Articles about Information Technology

The majority of IT pros view email as a major security threat

email open read

Sixty-five percent of IT professionals don’t feel equipped to defend against email-based cyber attacks, according to the findings of a report carried out by email security and archiving company Mimecast.

The global study of 600 IT security professionals -- Mimecast Business Email Threat Report 2016, Email Security Uncovered -- also found that 64 percent of respondents regard email as a major security threat and one third believe email is more vulnerable today than it was five years ago.

Continue reading

IT security experts are confident they can spot a data breach

data breach

A new study by security firm Tripwire says IT security experts are very confident they can detect a breach, and that they can detect it quite fast. For automated tools, they do not share the same levels of confidence.

The survey questioned 763 IT professionals in various verticals, including retail, energy, financial services and public sector organizations in the US, about the seven key security controls that need to be in place in order to quickly spot an ongoing hack attack.

Continue reading

New platform helps techies discover their market value

Recruitment

Not everyone is on the lookout for a new job, but it's always interesting to know what opportunities are available and what your worth might be.

San Francisco-based Woo is launching its platform for letting tech talent gauge their market value and find potential opportunities.

Continue reading

IT graduates are in high demand in UK

students university graduation

IT graduates are among the most sought after in the United Kingdom, a new report by CV-Library says.

CV-Library, an independent job site, says that the country grapples with the challenge of an impending skills shortage -- there were a total of 893 IT jobs for graduates in January 2016 alone. These jobs were the third most numerous, right behind education (1,139 jobs) and engineering (1,204 jobs).

Continue reading

More students taking up computing courses

students laptop

There is a resurgence of interest in computing courses, the Higher Education Statistics Agency (HESA) claims. According to the agency’s latest report, there has been an increase of 5 percent in the number of students starting an undergraduate computing course in 2014/15.

A total of 24,900 students signed up. The computing courses significantly outperform undergraduate enrollments as a whole, the agency continues, saying that in the same period, it rose by only 2 percent.

Continue reading

Why your business should consider outsourcing

Outsourcing laptop coffee desk table office notebook

Technology tethered with innovation drives business, it determines how successful your business can be and ensures that you maintain your standing in the market. It plays a huge role in your businesses growth, it demands that you constantly improve upon yourself and it enables your business to reach its potential.

In more ways than can be explained, a synergistic effect of technology coupled with innovation will assure your survival. If you lag behind you risk losing your market share and thus a slow and steady path towards decline takes over.

Continue reading

IT security professionals are looking for a challenge

Business mobile devices

The notion that IT security professionals are mercenaries when it comes to work and would most likely move if given an opportunity to earn more is, by a large margin, incorrect.

That’s basically what a new report by AlienVault says. The report, entitled Blood on HR's floor -- The Challenge of Retaining IT Security Skills, has a couple of interesting points.

Continue reading

What you need to know about mobile device management

cloud computing laptop smartphone tablet

The way in which we work has changed significantly in recent times. It was not that long ago that your standard office job meant being tethered to your desk from nine to five, glued to your PC screen. The rise of smartphones and web apps, however, have disrupted these traditional ways of working, granting employees more freedom than ever before. But this new mobile workforce also poses challenges for the modern business, particularly regarding security.

Of course, organizations cannot afford to restrict workplace mobility, as this would see them overtaken by a more flexible and innovative competitor. Therefore, businesses are tasked with enabling mobility without introducing vulnerabilities into the workplace -- which is where mobile device management comes in.

Continue reading

Young people find traditional education inadequate

thumb down young woman

Today’s youth has a positive view about the future and their role in it. However, many young people believe that traditional education doesn’t do enough to prepare them for their professional life.

These are the results of a recent poll commissioned by consulting firm Infosys.

Continue reading

Microsoft announces new flagship event for business leaders

Microsoft-Envision-Social-Graphic-Twitter-640x320

Microsoft has introduced a new flagship event for business leaders, called Microsoft Envision, which will take place in New Orleans between April 4 and April 6, and registration is open now.

Microsoft Envision is designed to replace Microsoft Convergence as the premier event for business leaders such as CxOs and their senior department and functional leaders.

Continue reading

IT workers want an early retirement

Beach sunset

It seems as nobody wants to work, and that’s a real bummer. Everyone wants to retire early, but that’s a particularly important problem in the tech industry, as it is already lacking staff, and people leaving early will only cause even more trouble.

According to a new report by Randstad Technologies, almost half (49 percent) of all tech workers want to retire before state pension age. In other industries, that percentage is at 35.

Continue reading

Hybrid IT systems hinder innovation

Innovation

Research from Sungard Availability Services, a provider of information availability through managed IT, cloud and recovery services, has revealed a dark side to hybrid IT systems.

Sungard’s findings based on a study which questioned 150 senior IT decision makers in UK organizations with more than 500 employees with an average IT spend of around £36m per year, found that over half of UK organizations believe that the complexity of their IT environment is hindering their ability to innovate.

Continue reading

The bad security habits enterprise IT needs to leave behind in 2016

waving dog goodbye

2015 has played host to some significant cyber breaches. Experian, TalkTalk and Ashley Madison all fell foul of malicious attacks, and they weren’t the only ones. In 2016, businesses need to resolve to do better -- but the question is, how?

What bad security habits need to be given up to ensure a safer, more secure experience next year? What lengths could, and indeed should have businesses gone to this year in order to prevent some of the data breaches that occurred?

Continue reading

UK sees 5.2 percent growth in IT jobs this year

Graph

The growth of the IT sector in the UK has accelerated to its fastest rate since the end of the recession, according to an analysis by Nixon Williams.

Nixon Williams analyzed data obtained from a variety of recent reports published by the Office of National Statistics, which show that there are currently 154,765 active IT enterprises in the UK, a 7.9 percent increase on the previous year when there were 143,450 active IT enterprises. The rate of new business creation in the IT sector is at its highest level since before the start of recession in 2008.

Continue reading

What you need to know about VPNs

Virtual Private Network VPN

A virtual private network (VPN) brings additional security to anyone using a public network, such as the Internet. Using a variety of security methods, such as encryption, the VPN is able to safeguard any data transmitted across the network, which may be at risk if it simply used the underlying public network infrastructure.

VPNs are often employed when it would not be practical to use a physical private network, usually due to financial reasons. As businesses embrace mobile working and face increasing pressure to protect sensitive information, many are employing virtual private networks to improve their network security.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

Regional iGaming Content

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.