Businesses upgrade to better kit to boost home working

working from home

Since March, use of devices with newer generation chips has increased by 13.7 percent according to a new study from digital experience management company Aternity.

The use of machines with newer (8th, 9th, and 10th generation CPUs) corresponds with a 10.8 percent decline in use of 6th or earlier generation devices, and a small 2.9 percent drop in usage of 7th generation CPU-based machines.

Continue reading

86 percent of IT pros see hybrid cloud as the ideal model

Hybrid Cloud

Hybrid cloud is seen as the ideal infrastructure model according to 86 percent of respondents to a new survey by Nutanix.

It also reveals that the pandemic has shifted the way IT leaders think about their future plans. The majority of respondents (nearly 76 percent) report the pandemic has made them think more strategically about IT, and nearly half (46 percent) say their investments in hybrid cloud have increased as a direct result of the pandemic, including public and private clouds.

Continue reading

Less than a third of organizations use cloud data leakage protection

Broken umbrella in storm

Only 31 percent of organizations use cloud DLP, despite 66 percent citing data leakage as their top cloud security concern, according to a new report from Bitglass.

In addition organizations say they are unable to maintain visibility into file downloads (45 percent), file uploads (50 percent), DLP policy violations (50 percent), and external sharing (55 percent) in the cloud.

Continue reading

IT leaders and front line staff disagree on cloud priorities

disagreement

While 47 percent of IT decision-makers strongly agree that COVID-19 has accelerated their cloud maturity, only 29 percent of line-of-business IT employees feel the same.

A new report from technology modernization firm SPR surveyed 400 IT decision-makers and the same number of workers to look at how IT teams see their businesses’ cloud resiliency strategy for 2020 and beyond.

Continue reading

IBM makes it easier for clients to use public cloud services

IBM logo

IBM is using this week's KubeCon to announce an initiative enabling clients to take better advantage of public cloud services in any environment they choose.

From today the company will open source Kubeflow Pipelines on Tekton to provide a standardized solution for creating and deploying machine learning models in production and to make machine learning models portable across hybrid cloud environments.

Continue reading

Businesses are relying more on data to make decisions

decision decide IT flowchart

According to a new survey of IT decision makers, 73 percent rely on data more to make business decisions and 33 percent believe the value of data has permanently increased since the beginning of the COVID-19 pandemic.

The study from Druva surveyed 700 IT decision makers in the US and UK and underpins the importance of maximizing the value of data as businesses navigate an unprecedented global landscape.

Continue reading

Advantages of remote onboarding

remote work

The world of work has changed, and remote work is no longer an option or perk. Teams worldwide have been forced to go fully- or mostly-remote, many with a weekend’s notice. As the months of working from home drag on, we’ve had to readjust our processes and systems -- one of which is employee onboarding.

The importance of a strong onboarding program can’t be overstated -- especially since only 12 percent of employees are happy with their organization’s onboarding programs, and 50 percent of new hires leave their organizations within their first 18 months. While remote work is associated with decreased retention, we can’t deny the outsized impact of an employee’s first few months on the rest of their tenure.

Continue reading

Enterprises accelerate cloud transformation but struggle with security

digital transformation

Enterprises have embraced the moving of multiple applications to the cloud using containers and are utilizing Kubernetes for orchestration. But the findings of a new report also confirm that many are inadequately securing the data stored in these new cloud-native environments.

The report from cloud-native data protection specialist Zettaset shows businesses are continuing to leverage existing legacy security technology as a solution.

Continue reading

IT spending remains buoyant despite the pandemic

computer piggy bank and cash

In the face of restrictive lockdowns and stay-at-home orders, IT budgets have held up remarkably well according to a new study, as technology becomes a critical ingredient in launching new products and services.

The report from OpsRamp is based on responses from 230 IT operations and DevOps executives in the US and UK with at least 500 employees and $5 million in annual IT budgets.

Continue reading

Cybereason launches new solution to protect enterprise networks

Network

Cyberattacks increasingly take aim at multiple devices and users simultaneously while employing a range of tactics, forcing defenders to employ a range of different tools across their IT estate.

Now though Cybereason is launching a new Extended Detection and Response (XDR) solution that brings together endpoint telemetry with behavioral analytics to help enterprises to swiftly detect and end cyberattacks anywhere on their networks.

Continue reading

The challenges of video conferencing interoperability

cinos-frimley-case-study-mr

It’s a scenario we all know too well and one that has happened in workplaces around the world. As colleagues gather together in the boardroom to start an important video meeting with a client, they’re stopped in their tracks when they realize they are waiting in a Microsoft Teams Room and the client is on Google Meet.

Then the IT department find themselves on the other end of frantic calls and the inevitable question -- 'How do we get this to work?' This can be a frustrating experience, especially for organizations that have invested in expensive hardware or unified communication services.

Continue reading

Shift to remote work drives overhaul of enterprise access technology

Access management

This year's massive and sudden shift to remote working has boosted the adoption of cloud technology and the security implications of this transition will reverberate for years to come, according to the latest Trusted Access report from Cisco company Duo Security.

Daily authentications to cloud applications surged 40 percent during the first few months of the pandemic, the bulk of these coming from enterprise and mid-sized organizations looking to ensure secure access to services.

Continue reading

CISOs look for flexibility to manage new security challenges

business security

A new survey of UK CISOs by cybersecurity company F-Secure looks at how IT decision makers are adapting to a fast changing landscape.

With more people working remotely budgets are being moved around to allow businesses to cope with new ways of working and the resulting security vulnerabilities, and 13 percent of respondents say that budgets are going to increase as a direct response to the challenges presented by the pandemic.

Continue reading

Getting real about ransomware [Q&A]

Ransomware sign

For every high-profile ransomware incident in the headlines, there are many more that never get reported. Particularly among small- and medium-sized businesses, often with small IT and cybersecurity teams, a ransomware attack can be an existential problem.

To understand how companies should respond when they discover they're in the grip of a ransomware threat actor, we spoke with Kurtis Minder, CEO and co-founder of GroupSense, which helps companies navigate through these attacks to get their businesses back online.

Continue reading

Hackers exploit business VoIP system vulnerability

VoIP

Researchers at Check Point have uncovered a fraud operation targeting more than 1,200 business VoIP phone systems worldwide.

Hackers are exploiting vulnerabilities in the popular Sangoma and Asterisk VoIP phone systems to gain control of the system. They then seek to monetize that access by selling auto-generated calls and forcing systems to call premium numbers owned by the hackers to collect revenues, without the targeted business being aware.

Continue reading

Load More Articles