Nearly half of EU businesses don't know where their data's located

servers cloud

According to a survey by the cloud hosting firm UKFast, nearly half of businesses are clueless as to where their data is located.

To come to its findings, the company surveyed over 300 IT decision makers in EU businesses, with 47 percent of them unaware of where their personal and company data was hosted.

Continue reading

Choosing asset management software

network

Asset management is often seen as something as a chore and something that's relegated to a few hours work with an Excel spreadsheet.

But that makes it hard to keep up to date and may not deliver all of the information needed to effectively keep track of equipment and software.

Continue reading

Social ad spending rises by 86 percent

social-media-header

Spending on social media advertising has increased by 86 percent in the first quarter of this year compared with the same period in 2015. It's also up eight percent when compared to last year's final holiday shopping quarter.

These findings come from agile marketing specialist Kenshoo based on data managed by its platform for over 3,000 advertiser and agency accounts. It attributes the growth to the appeal of new ad types like Facebook Dynamic Product Ads and increased inventory through Instagram.

Continue reading

More apps and websites leak credit card data on enterprise handsets

leaky_pipe

In its latest quarterly Mobile Data Report, Wandera has revealed a significant rise in apps leaking credit card data on enterprise mobile devices.

The company, which specializes in mobile data security and management, compiled the report by analyzing the data usage trends and traffic patterns across its global network of enterprise mobile devices. Between Q4 2015 and Q1 2016, there has been a 17 percent increase in apps and mobile websites leaking credit card data.

Continue reading

More than a third of enterprises don't backup business data

Backup key

The results of a new survey show that many organizations continue to demonstrate a complacent, lax attitude toward backups, leaving them vulnerable to evolving threats.

The study from cloud-based backup provider CloudBerry Lab finds that almost half of respondents (49 percent) have only one copy of their business data, which could cause major operational disruption in the event that data becomes inaccessible.

Continue reading

Taking the pulse of cyber security in healthcare

Screen and stethoscope

Large hospitals often have thousands of workstations used by multiple employees to access confidential patient data, so securing them can be a major challenge.

Endpoint security specialist Duo Security has compared its customers in healthcare with those in other industries to determine how the sector differs in its security requirements.

Continue reading

Free Wi-Fi hotspots are a major security threat for businesses

Public wi-fi

Free Wi-Fi hotspots are the biggest security threat for mobile workers, according to new reports.

The recently released iPass Mobile Security Report says that 62 per cent of organizations are banning their mobile workers from using free Wi-Fi hotspots, with another 20 percent planning on doing the same in the future.

Continue reading

Digital divide is holding back the UK economy

UK union flags

New research by business organization the CBI in conjunction with IBM shows that a digital divide is opening up across the British economy, with just over half (55 percent) of 'pioneer' firms adopting digital technologies and processes, while the remaining 45 percent are falling behind.

Despite the UK taking top place globally for e-commerce and fifth place for the availability of technology, it ranks only fourteenth in the world for company-level adoption of digital technology, with many companies struggling to digitize their businesses at the rate of peers in other countries.

Continue reading

Migrating Oracle apps to the cloud

Cloud access

With companies of all sizes across the globe waking up to the benefits of moving some or all Oracle applications to the cloud, the cloud is rapidly becoming a star in many IT strategies of organizations. The benefits include the reduced need for up-front capital investment in order to accelerate return on investment, as well as gaining greater business insight and an excellent user experience.

The reality of today’s cloud technology is now matching -- or even exceeding -- the hype of a few years ago. However, some organizations are still cautious about moving business-critical applications to the cloud, based on perceived risks that are often overstated and based on outdated concerns.

Continue reading

MobileDemand xCase for Microsoft Surface 3 [Review]

MobileDemand xCase front

Microsoft's Surface 3 and Surface Pro 4 are among the best tablets for enterprise use. A full-blown version of Windows, light and sturdy build, adjustable kickstand, good battery life and optional keyboard enables them to work equally well at the desk and on the go. In harsher conditions, however, some extra protection is required.

For use in the field, MobileDemand has introduced a rugged case, called xCase. It promises "unparalleled durability and superior protection" for Surface 3 and Surface Pro 4. Offered in two versions, basic and premium, I have tested the latter in a Surface 3 trim -- here are my impressions.

Continue reading

Businesses need to use text messages to reach millennials

text message

Millennials have an overwhelming preference for texting according to new research. In fact, when given the choice between only being able to text or call on their mobile phones, 75 percent of millennials would rather lose the ability to talk.

Respondents to the survey from enterprise mobile specialist OpenMarket say texts are preferred because they're more convenient and on their own schedule (76 percent), texts are less disruptive than a voice call (63 percent), they prefer to text rather than call in general (53 percent) and because they never check voicemails (19 percent).

Continue reading

New analytics platform aims to transform mental healthcare

Healthcare data

Healthcare costs for people diagnosed with mental illness and common chronic health conditions are 75 percent higher than for those without a mental health diagnosis according to the Centers for Medicare and Medicaid Services (CMS).

This is because there’s often a lack of coordination between multiple care providers, different state policies and diverse payment structures which can result in poor health outcomes and higher costs across health systems.

Continue reading

Only 23 percent of businesses can effectively respond to cyber attacks

Cyber attack

NTT Com Security today released its annual Global Threat Intelligence Report (GTIR), which examines the threat landscape by analyzing the attacks, threats and trends from the previous year.

This year’s report is the most comprehensive to date, featuring key findings from partners including Lockheed Martin and the Center for Internet Security and pulling information from 24 security operations centers, seven R&D centers, 3.5 trillion logs, 6.2 billion attacks and nearly 8,000 security clients across six continents.

Continue reading

77 percent of companies don't have the capability to respond to cyber attacks

panic hands due man afraid

Only 23 percent of organizations are capable of responding effectively to a cyber incident. This leaves the remaining 77 percent often having to purchase support services after an incident has occurred.

This is among the findings of the latest Global Threat Intelligence Report from security company Solutionary. The report is made up of information from 24 security operations centers, seven R&D centers, 3.5 trillion logs, 6.2 billion attacks and nearly 8,000 security clients across six continents.

Continue reading

Kaspersky introduces Industrial CyberSecurity solution

pixel padlock

Security firm Kaspersky Lab today announced a new, specialized security solution, aimed at critical infrastructure and industrial facilities.

The solution, called Kaspersky Industrial CyberSecurity, is built to protect technological processes in industrial environments from cyber-attacks because, as the company says, these threats now have the potential to cross the realms, from the virtual one into the physical one, threatening not only businesses, but humanity and nature, as well.

Continue reading

Load More Articles