendo is calling on companies to be more transparent with employees about what they do and don’t monitor, and why.
Top tips to create a culture of security (Hint: it's not more training)
Enterprises investing ample time and money in secure email gateways are still seeing fraudulent messages being delivered to their users’ inboxes undetected. In fact, phishing attacks are the origin of most breaches today.
Many organizations have therefore turned towards user security awareness programs; training staff to recognize and avoid the threats that make it into their inboxes. Why then, despite these efforts, have the number of breaches originating from phishing attacks grown every year since 2017?
Linux Lite 6.2 is based on Ubuntu 22.04.1 and available for download right now
Last week, the Linux community was abuzz with excitement over the release of Zorin OS 16.2. That operating system is notable for being designed for Windows switchers. Today, yet another such distribution that focuses on former Windows users is released -- Linux Lite 6.2.
Linux Lite 6.2 is is based on the excellent Ubuntu 22.04.1. The distribution uses Linux kernel 5.15.0-52 and Xfce 4.16 desktop environment. It comes with some excellent software pre-installed, such as Google Chrome 107, GIMP 2.10.30, Thunderbird 202.2.2, VLC 3.0.16, and LibreOffice 7.3.6.2.
What popular culture gets wrong about hacking [Q&A]
It's safe to say that Hollywood and pop culture have not always been kind to the tech and cybersecurity industry.
Throughout the years, movies and TV shows have established a stereotype of how IT and security experts should look, with one of the biggest stereotypes being the representation of a hacker.
New gangs and new tactics mean more victims of ransomware
Ransomware actors have been forming affiliate gangs and using new tactics in order to lure additional victims, according to a new report.
The latest 2022 Bi-Annual Cyber Threat Report from Deep Instinct reveals changes in the world of ransomware gangs, including LockBit, Hive, BlackCat, and Conti.
Mitigating kneejerk digitalization: How to futureproof your eCommerce operation
The last three years have presented particularly unsettled waters for eCommerce leaders to navigate. eCommerce was already transforming, but the pandemic led to a period of massive growth that forced rapid change. At the same time, the fallout from events like Brexit caused operational challenges for many organizations. To cope, eCommerce leaders had to accelerate their digital plans -- meaning many discarded existing strategies and condensed three to four years of digital transformation into a matter of months.
In the short term, this "kneejerk" digitalization allowed businesses to spin up an eCommerce website or app quickly. But in the longer term, many risk being left with a technology stack that is neither futureproof nor fit for purpose. In fact, despite the increase in spend, our research finds businesses lost an average 10 percent in revenue due to downtime and website performance issues in the last two years. That’s the kind of loss that cannot be absorbed more than once.
7 ways eCommerce businesses use alternative data in 2022
Staying competitive in the eCommerce landscape requires agility and flexibility to pivot business strategies and adjust to changing consumer preferences and economic conditions.
Alternative data from websites, desktop/mobile applications, and other online sources gives managers the critical information they need to make effective decisions. While once confined to investors, eCommerce businesses are also adopting alternative data to refine their marketing strategies, improve product offerings, obtain demographic insights, track brand mentions, and improve SEO rankings.
3 tips to get your c-suite on board with an improved supplier data platform
When things are going right in an organization, it’s easy to put supplier data on the back burner. When things go wrong in an organization, most people hesitate to invest in quality supplier data tools. In a world where most of the population has access to technology, it’s easy to assume that the large procurement technologies are working with accurate and up to date supplier information. However, this assumption is wrong, and when procurement technology fails to deliver promised results, supplier data is usually the point of breakdown. Companies of all sizes require better supplier data, and up until now, doing this has been a demanding endeavor without much success. Thankfully, there are tools on the market that can help take the burden of supplier data off the hands of employees and countless working hours working on manual tasks.
Once this conversation starts, those presenting should highlight how poor supplier data has held the company back. Oftentimes, the ROI for better supplier data is hidden within increased compliance on other modules. Adding specific examples of how insufficient supplier data affects the company and sharing how each of those situations could have been avoided can share a viewpoint that has possibly been looked over in the past. Here are three tips to get c -suite leaders on board with improving the company’s supplier data platform.
Microsoft warns that October 2022 security updates can cause problems joining domains in Windows 11 and older
Microsoft is warning users of every from Windows 11 down to Windows 7 that this month's security updates -- in particular the KB5018427 update -- could lead to issues joining a domain. The company says that those affected by the problem will see 0xaac (2732) errors.
Despite flagging the matter in the known issues section of Windows release health, Microsoft says that the behavior is intentional. There is, sadly, no proper fix right now, just some advice and workarounds -- but this should change soon.
How much is your data worth?
The birth of the Internet in the 1990s and its subsequent expansion into every aspect of our lives began a digital revolution that has since refused to slow down. With it has come unimagined functionality, equipping us with instant access to information and communication. Those born before the Digital Enlightenment could never have imagined the power to cast aside unanswered questions with a mere "Google". Gazing across the digital expanse with our infantile stare, we failed to notice another set of eyes looking back at us. Those eyes belong to the world’s largest companies -- Big Tech giants like Facebook and Google -- who are continuously monitoring our movements across the Internet.
Every time we open a website or App, our journeys are tracked and hunted down by a pack of algorithms designed to determine our interests -- products, ideas, and brands that we may feel positively towards. This data is coveted by advertisers; it is the elixir that enhances their powers of persuasion and consumer targeting and, inevitably, sales. This insatiable demand has propelled Big Tech’s rampant profiteering and extraction of consumer data.
Brave new (virtual) world? cyber security considerations in the Metaverse
When the likes of Meta and Microsoft spend billions to kick-start what they see as the next big tech gold rush, it’s worth taking notice. We are, of course, talking about the Metaverse, a prospect so compelling that it prompted Facebook’s corporate rebrand alongside an investment in the region of $10 billion per year.
According to their launch content, the money is going towards the creation of a "hybrid of today’s online social experiences, sometimes expanded into three dimensions or projected into the physical world. It will let you share immersive experiences with other people even when you can’t be together."
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.