Articles about Information Technology

Enterprise mobility will be the main IT focus in 2016

Business mobile devices

According to a new report from Harris Poll announced this week, enterprise mobility will top IT investments in 2016. The survey reveals that more than 90 percent of IT Decision Makers (ITDMs) see enterprise mobility as the critical function for customer engagement, competitiveness and operational productivity in 2016.

Additionally, nearly three in four (73 percent) respondents indicate that they intend to mobilize their whole organization.

Continue reading

IT pros want more storage to keep up with the times

Cloud storage

A survey commissioned by X-IO Technologies reveals that almost half of IT professionals (48 percent) do not believe their current storage array would work with the next generation of storage media

Furthermore, more than a half (57 percent) of IT professionals expect that their budgets are going to shrink or at the very least stay the same in 2016. This may indicate that any further changes to their storage requirements, especially in the wake of the IOT hype and big data explosion might not find a budget.

Continue reading

The top cyber-security trends of 2015

pixel padlock

As 2015 draws to an end, we can look back on a year that has seen cyber security rapidly ascend the corporate, journalist and consumer agendas.

The cost of the average corporate data breach continued to rise, and with hacks on firms such as Car Phone Warehouse, Talk Talk, Ashley Madison and even the Internal Revenue Services in the USA, the last twelve months have seen a marked escalation in Black Hat activity.

Continue reading

Data security is key for customer retention

unlocked_padlock

Nearly two-thirds (64 percent) of consumers worldwide say they are unlikely to shop or do business again with a company that had experienced a breach where financial information was stolen, and almost half (49 percent) had the same opinion when it came to data breaches where personal information was stolen.

This is according to a recent global survey by Gemalto, titled Broken Trust: 'Tis the Season to Be Wary, which surveyed 5,750 consumers in Australia, Brazil, France, Germany, Japan, United Kingdom and United States.

Continue reading

Windows 10: Security features for the enterprise

Security

The introduction of mobile into the workplace has destroyed previous enterprise security models, introducing a modern operating system (OS) architecture that puts the employee in the driver’s seat.

At the same time, breaches targeting traditional Windows operating systems are at an all-time high, with over 1 billion records compromised in the last two years.

Continue reading

Working remotely: Rewarding, but also challenging

man beach summer remote work

Stack Overflow has published a report that found nearly half of developers (44 percent) value the opportunity to work remotely. It’s well known that developers value the perk of remote working, but these days geographically disparate teams can be found in all sectors.

Companies with a remote workforce are among some of the most successful in the world -- WordPress, AirBnB, and Buzzfeed allow at least 50 percent of their workforce to operate remotely. For a decade or so, remote working has been for most an aspiration rather than a reality, and despite the availability of fast internet, laptops and smartphones, it’s never become the norm for most businesses and employees.

Continue reading

New Year's resolutions for those in IT

no resolution

Ah, yes. Nothing like the crushing pressure of New Year’s resolutions to finally address everything we’ve been doing wrong for the past 12 months! (Or 24 months or 36 months or 48 months... who’s counting?) For many, the resolutions for the upcoming year will undoubtedly include healthier diets, more exercise, and less time staring at smartphones.

Of course, if joining the panicked masses overtaking the elliptical machines at the gym isn’t your style, think about the 'digital fitness' of your enterprise instead. Here are some things to keep in mind for better data practices in 2016 that won’t feel like pulling teeth (and speaking of dentistry, flossing regularly is always a great resolution too).

Continue reading

Myths and facts about backup, restore and disaster recovery

Myths myth facts fact

With the rise of digital data, changing technology, and common usage of personal devices, the IT world has become ever more complex with new challenges around every corner. In the wake of such quick changes and complexity, many individuals end up exaggerating the difficulties found within these new systems and thereby begin spreading some major falsehoods within this vast IT sphere.

Even though the influx of information and discovery has given way to the creation of several urban legends, below you will see what is true and what is not.

Continue reading

Share files using public cloud and you might get fired

Boss firing employee message card

"You’re fired!" is a line we only really expect to hear from Alan Sugar these days, and even then, only for entertainment. Yet recent research reveals that file sync and share challenges could be putting UK employees at risk of hearing these words, or at the very least, of receiving a written warning.

It’s a familiar situation for most employees working in office environments -- you have some urgent files that need to be sent to a customer or partner on a tight deadline. The files are too big to be emailed and the person administrating the FTP-Server is, of course, on holiday. Being a hands-on, solution-oriented employee who is well versed with modern technology, you decide to share the files through a cloud-based file sharing solution like Dropbox or Box. With the job done and the customer happy, you might be expecting a pat on the back as a reward not a written warning, or even worse, a letter of termination, but that is the hidden reality for most UK employees.

Continue reading

What's the most popular IT asset management software?

Most popular

IT asset management (ITAM) software manages the lifecycle of hardware and software. It can help influence decisions about which assets need to be purchased, redistributed, or disposed of.

There is a lot of choice in the market when it comes to picking the right ITAM software for your company, but Camterra has made it easy by rating the top 20 IT asset management software solutions as measured by total customers, users, social presence and vendor size.

Continue reading

How to disclose a security breach

Security breach

The days and weeks after a major security breach can be trying, even for veterans of the security field. Chaos inevitably erupts as the organization attempts to assess and contain the damage. Often far down the list of priorities is the disclosure of the breach, but this can be one of the most critical steps for an organization to get right.

It is vital for financial reasons, to the recovery of the brand and for the viability of the company. It is not an easy task when customer’s personal information has been stolen. The reaction from customers is almost always the same: swift and highly critical of the organization and how it manages the aftermath.

Continue reading

Security breaches don't lead to a change in IT policy

Cyber attack

A survey conducted by training company QA, reveals that eight out of ten (81 percent) UK IT decision makers experienced some sort of data or cyber security breach in their organization in 2015. Sixty-six percent said that the breach had led to a loss of data, 45 percent said that it had resulted in a loss of revenue, and 42 percent said that it had resulted in a PR nightmare for the business.

Despite this, however, less than a third (27 percent) plan to invest in cyber security technologies next year. It would also appear that not all organizations have learnt from their experience, with less than half (43 percent) of IT decision makers saying that the breach had not resulted in a change of policy and procedure.

Continue reading

Is your website ready for Black Friday traffic?

Web Traffic Internet

Conventional wisdom has dictated for millennia that planning well in advance will put you in good stead for success. What this means for IT departments is to prepare for the worst -- and for online retailers that means November 27 and 30.

Black Friday and Cyber Monday are approaching fast and now is the time for IT professionals to ensure their IT infrastructure capacity will not leave them sitting on the side-lines.

Continue reading

How BSIMM improves security by letting developers compare security practices [Q&A]

Security

Every organization believes that it's making its systems secure, but because they usually work in isolation from competitors and other businesses they have no way of knowing how they compare.

The Building Security In Maturity Model (BSIMM) aims to quantify security practices and present them in a measurable way to allow companies to compare their performance.

Continue reading

Creating the DevOps environment that'll give you an edge over the competition

Competitive Advantage

At a time when the speed of application development is vital to commercial success, the DevOps methodology -- based on communication, collaboration, integration and automation -- has become one of the biggest IT moves around.

However, it’s more than just a business philosophy; to do it right requires genuine infrastructure investment and development.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

Regional iGaming Content

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.