Half of IT professionals more concerned about internal threats than external ones

Threat

Hackers and cyber criminals are often seen as the biggest threat to company IT systems, but a report from behavioral firewall company Preempt shows that insiders, including careless or naive employees, are now viewed as an equally important problem.

The survey carried out for Preempt by Dimensional Research finds that 49 percent of IT security professionals surveyed are more concerned about internal threats than external threats.

Continue reading

Most enterprise attempts at email authentication fail

email-lock

A new study shows that 75 percent of large businesses attempting implementation of the DMARC email authentication standard are not presently capable of using it to block unauthorized email.

This means that enterprises are putting their own security, compliance, and brand protection at risk. Automated mail authentication specialist ValiMail looked at email authentication policies for more than a million business domain names, including those of Fortune 1000, NASDAQ 100, and FTSE 100 businesses.

Continue reading

70 percent of smaller IT businesses don't see Brexit as a threat

Brexit flags

Despite the widespread predictions of Armageddon that preceded June's vote on the UK leaving the European Union, new research reveals that a majority of companies in IT and computing don't see Brexit as a threat.

The research by commercial insurer RSA shows that 70 percent of small and medium businesses in IT and computing don't see Brexit as a risk. Of those surveyed 43 percent say that leaving the EU will have no impact at all, and 27 percent say it will have a positive effect on their business.

Continue reading

The 'age of automation' can benefit the security landscape

Business security

Artificial intelligence (AI), machine learning and automation are technology trends dominating discussions in many different industries at the moment and cyber security is no exception.

As cyber criminals become more advanced and the threat landscape continues to develop, businesses are looking to new technologies that can help secure their organization in a more proactive way.

Continue reading

60 percent of enterprises have fallen victim to social engineering in 2016

hand arm laptop security phishing lure scam

A new study from cyber security company Agari reveals the scale of social engineering attacks on industrial organizations across the US.

Of over 200 security leaders surveyed 60 percent say their organizations were, or may have been, victim of at least one targeted social engineering attack in the past year, and 65 percent of those who were attacked say that employees' credentials were compromised as a result. In addition, financial accounts were breached in 17 percent of attacks.

Continue reading

Sentiment analysis helps sales teams measure customer reaction

Sales graph

One of the problems sales teams face is knowing how their pitches, presentations and marketing materials are perceived by the customer.

Cloud-based sales and content management platform Pitcher is hoping to offer teams better insight with its newly patented Sentiment Analysis Module (SAM).

Continue reading

The cloud can be a driving force for your startup

Cloud access

Amazon Web Services (AWS) turned ten earlier this year and posted some pretty impressive figures to go with it (which have continued to impress in subsequent quarters). The public cloud provider revealed it is on course to generate more than $10bn in 2016, which highlights the success of the public cloud.

Organizations from all over the world are tapping into this success, but could it also be the driving force behind successful start-ups? If so, what can enterprises learn from start-ups flourishing in the cloud?

Continue reading

Mitigating the risks of third-party access to your data

risk jigsaw piece

If your office was broken into, you would fear what the intruders might take. Being so concerned about the possibility, you fit all the right locks and alarms and have good door and window security. However, do all the service providers that access your office do the same? If they’re not as security conscious, and they get broken into, the intruders could get hold of the access card or key to your office and then they’re in.

It would be galling because, despite having done all the right things to protect your company’s assets, your defenses were still breached. There was a weakness but it wasn’t your security. You gave a vendor the means to access your business to do you a service, and that access was exploited by someone with the skills to take advantage of their weak security.

Continue reading

Digital transformation is top strategic priority for half of execs

Transformation

Digital transformation is at the top of the strategic agenda for enterprises, and half of executives surveyed believe the next two years will be critical for their organizations.

These are among the findings of a new report by Forbes Insights, in association with Hitachi Data Systems, which surveyed 573 senior executives worldwide as well as holding one-on-one conversations with top executives.

Continue reading

Two factor authentication is not enough

Two factor authentication

The general consensus appears to be that two-factor authentication (2FA) is the answer to our authentication needs. Be that from usage of consumer sites in our personal lives or as part of our daily requirements when signing into enterprise infrastructure and applications at work.

However the cyber-attack on Three's customer upgrade database is yet another example of how 2FA is not enough. Organizations must move away from relying solely on usernames and passwords, as once again access was gained with a stolen employee login.

Continue reading

The benefits of thin clients for IT administrators

laptop

IT administrators should no longer be shackled to the desktop, trapped in permanent rounds of helpdesk visits, security patches and upgrades. The future could be an estate of efficient and remotely managed desktops and mobile devices; freeing IT administrators to focus on deploying IT innovation for competitive advantage.

For many IT administrators the feeling of being shackled to the desktop will be all too familiar. An endless round of responding to helpdesk tickets raised by users, running security patches and rolling out upgrades. "Surely there must be more to life than this?", they ask as they trudge off to solve another user issue. And thank goodness there is.

Continue reading

UK businesses unprepared for virtualization security challenges

Security

For UK companies with at least 1,000 PCs, virtualization is a "strategic priority", however, they are yet unprepared for all the different security challenges this approach brings. This is according to a new report by Bitdefender.

Surveying 153 IT decision makers in the UK, working in such companies, the report says hybrid infrastructures are the major common architecture in enterprise environments, as CIOs all over the world being to increasingly adopt them. The report sheds some light on the biggest fears and concerns IT decision makers have with the new infrastructure approach.

Continue reading

Scality improves security for enterprise cloud

cloud key

As organizations store more of their information in the cloud increased focus is placed on keeping it secure from breaches and other threats.

Cloud storage specialist Scality is launching a new version of its RING software defined storage technology to provide extended security features and a trusted, compliant and secure storage infrastructure.

Continue reading

Many users don't want to deal with breached businesses

Nope

We get plenty of reports on people being asked if they'd continue doing business with organizations that got breached. Sometimes, the reports are positive, saying people understand all the hard work organizations put into securing their data and that, sometimes, breaches can happen.

On other days, these reports claim people would walk away from such companies, never to look in their direction again. Today is one of those days. A new report by The Internet Society, called 2016 Global Internet Report, says 40 percent of users would not do business with a company that suffered a data breach.

Continue reading

North American businesses suffer twice as many cyber attacks

Cyber attack

A new report from Kaspersky Lab finds that businesses in North America are significantly less protected against cyberattacks compared to those worldwide.

According to the study 20 percent of global enterprises suffered four or more data breaches in the past year, while 44 percent of North American businesses suffered a similar number of attacks.

Continue reading

Load More Articles