Ian Barker

Linux Mint vs Windows 10 -- which is best for small business productivity?

Business speed

If you're using an old computer in your small business, the likelihood is that you don't have a great deal of money to splash on powerful hardware.

You might therefore be tempted to look for extra performance by using Linux -- and save on the cost of buying the OS into the bargain. But is there really that much of an advantage? James Mawson of Australian site DXM Tech Support has conducted a series of tests to find out.

Continue reading

Security assurance needs a business-focused approach

security meter

Business leaders want to be confident that their operations will continue running as normal without information being compromised. But in today’s fast-moving, interconnected world where the threat landscape is constantly evolving, security assurance programs often provide a false level of confidence.

The Information Security Forum (ISF) is releasing a new report, Establishing a Business-Focused Security Assurance Program which explores how individuals responsible for providing security assurance in their organization can meet the specific needs of business stakeholders.

Continue reading

New platform brings together technologies to improve enterprise cybersecurity

business security

Cybersecurity tools are often designed to work in isolation from each other and that can leave enterprise security operations fragmented as well as difficult and expensive to manage.

A new integrated platform called GreyMatter from ReliaQuest, launched today, aims to bring together technologies, processes and teams to provide greater visibility and control over enterprise security operations.

Continue reading

The impact of data privacy on the healthcare industry

Healthcare data

Healthcare companies are constantly consuming and sharing information to build better patient profiles and improve outcomes. Yet a new report reveals that only 70 percent are very or extremely confident in knowing exactly where their sensitive data is.

The study from data privacy specialist Integris shows that of these 50 percent update their inventory of personal data once a year or less, and a mere 17 percent of respondents are able to access sensitive data across five common data source types.

Continue reading

The biggest data breaches of the last 15 years

hosting tribunal breaches header

We've become pretty well accustomed to large scale data breaches over recent years. But that doesn’t mean that the numbers involved aren't still significant.

Web hosting comparison site HostingTribunal has put together an infographic looking at the 15 biggest breaches of the last 15 years.

Continue reading

Humans are still the weakest link in information security

web threats

According to a new report, more than half of all C-suite executives (53 percent) and 28 percent of small business owners who suffered a data breach say that human error or accidental loss by an external vendor/source was the cause.

The annual data protection report from information security service Shred-It also finds 21 percent of executives and 28 percent of small business owners admit deliberate theft or sabotage by an employee/insider was the cause of the data breach.

Continue reading

Organizations urged to patch for BlueKeep as latest malware charts are revealed

malware alert

Check Point Research, has released its Global Threat Index for May 2019 and is warning organizations to check and patch for the BlueKeep Microsoft RDP flaw in Windows 7 and Windows Server 2008 machines, to prevent the risk of it being exploited for ransomware and cryptomining attacks.

BlueKeep affects nearly a million machines accessible to the public internet and many more within organizations' networks. The vulnerability is critical because it requires no user interaction in order to be exploited. RDP is already an established, popular attack vector which has been used to install ransomware.

Continue reading

Computer downtime is biggest workplace irritant

frustrated

Computer downtime ranks as the most significant irritant in the workplace according to a new survey.

The study of employees at 500 UK businesses carried out by YouGov for Cherwell Software finds 41 percent naming downtime, ahead of forgotten passwords (23 percent), the lack of parking spaces (22 percent) or stolen meeting rooms (15 percent).

Continue reading

Security startup aims to provide better visibility into the cloud

cloud magnifier

As businesses move more of their systems to the cloud to drive digital transformation and gain a competitive edge, IT security teams can struggle to retain the ability to secure data and manage risk.

Israeli startup Orca Security is announcing its Cloud Visibility Platform which uses patent-pending SideScanning technology to deliver comprehensive visibility into the security posture of an organization's cloud footprint in a matter of minutes.

Continue reading

New API network adapters allow for greater automation

network

Among the top networking challenges for enterprises are lack of skills, fragmented management tools and lack of end-to-end network visibility.

Network automation specialist Itential is launching new purpose-built API adapters for Cisco systems that offer support for third party management tools and provide enterprises and service providers with a single network API that simplifies integration and enables end-to-end automation across complex, multi-domain and multi-vendor environments.

Continue reading

LastPass Business brings single sign-on to over 1200 apps

Login key

Hundreds of cloud applications are being used in businesses and IT teams are pressured to achieve high levels of security without introducing complex authentication processes that may reduce workforce productivity.

LogMeIn, developer of the LastPass password management program is launching a new suite of LastPass Business solutions delivering a comprehensive identity offering, built for small and medium sized businesses.

Continue reading

New enterprise platform secures digital assets in transit

Crypto currency

Last month $40 million worth of Bitcoin was stolen in the Binance hack and it's estimated that more than $3 billion has been stolen over the last 18 months due to key theft and stolen credentials.

In order to guard against this type of theft, new company Fireblocks is launching an enterprise platform to protect crypto currency and other digital assets in transit.

Continue reading

Over three billion fake emails sent out daily

Email attack

At least 3.4 billion fake emails are sent around the world every day, according to a new report from email verification company Valimail, with the majority of suspicious emails coming from US-based sources.

The report shows that email impersonation -- accounting for 1.2 percent of all email sent in the first quarter of 2019 -- is a phishing attacker's primary weapon to gain access into an organization's network, systems, intellectual property and other sensitive assets.

Continue reading

Wi-Fi past, present and future

Wi-Fi

Wireless networking is something we've come to take for granted in recent years. ISPs often give away a wireless router when you sign up for an internet connection with the consequence that Wi-Fi is now in most homes.

Networking specialist Netgear has produced an infographic looking at the origins of Wi-Fi, how it's developed and where it’s going in future.

Continue reading

Want someone's personal data? Give them a free donut

Donut

While you might expect Homer Simpson to hand over personal details in exchange for a donut, you wouldn't expect cybersecurity professionals to do the same.

However, technology services provider Probrand has carried out a study at a cyber expo attended by UK security professionals, where attendees voluntarily shared sensitive data including their name, date of birth and favourite football team -- all to get their hands on a free donut.

Continue reading

© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.