Advanced technology is not in the cards for small UK businesses

Team meeting

The UK might be a leader in advanced technology, such as driverless cars or 3D printing, but the majority of small organizations in the country don’t believe they’ll be using advanced technology any time soon.

Those are the results of a new study by Axa Insurance.

Continue reading

New subscription service offers flexible threat intelligence

insider threat

Depending on their size and the sector they operate in, businesses need to respond to threats of different types and require intelligence to suit.

Endpoint protection specialist CrowdStrike is launching a tiered eCrime subscription that will allow customers to choose the option that best meets their needs to gain new capabilities and insights into the entire eCrime adversary ecosystem, and orchestrate detection and response options in a more effective manner.

Continue reading

New security solution offers anytime, anywhere user protection

endpoint protection

As growing numbers of devices are connected to the internet, security and privacy concerns grow. Businesses are looking for solutions that provide protection for both the endpoint and the network.

Israel-based Allot Communications is announcing a new collaboration with Intel Security to introduce McAfee Unified Security Powered by Allot, providing complete end-to-end security capabilities.

Continue reading

US and UK facing IT 'talent crisis'

Warning Sign Sky Cloud Cloudy

Both the UK and the US are in serious need of cyber-security talent, as there are hundreds of thousands of job vacancies in this industry that won’t be filled any time soon.

This is according to a new report by Intel Security and CSIS, which polled businesses all over the world. There is a "talent crisis" in Australia, France, Germany, Israel, Japan, Mexico, US and UK.

Continue reading

Communication issues growing concern for enterprises

frustrated

Here’s an interesting finding: the number of downtime incidents, which prevent staff to work from their usual offices or access business-critical systems, has seen only a tiny drop -- five percent, compared to 2014. But the nature of these incidents has changed -- dramatically.

According to Sungard AS’s new report, communication-related failures have "jumped by a third" and now account for 25 percent of all total invocations. Consequently, communication issues have, for the first time ever, been named as the top reason UK business invoke recovery services.

Continue reading

Windows 10 Anniversary update is not driving enterprises to switch

windows_10_finger

Although 64 percent of enterprises are planning to move to Windows 10 in the next year, tomorrow’s expected Windows 10 Anniversary release from Microsoft isn't proving to be a huge motivator for upgrading.

According to the survey from systems management specialist Adaptiva, 76 percent say the anniversary update is not increasing their sense of urgency to move to Windows 10.

Continue reading

Security pros find it hard to measure ROI on spending

Confused woman

The majority of IT security experts actually struggle to measure the return on investment in security measures, Tenable Network Security says.

Based on a survey of 250 IT security professionals, conducted during the Infosecurity Europe 2016 summit, it says that the majority can only measure the return on less than 25 percent of their security spend.

Continue reading

Dropbox launches AdminX dashboard for business users

Dropbox PDF Adobe

Dropbox has just announced AdminX, a new dashboard aimed at helping IT admins better manage Dropbox Business users. AdminX, which has been in development since last year, will have a couple of new features, including new versions of folders for both individuals and groups.

With a more tier-style permission system across the board, it will tighten up security, and the permissions will be managed from AdminX. Enhanced file sync controls are also coming, which will allow admins to choose which files to sync locally, and which not to.

Continue reading

New platform detects mobile threats at the app level

Mobile app threats

Increased reliance on mobile devices opens enterprises up to a new range of threats. While mobile management solutions can do a good job of protecting the device, it's harder to guard against attacks on individual apps.

Mobile security company Appmobi is launching a new solution that detects and resolves attacks at the app level.

Continue reading

Microsoft celebrates the 20th anniversary of Windows Server

20th-anniversary

With strange serendipitous timing, just as the free upgrade period for Windows 10 is coming to an end, Microsoft is also celebrating the 20th anniversary of Windows Server. Way back in 1996, the company unleashed Windows NT 4.0 Server onto an unsuspecting world. The rest, as they say, is history.

Described as the operating system that would 'knock the socks of Unix' Windows NT 4.0 Server stuck around for four years before being replaced by the enterprise-specific Windows 2000 Server. With laughably low system requirements -- 133 MHz CPU, 32 MB RAM and 1 GB of disk space -- this was the start of a journey incorporating centralization and security.

Continue reading

Financial services need to beef up crime protection and prevention

hand stop

Financial services need to rethink crime protection and prevention because the current measures are simply not cutting it, according to PwC. In the company’s new paper, it examines the industry to find out to what extent it is complying with the latest rules and regulations, whether it is investing heavily in protection and prevention, and what are the results.

Basically, financial institutions have always been, and it seems as they will continue to be, cyber-criminals’ most wanted target. They are under intense scrutiny by regulators, and they are investing heavily in both protection and prevention.

Continue reading

Creating a security-aware mobile culture

hand arm laptop security phishing lure scam

Historically hackers have pursued and targeted individuals more frequently than they have targeted businesses as they are typically the path of least resistance. However, the number of organizations worldwide falling victim to major cyber attacks is dramatically rising. More and more, hackers are infiltrating businesses of all sizes -- and not just through traditional system hacks, but now increasingly through social engineering.

Tricking people to access money or sensitive information on the Internet is by no means a new concept -- these cleverly disguised emails were behind the infamous ‘Celebgate’ hacking case, which exposed nude photos of celebrities. Except now, fraudsters are doing their homework to perfect their technique.

Continue reading

Businesses are less high tech than they think they are

high-tech digital companies

Here’s an interesting prospect: the majority of companies that consider themselves high-tech have not invested nearly enough to become digital businesses.

That is according to a report just released by Accenture, a global professional services and consulting company. Titled Accelerating Digital Performance in High-Tech, it says that just nine percent, out of 55 companies surveyed, are "digital high performers".

Continue reading

How IT teams of the future will look

Team meeting

IT teams will look completely different in the next five years, according to professional IT resourcing company Experis.

The company has released a new report, titled Tomorrow’s Tech Teams, in which it polled 1,000 IT workers and 200 senior IT managers. Six in ten (59 percent) believe the traditional IT department doesn’t exist in modern business.

Continue reading

New solution helps enterprises guard against chat-based phishing

hand arm laptop security phishing lure scam

Slack is the largest enterprise chat platform in the world with more than 2.7 million daily active users who spend an average of 140 minutes per day using it.

Not surprising then that alert attackers see it as an opportunity to expand their social engineering campaigns. The fact than many people use Slack without the IT team's knowledge creates a further security issue.

Continue reading

Load More Articles