Cyber criminals love to attack hotel chains

Hotel wi-fi business

Hotels represent rich pickings for cyber criminals. There's the potential to steal information from large numbers of customers with consequent financial gains.

Researchers at Panda Security have issued a report showing the major attacks targeted against hotel chains in 2015.

Continue reading

Demand for open source talent on the rise

Developer

Open source talent is in high demand when it comes to recruiting new technology experts, and this trend is only going to grow, new reports say.

According to the latest 2016 Open Source Jobs Report, 59 percent of hiring managers will increase the number of open source talent in their organization within the next six months.

Continue reading

Stick to the script: 5 ways to keep your software development outsourcing on track

man globe cloud

The good news -- you’ve found a software development team that you’re comfortable with and work well alongside. They fit so well into your company’s culture, you even begin to view them as you would any internal employee. While this is all well and good, it’s not to say that you won’t run into challenges along the way -- from day-to-day communication gaps to even uncertainties in tracking of overall progress. Certainly no relationship is perfect, but it falls within your job description as the project manager or product owner to ensure outsourced projects stay on track and more importantly -- within budget.

The following list of management tips and tricks of the trade should be put in place to help keep risks down to a minimum and your outsourced relationships performing at their best.

Continue reading

What you need to know about spear phishing

Phishing

Unlike spam or phishing emails, which involve a broad and varied range of targets, spear phishing is a highly-targeted email attack against a specific group, organization, or even person.

The main aim of a spear phishing attack is either to obtain unauthorized access to sensitive data, whether this is intellectual property, financial data, trade or military intelligence, or to get the recipient of the email to act on a command, whether this is to transfer money or share confidential data.

Continue reading

Apple continues iOS enterprise ascension with SAP partnership for iPhone and iPad

Cloud handshake collaboration

When it comes to business devices, employees can often have a big impact on decision-making. In other words, they can influence IT and executives by expressing a desire for the same type of device they use at home. When Blackberry devices, for instance, fell out of favor with home users, they soon lost their luster in the enterprise too.

iPhone and iPad devices are wildly popular in the enterprise, but not only because employees love them. They are also very secure, thanks to things like touch ID and regular operating system updates. Apple has even partnered with world-class companies, such as IBM, which bolstered the positive perception for iOS. Today, Tim Cook and company announce yet another monumental partnership, this time with SAP.

Continue reading

Looker launches analytical apps for business

Looker Data Apps

Data is the lifeblood of most areas of business, but often companies end up with isolated analytics tools used by different departments and no central overview.

Analytics specialist Looker is launching a range of new apps that can meet the needs of individual departments but which all deploy on the Looker Data Platform, so an entire company can use Looker to understand each aspect of their business with up-to-the-minute data to make data-driven decisions.

Continue reading

The rise of the virtual CIO [Q&A]

Boardroom cloud

The role of chief information officer has become entrenched in large organizations, but smaller businesses often can't afford to employ one. This means that they miss out on the expertise a CIO can bring, but also lack representation of IT at board level.

In some cases businesses are getting around this by outsourcing the role to a 'virtual CIO' who may only be needed for one or two days a month, so they can also work across multiple organizations, and from different locations. We spoke to Dean Coleman, head of service delivery at service management specialist Sunrise Software to find out more about this trend.

Continue reading

Tech companies could disrupt financial industry

walking_through_money

People would gladly take banking services from tech companies such as Google, Amazon or Facebook, a new survey has shown.

According to a new Europe-wide study by Fujitsu, the digital transformation keeps disrupting the financial industry, and if traditional service providers fail do adapt on time, tech disruptors will step in.

Continue reading

Microsoft prevents Windows 10 Pro admins from blocking access to the Windows Store

Windows-10 key

Microsoft has castrated some of the capabilities of Windows 10 Pro admins looking to lock down the computers they manage. The company is removing the ability to block access to the Windows Store using Group Policy Editor.

The option will still be available to those running Education or Enterprise versions of Windows 10. It means that businesses who have come to rely on this option as part of their security regime will have to consider upgrading to a different version of Windows 10.

Continue reading

Wearables are likely source for security breach

wearable watch

The Internet of Things (IoT) opens up a sea of new opportunities for revenue and growth, but it is also a security challenge, IT pros have said.

If the new Spiceworks IoT report is to be believed, 85 percent of IT professionals in the EMEA region (Europe, Middle East, Africa) believe IoT will create new security and privacy issues in the workplace.

Continue reading

Just 30 percent of UK companies experienced a security breach in 2015

Security breach

Almost a half (43 percent) of UK companies did not experience a security breach in 2015, a new report suggests. Released by IT management software provider SolarWinds, it includes answers from 109 IT practitioners and managers from small, medium-sized and large UK companies.

According to them, just 30 percent suffered a breach last year. Quite surprising.

Continue reading

Why automation and artificial intelligence are essential to cyber defense [Q&A]

AI

With the ever increasing complexity and volume of cyber attacks, companies are increasingly turning to automated solutions and artificial intelligence in the quest for more effective protection.

But how effective is an automated approach and will it become the norm in future? We spoke to Eran Barak, CEO of incident response specialist Hexadite to find out.

Continue reading

Microsoft upgrades Operations Management Suite, releases new System Center 2016 preview

microsoft_logo_magnified

Microsoft has upgraded its Operations Management Suite and has made a new preview of System Center 2016 available, in an effort to aid system administrators in tackling the increasingly complex cloud environments and data center resources.

The company’s System Center is as a suite of systems management tools, that includes System Center Configuration Manager and System Center Operations Manage, all aiming to help companies manage on-premises data centers. Operations Management Suite on the other hand, is designed to aid companies in gaining control of hybrid cloud environments.

Continue reading

Tech leaders are not satisfied with IT departments

disappointed

The pace of change within IT has accelerated rapidly in recent years and, according to new research from IT resourcing firm Experis, many organizations now believe they have fallen behind the competition.

The report found that tech leaders believe their departments are a whole four years behind their most innovative competitors, whilst also believing that 29 percent of their teams need to be changed in order to drive digital transformation.

Continue reading

Spanning launches backup for OneDrive business users

Cloud backup

Just because your data is stored in the cloud is no reason to stop backing it up. While cloud service providers are responsible for making your data available, they’re not responsible for managing and protecting customers' data from accidental or malicious behavior.

As a recent survey showed accidental deletion by users is a major source of data loss from the cloud. Now the company behind that survey, Spanning, is launching a solution for Microsoft Office 365 OneDrive for Business users.

Continue reading

Load More Articles