Enterprise mobility will be the main IT focus in 2016


According to a new report from Harris Poll announced this week, enterprise mobility will top IT investments in 2016. The survey reveals that more than 90 percent of IT Decision Makers (ITDMs) see enterprise mobility as the critical function for customer engagement, competitiveness and operational productivity in 2016.
Additionally, nearly three in four (73 percent) respondents indicate that they intend to mobilize their whole organization.
IT pros want more storage to keep up with the times


A survey commissioned by X-IO Technologies reveals that almost half of IT professionals (48 percent) do not believe their current storage array would work with the next generation of storage media
Furthermore, more than a half (57 percent) of IT professionals expect that their budgets are going to shrink or at the very least stay the same in 2016. This may indicate that any further changes to their storage requirements, especially in the wake of the IOT hype and big data explosion might not find a budget.
The top cyber-security trends of 2015


As 2015 draws to an end, we can look back on a year that has seen cyber security rapidly ascend the corporate, journalist and consumer agendas.
The cost of the average corporate data breach continued to rise, and with hacks on firms such as Car Phone Warehouse, Talk Talk, Ashley Madison and even the Internal Revenue Services in the USA, the last twelve months have seen a marked escalation in Black Hat activity.
Data security is key for customer retention


Nearly two-thirds (64 percent) of consumers worldwide say they are unlikely to shop or do business again with a company that had experienced a breach where financial information was stolen, and almost half (49 percent) had the same opinion when it came to data breaches where personal information was stolen.
This is according to a recent global survey by Gemalto, titled Broken Trust: 'Tis the Season to Be Wary, which surveyed 5,750 consumers in Australia, Brazil, France, Germany, Japan, United Kingdom and United States.
Windows 10: Security features for the enterprise


The introduction of mobile into the workplace has destroyed previous enterprise security models, introducing a modern operating system (OS) architecture that puts the employee in the driver’s seat.
At the same time, breaches targeting traditional Windows operating systems are at an all-time high, with over 1 billion records compromised in the last two years.
Working remotely: Rewarding, but also challenging


Stack Overflow has published a report that found nearly half of developers (44 percent) value the opportunity to work remotely. It’s well known that developers value the perk of remote working, but these days geographically disparate teams can be found in all sectors.
Companies with a remote workforce are among some of the most successful in the world -- WordPress, AirBnB, and Buzzfeed allow at least 50 percent of their workforce to operate remotely. For a decade or so, remote working has been for most an aspiration rather than a reality, and despite the availability of fast internet, laptops and smartphones, it’s never become the norm for most businesses and employees.
New Year's resolutions for those in IT


Ah, yes. Nothing like the crushing pressure of New Year’s resolutions to finally address everything we’ve been doing wrong for the past 12 months! (Or 24 months or 36 months or 48 months... who’s counting?) For many, the resolutions for the upcoming year will undoubtedly include healthier diets, more exercise, and less time staring at smartphones.
Of course, if joining the panicked masses overtaking the elliptical machines at the gym isn’t your style, think about the 'digital fitness' of your enterprise instead. Here are some things to keep in mind for better data practices in 2016 that won’t feel like pulling teeth (and speaking of dentistry, flossing regularly is always a great resolution too).
Myths and facts about backup, restore and disaster recovery


With the rise of digital data, changing technology, and common usage of personal devices, the IT world has become ever more complex with new challenges around every corner. In the wake of such quick changes and complexity, many individuals end up exaggerating the difficulties found within these new systems and thereby begin spreading some major falsehoods within this vast IT sphere.
Even though the influx of information and discovery has given way to the creation of several urban legends, below you will see what is true and what is not.
Share files using public cloud and you might get fired


"You’re fired!" is a line we only really expect to hear from Alan Sugar these days, and even then, only for entertainment. Yet recent research reveals that file sync and share challenges could be putting UK employees at risk of hearing these words, or at the very least, of receiving a written warning.
It’s a familiar situation for most employees working in office environments -- you have some urgent files that need to be sent to a customer or partner on a tight deadline. The files are too big to be emailed and the person administrating the FTP-Server is, of course, on holiday. Being a hands-on, solution-oriented employee who is well versed with modern technology, you decide to share the files through a cloud-based file sharing solution like Dropbox or Box. With the job done and the customer happy, you might be expecting a pat on the back as a reward not a written warning, or even worse, a letter of termination, but that is the hidden reality for most UK employees.
What's the most popular IT asset management software?


IT asset management (ITAM) software manages the lifecycle of hardware and software. It can help influence decisions about which assets need to be purchased, redistributed, or disposed of.
There is a lot of choice in the market when it comes to picking the right ITAM software for your company, but Camterra has made it easy by rating the top 20 IT asset management software solutions as measured by total customers, users, social presence and vendor size.
How to disclose a security breach


The days and weeks after a major security breach can be trying, even for veterans of the security field. Chaos inevitably erupts as the organization attempts to assess and contain the damage. Often far down the list of priorities is the disclosure of the breach, but this can be one of the most critical steps for an organization to get right.
It is vital for financial reasons, to the recovery of the brand and for the viability of the company. It is not an easy task when customer’s personal information has been stolen. The reaction from customers is almost always the same: swift and highly critical of the organization and how it manages the aftermath.
Security breaches don't lead to a change in IT policy


A survey conducted by training company QA, reveals that eight out of ten (81 percent) UK IT decision makers experienced some sort of data or cyber security breach in their organization in 2015. Sixty-six percent said that the breach had led to a loss of data, 45 percent said that it had resulted in a loss of revenue, and 42 percent said that it had resulted in a PR nightmare for the business.
Despite this, however, less than a third (27 percent) plan to invest in cyber security technologies next year. It would also appear that not all organizations have learnt from their experience, with less than half (43 percent) of IT decision makers saying that the breach had not resulted in a change of policy and procedure.
Is your website ready for Black Friday traffic?


Conventional wisdom has dictated for millennia that planning well in advance will put you in good stead for success. What this means for IT departments is to prepare for the worst -- and for online retailers that means November 27 and 30.
Black Friday and Cyber Monday are approaching fast and now is the time for IT professionals to ensure their IT infrastructure capacity will not leave them sitting on the side-lines.
How BSIMM improves security by letting developers compare security practices [Q&A]


Every organization believes that it's making its systems secure, but because they usually work in isolation from competitors and other businesses they have no way of knowing how they compare.
The Building Security In Maturity Model (BSIMM) aims to quantify security practices and present them in a measurable way to allow companies to compare their performance.
Creating the DevOps environment that'll give you an edge over the competition


At a time when the speed of application development is vital to commercial success, the DevOps methodology -- based on communication, collaboration, integration and automation -- has become one of the biggest IT moves around.
However, it’s more than just a business philosophy; to do it right requires genuine infrastructure investment and development.
Recent Headlines
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
Regional iGaming Content
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.