Security, IT Infrastructure and Business Continuity
From ZDNet Are businesses finally falling in love with tablets, just as consumers fall out of love with them? According to figures from IDC, 8.2 million tablets were shipped into Western Europe in the third quarter of this year, a 6.7% decline year-on-year. But while sales of consumer tablets dropped, ... read more..
From CIO Plans are afoot to build the UK's first National College of Cyber Security at Bletchley Park, the birthplace of the country's wartime codebreaking efforts. It was at Bletchley Park that Colossus, the world's first electronic computer, was built during World War II to crack the Lorenz code used ... read more..
From Computing.co.uk IT security shouldn't be dictated from on high, as trusting and involving employees helps to nurture a greater security culture, an industry panel representing leading banking, media, engineering and security solution firms have agreed. Speaking at Computing's 2016 Enterprise Security and Risk Management Summit, Anton Karpov, CISO at ... read more..
From Dark Reading IT management has become increasingly decentralised in the last three years and businesses are struggling to address it. Many believe tech departments aren't ready to face this trend, which they believe will increase enterprise security risk. These findings come from new cloud research on IT management, commissioned ... read more..
From ComputerWeekly.com Cyber theft from 20,000 compromised Tesco Bank current accounts shows traditional approaches to security are not working and that companies are not taking the threat seriously enough, according to experts. Tesco Bank halted online banking after 40,000 current accounts were compromised and half of those were hit by ... read more..
From ZDNet The PC market has been buffeted by some pretty strong winds recently: sales this year will decline for the second year running (they'll be about flat next year too) as consumers and business switch to tablets and smartphones. And for the first time internet usage on mobiles and ... read more..
From SC Magazine Researchers at AI security vendor Cylance have uncovered a low rent malvertising campaign on Google AdWords that targets high-end MacOS users. Without wishing to get into the 'your Windows machine is a gazillion times less secure than my Mac' nonsense, and whilst admitting that this latest threat ... read more..
From Information Age Last month both the UK and US governments published reports on how artificial intelligence (AI) and automation will impact society in the coming years. It was a landmark moment, thrusting AI into national and political conversations. At the same time Stephen Hawking, the renowned theoretical physicist, called ... read more..
From V3.co.uk The government has announced the launch of a 10-week boot camp training initiative designed to churn out more skilled cyber security experts as part of the newly unveiled National Cyber Security Strategy. The Cyber Retraining Academy course does not require those interested to have any prior cyber expertise, ... read more..
From Information Age The average European organisation loses more than £3 million pounds every year from 36 critical IT events, according to a new study. A critical IT event occurs when a business application or infrastructure is down or has a malfunction. This results in a business process being halted, or users ... read more..
From SC Magazine The UK government has confirmed nearly £2 billion of investment in cyber security as part of its new cyber security strategy. UK Chancellor Philip Hammond, presenting to Microsoft's Future Decoded conference, made a speech in which he set out the government's landmark cyber security strategy for the next ... read more..
From ZDNet We've known what 'professional' computers have looked like for at least 40 years and neither the new Apple MacBook Pro 15 nor Microsoft's Surface Studio fit the bill. Both products sacrifice performance, functionality and upgradability for appearance. This is not to say they can't be used for professional ... read more..
From V3.co.uk Twitter users have been warned of a Promoted Tweet appearing in feeds that offers to help them get their account verified, but is actually a phishing scam hiding in plain sight. The message, which could appear in users' feeds regardless of who they follow, contains a link to ... read more..
From ComputerWeekly.com Information commissioner Elizabeth Denham has welcomed the UK government's confirmation that it will implement the EU's General Data Protection Regulation (GDPR) despite the outcome of the UK referendum. In a blog post, Denham wrote: 'I see this as good news for the UK. One of the key drivers ... read more..
From SC Magazine A new online cyber risk tool has been produced to allow organisations to assess their cyber security strengths and weaknesses. The tool has been created in response to research from BAE Systems that reveals weaknesses in UK cyber security measures that are putting businesses at risk. It ... read more..
From V3.co.uk Top-level executives must be made to understand the risk they pose to their own firms owing to the nature of their position and should drive cyber security awareness across the business, according to Darren Argyle, CISO at market research firm IHS Markit. Argyle said at the Investment Week ... read more..
From CIO Ransomware quite often targets businesses (for example hospitals) rather than individuals. Corporations have more valuable data and more money for ransom (ransom increases from roughly $500 per computer to $15,000 for the entire enterprise). Cyphort has examined different variants of ransomware to help users get an idea of ... read more..
From Information Age In the BYOD era mobile devices are becoming an increasing presence in the workplace. Bringing your own device is advantageous in a business sense. Employers and employees can stay constantly connected, and can produce work from anywhere in the world (within reason). The ability to be always ... read more..
From Computing.co.uk IT people know that they need to focus on delivering a good service, but they also need to understand the user experience more closely, according to CA Technologies. Speaking at Computing's recent Cloud and Infrastructure Summit, Duncan Bradford, vice president EMEA pre-sales, CA Technologies, explained how IT needs ... read more..
From SC Magazine Over three-quarters (77%) of IT decision makers worldwide are now more concerned about the impact of data hoarding than they were a year ago. New research from Veritas was conducted among 10,022 global office professionals and ITDMs across 13 countries to look into how individuals manage data. ... read more..
From V3.co.uk Staff at Seagate are suing the company after a senior HR executive fell for a phishing scam earlier this year resulting in tax information on thousands of employees being exposed. A class-action lawsuit was filed in July at Northern California District Court accusing Seagate of malpractice and a ... read more..
From Computing.co.uk Google is to step up its campaign for all websites to adopt HTTPS encryption by marking them down as less secure in research results. The search giant intends to start doing it from January 2017, giving website operators a little over three months to sort themselves out. The ... read more..
From IT Pro The RAA strain of ransomware has been tweaked to specifically target businesses, according to Kaspersky Lab. The security firm has uncovered a new version of the troublesome JScript ransomware, after it was first spotted in June this year. 'Just like the previous one, the malware is distributed ... read more..
From SC Magazine Gartner analyst Dionsio Zumerle spoke at the Gartner Security Risk Management Summit about the state of mobile security, focusing on the idea that IT security needs to move to 'people-centric' security practices when it comes to managing mobile devices in the enterprise. Zumerle said: 'All too ... read more..
From ComputerWeekly.com Almost three-quarters (74%) of UK small and medium-sized enterprises (SMEs) think they are safe from cyber attack, despite half of them admitting having suffered a data breach, according to a report by Juniper Research. The research found that 50% of small businesses have suffered a data breach, two-thirds ... read more..
From IT Pro More than 68 million Dropbox customers' usernames and passwords have been leaked after a four year-old hack, it has emerged. The stolen credentials date back to mid-2012 and Dropbox acknowledged last week that it was forcing some customers to reset their passwords if they have not changed ... read more..
From Computing.co.uk Slow and outdated IT costs businesses four whole working weeks per employee per year, to the tune of £2,100 for every person, a new report from Sharp has found. The biggest drain contributing to this figure is searching for files on servers, which accounts for an average of 23 minutes ... read more..
From ZDNet SAP is no stranger to the BI and big data world. Its home grown BI software, its acquisitions of Business Objects in 2007 and Sybase in 2010, and its own development of HANA and HANA Vora make it a true contender. But HANA itself has always been a ... read more..
From ComputerWeekly.com The gender gap in cyber security is mainly a result of poor marketing and perception of the industry by women, according to a report by security certification body Crest. The report is based on a workshop aimed at addressing diversity in the cyber security industry in February 2016 ... read more..
From V3.co.uk The UK government's Innovation UK agency is investing almost £1 million in two new programmes to help 20 UK companies begin developing hardware to take advantage of the Internet of Things (IoT). Two named companies spearheading the initiative, and presumably receiving a goodly amount of the bounty, are Startupbootcamp, which ... read more..