How contact centers have become a prime target for hackers [Q&A]
With growing security threats and compliance being taken seriously, companies are more aware than ever of the need to protect their data.
This means hackers must work harder to try to steal information and contact centers are in the front line. We spoke to Ben Rafferty, chief innovation officer at security and compliance specialist Semafone to find out how contact centers are under threat and what can be done to protect them.
Zoho launches next generation Office Suite with added AI
Popular cloud-based office suite Zoho is launching a new version of its software complete with AI-powered personal assistant.
Zoho Office is made up of four cloud-based productivity software applications -- Zoho Writer, Zoho Sheet, Zoho Show, and Zoho Notebook. These are fully integrated with each other and with Zoho Mail the company’s messaging app Cliq.
Only one in three organizations is confident of avoiding a data breach
A majority of organizations are not confident in their ability to avoid major data breaches according to a new study.
The report for breach avoidance company Balbix, based on research from the Ponemon Institute, shows that 68 percent feel their staffing is not adequate for a strong cybersecurity posture and only 15 percent say their patching efforts are highly effective.
Data integration is the number one challenge for enterprises
Almost half of respondents to a new survey identify ever-increasing disparate data sources as a major pain point.
The study from development technology specialist Progress also finds 44 percent of respondents are worried about integrating cloud data with on-premises data, making real-time hybrid connectivity critical.
Three stages of risk-based vulnerability management: Crawl, Walk, Run
The market is saturated with hundreds of security products, and companies spend billions of dollars each year on cybersecurity spend (expected to top $100 billion by 2020). Yet breaches and hacks are still in the news every day, because cybersecurity is such a tough problem. Organizations have a massive and exponentially growing attack surface -- there are a myriad of ways by which networks can be breached. Analyzing and transforming the enterprise cybersecurity posture is not a human-scale problem anymore. An enterprise vulnerability management program is the cornerstone for any modern cybersecurity initiative and helps security teams proactively understand and improve their security posture to avoid breaches and protect the business from brand and reputation damage, as well as loss of customer trust.
Understanding and acting on data output from your vulnerability assessment scanner is a critical component of your vulnerability management program. However, if your scanner is identifying vulnerabilities by the thousands every time a scan completes, your team will soon be left overwhelmed and struggling with how to proceed. Failure to address vulnerabilities in a timely manner due to the high volume of alerts is very problematic. And of course, most of these vulnerabilities are bogus or merely theoretical. Traditional vulnerability management programs leave you drowning in data, but starving for insights.
Could 'Do Not Disturb' be the key to employees’ digital wellbeing and CSR?
Employee happiness; it’s a pretty important thing these days. It isn’t just a fluffy, nice-to-have feeling for employees. It’s a business necessity.
Without it, employees don’t feel a strong connection to their employer’s mission and values. And when that happens, it means employees are disillusioned, don’t feel supported and recognised for good work, and are less likely to stick it out long-term with their employers. That’s what I call a recipe for turnover disaster. But in reverse, when employees feel strong mentally and feel like they enjoy working for their employer, it improves morale.
Machine learning tool helps prioritize vulnerabilities
One of the keys to keeping systems secure is to effectively prioritize vulnerabilities. Given the volume, with 16,500 new vulnerabilities disclosed in 2018 alone, though this is a tough task.
To help businesses focus on the highest risks, Tenable is launching a new Predictive Prioritization tool that uses machine learning to zoom in on the three percent of vulnerabilities with the greatest likelihood of being exploited in the next 28 days.
New cloud app helps businesses understand their IT environments
As systems become more complex it can be hard for enterprises to understand their IT environment, which presents a problem for operations and security teams.
Cloud-based security specialist Qualys is launching a new IT Asset Inventory cloud application to provide quick analysis of complex and interconnected global IT environments, and help collaboration on security remediation efforts.
Microsoft continues to beat Google in battle of the enterprise apps
A new survey from identity platform Okta shows that 67 percent of knowledge workers prefer Microsoft Word over Google Docs, while only 15 percent report the opposite.
Another 16 percent identify Google Docs as a top-three most frustrating app. When it comes to email, 49 percent prefer Microsoft Outlook over Gmail, while 35 percent report the opposite.
Two-thirds of organizations bypass IT for digital transformation projects
According to a new report released by The Economist Intelligence Unit and sponsored by BMC software, 66 percent of organizations bypass IT when buying new technologies for digital transformation.
But despite this, 43 percent of firms still hold IT accountable if something goes wrong with their digital transformation initiatives.
Microsoft reveals pricing for Windows 7 Extended Security Updates
Windows 7 may be creakingly old now, but it is still widely used. While large numbers of consumers have migrated to Windows 10, there are still plenty of organizations that are clinging to the old operating system out of a sense of nostalgia, an unwillingness to upgrade, lack of funds for upgrading, or legacy requirements.
As of January 14, 2020, Microsoft will no longer be providing support or security updates for Windows 7 -- apart from for those who are willing to pay for it. The company is offering up to three years of Windows 7 Extended Security Updates (ESU), and pricing has just been revealed.
Bill Belichick installed an Event-Driven Architecture, so should you
Widely regarded as the greatest football coach of all time (much to the chagrin of NFL fans outside of New England), Bill Belichick has now 'enjoyed' six Super Bowls as coach of the Pats (plus two more as Defensive Coordinator for the Giants) and led the Pats to three-fourths of AFC Championship games (including a record-setting 8 consecutive trips).
But what’s really made Belichick great is his belief that you shouldn’t just "run what we run," but that you should game-plan specifically for each opponent. This means the strategies and actions they employ are based on what they expect each specific opponent to do. And if things aren’t working as planned, they switch it up and adapt (Belichick is the master of in-game adjustments). Here’s a few examples:
Are 'pop-up' SOCs the answer to protect major events? [Q&A]
Increasingly high profile one-off events like sports tournaments and elections are becoming the target of hackers.
Protecting these is tough because even if the hosts have a sound security infrastructure for day-to-day operations, they often don't have the resources necessary to lock down a large scale, high-profile event which requires additional physical and cybersecurity to protect against disruption, revenue loss or other irreversible damage.
4 reasons private equity firms should be concerned about digital transformation
Every business by now is familiar with the term 'digital transformation', and for good reason. When done right, digital transformation has the potential to revolutionize the customer experience; drive data-based insights; encourage collaboration across departments; increase agility and innovation; update skillsets and knowledge; consolidate processes and operations; and create incredible returns on investment.
So why aren’t more people concerned about it?
CISOs must change their outlook or lose their jobs
Chief information security officers (CISOs) are now involved in 90 percent of significant business decisions, but just 25 percent of business executives see CISOs as proactively enabling digital transformation -- which is a key goal for 89 percent of organizations.
These are among the findings of a new study by IDC sponsored by Capgemini but which also shows 15 percent still believe information security is a blocker of innovation.
Recent Headlines
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.