BetaNews Staff

Major Avast and AVG update adds 64-bit support, drops XP/Vista

When an existing user purchases a new activation code, they often have problems installing the 'latest' version of their security suite because they often overlook that as part of their subscription they will always have the latest version.

This is why the likes of Avast and AVG dropped year version numbers, making it more difficult to know when a major release has been made available. Earlier today Avast released the 19.1 editions of their security products and this is a significant update.

Continue reading

4 critical steps to building an IoT network

Internet of things

The biggest mistake often made in building an IoT network for the first time is in underestimating the complexity of IoT network design, operation and management -- and believing that legacy network technologies and engagement models will support the requirements of large-scale IoT deployments.

Building an IoT network is not as easy as it sounds and the process of building your own tends to break down when confronted with massive scale. What may seem to be an easy task of deploying gateways and managing device provisioning and connectivity quickly becomes challenging with respect to scaled site and network operations. Some may also find challenges with sourcing and qualifying end devices for their applications, device configuration and management, implementing encryption and security services, and ultimately generating contextualized data for their use cases. Taking the following four steps to develop your IoT network buildout is essential.

Continue reading

The elements of cybersecurity hygiene and secure networks -- Part 2

Cloud data security

The blackhat hackers are evolving as quickly as technology is. To protect their sensitive information, companies can put documents in a public cloud. Why the public cloud? While it might seem that public cloud solutions are less reliable than traditional IT platforms, the reality is that they’re actually more secure. With the cloud, a company’s security team is able to monitor network audit logs more closely to detect any abnormalities. Furthermore, audit data can be easily centralized without having to navigate through inconvenient firewall interfaces and other closed proprietary systems. These components are essential for improving security procedures.

The public cloud also allows for more thorough security analyses after an audit. Cloud data analysis systems allow the audit data to be inspected in a more efficient, cost-effective way. These systems take in large quantities of information and are available whenever they’re needed. Real-time monitoring and automated alerts also allow for an immediate response in the event of a security breach. This can dramatically reduce the impact of security incidents and help pinpoint areas that need to be addressed. 

Continue reading

Reporting from the other side: Why journalism needs VPNs

VPN tiles

Getting news out of hostile territories can potentially be extremely risky, but it is key to making sure that suppressed voices are heard, and that the wider world is aware of what is happening in war zones and regions with unstable leadership.

While the rest of us worry about data security because we’re shopping and banking online, for journalists, an increased focus on this type of security is critical -- particularly for those operating in dangerous regions of the world. As valuable as digital data trails can be to an investigative reporter, they can also work the other way, resulting in a journalist’s identity and stories being revealed. Not only can leaked information limit a journalist’s ability to report the truth, it could also put them and their sources at significant risk.

Continue reading

Krisp reduces background noise on conference calls

The rise of homeworking means one thing, trying to focus on work whilst the family and daily chores are going on around you. Get on a conference call and you have to try and eliminate background noise to sound professional. When you’re on a call you suddenly realize how much noise is going on around you.

Get in the car and head to a coffee shop and you'll find there are people talking around you -- it’s no better at all. You just cannot seem to get away from surrounding noise. And that’s if you can even get a fast enough internet connection and a stable enough call to make it worthwhile and professional enough to impress the other callers.

Continue reading

Quickly migrate your user account to a new PC with the latest PCTrans 10

Boot into your brand new PC and you find you’re welcomed by rather a vanilla operating system, perhaps with a few key default apps installed by the manufacturer.

Although it’s initially interesting to start with a blank canvas, you soon realize not only do you have your most important applications installed but the settings and preferences all need to be setup again from scratch.

Continue reading

Digital workplace disruption in 2019: How job roles are shifting in the professional services industry

Artificial intelligence

In 2018, digital workplace transformation across the professional services market finally began to take hold. Today, applications for professionals across accounting, insurance, consulting and other industries are actually providing anywhere and anytime access, seamless collaboration, intuitive experiences and smart capabilities.

For years, those who worked in the professional services market expected these capabilities from their applications, having used consumer tools like Google, Facebook and Amazon that provide a consistent, easy-to-use experience across every device, allow for straightforward collaboration with trusted friends and family, automate tedious tasks and anticipate needs based on preferences and past behavior. After first resisting these demands and then struggling to deliver such capabilities, 2018 saw the wide-scale emergence of comprehensive technology platforms that deliver mobile, intuitive, collaborative, secure, automated and smart digital workplaces. The digital transformation of the professional services market made professionals’ day-to-day tasks easier, reducing training and other costs for firms, increasing productivity and empowering professionals to be more creative.

Continue reading

Rethinking browsers

Internet security with browser logos

With browsers often in the middle of many corporate activities, it’s no wonder that they are now subject to many of the same challenges encountered on desktops, smartphones and other hardware-based endpoints. Many IT pros wouldn’t consider browsers to be a critical network endpoint, but those pros would surely place importance on mobile devices, laptops, desktops and servers. Given the valuable role browsers play in accessing enterprise applications and information, it’s time to rethink how we classify them and, more importantly, how we manage and secure them.

Mobility and cloud computing are taking over today’s workforce, and the browser’s significance is trending. The majority of office applications -- such as Microsoft Office 365, Salesforce CRM, and the Zoho One business suite -- run in the cloud and are accessible via browser. These kinds of applications allow users to work from anywhere, at any time, using their laptops, smartphones and other browser-enabled devices.

Continue reading

8 key factors for an effective Internet of Things (IoT) network

Internet of things

Connected devices, or the Internet of Things (IoT), are exploding on the market. Securing their access has become one of the major concerns in recent years. But security is only part of the equation. What good is a secure network if you cannot access it?

 As more and more devices connect together, the availability to connect becomes paramount. If your business is going to depend on an IoT infrastructure, it must be available, accessible, and safe from attack. If you cannot count on your infrastructure, you cannot depend on it. When selecting an IoT platform, these are the sort of issues that should be considered.

Continue reading

Infrastructure is the missing piece to an autonomous future

Self Driving Car

Though you may have not noticed their arrival, autonomous vehicles are already here. While we currently experience automation’s convenience on a smaller scale -- like self-parking and lane-keeping capabilities -- fully-autonomous vehicles are projected to offer so much more. For example, fully-autonomous vehicles offer a potential for a 90 percent decrease in traffic fatalities. When you consider a stat like that, it’s no wonder many vehicle manufacturers and government officials are pushing for fully-driverless capabilities.

But a fully-autonomous future won’t become a reality on the efforts of vehicle development and manufacturing alone. Infrastructure updates, particularly in major U.S. cities, will be needed to accommodate these vehicles. As it stands, only six percent of these cities have a long-term infrastructure plan in place for autonomous vehicles to operate efficiently and safely. To create a safer tomorrow, infrastructure design needs to be addressed today.

Continue reading

Email security threats that can ruin your company's holiday season

Most people understand that retail becomes a target for cybercriminals during the holidays. But even businesses not related to the retail sector will often find the holidays their most vulnerable time of year. After all, many individuals (that is, employees) are focused on wrapping up projects before the holidays truly start or are looking ahead to the coming year with the added distraction that the holidays bring.

Businesses need to protect themselves from potential cybersecurity threats during the busy holiday season -- many of which will come in the form of the world’s most commonly used utility, email. In this post, we will take a look at some of the biggest on-premises and cloud email security threats your business faces this holiday season.

Continue reading

Real-time data center monitoring will continue to be the easiest way to cut costs in 2019

Energy costs are one of the fastest-rising expenses for today’s data centers and the global energy ecosystem as a whole. Not only do energy cost make up 70 to 80 percent of ongoing operational expenses, but data centers are projected to soon amount to the largest share of global electricity production, according to Huawei Technologies’ Total Consumer Power Consumption Forecast.

As new technologies enter the data center realm at an increasing rate, expectations for advanced operational environments capable of meeting energy demands are at odds with an ever-present demand to keep costs down. In fact, studies have shown that cost savings continue to be a main motivating factor when selecting data center management tools. While introducing new processes to data center operations -- like real-time data center monitoring -- is key to modernization at a low cost, researchers have found managers need the pressure of an imminent issue or decision to overhaul legacy tech to make the step towards adopting a data center manager tool.

Continue reading

AI: Cybersecurity friend or foe?

Artificial intelligence

AI technology has become widespread and accessible to hundreds of thousands of IT security professionals worldwide. Human researchers are no longer behind their computers crunching the data and numbers, nor should they be when AI technology is available. The increase in computing power, especially through economical cloud solutions and easy-to-use tools, has allowed a much wider range of users to apply sophisticated machine learning and artificial intelligence algorithms to solve their problems.

At the same time, companies and security vendors have realized how difficult it is to fight cyber criminals who are constantly evolving to find new ways to infiltrate corporate networks without being spotted. For IT teams, updating and maintaining security solutions and policies to keep up with this volatile threat landscape is extremely costly and an unsustainable solution to protecting against incoming threats.

Continue reading

The elements of cybersecurity hygiene and secure networks -- Part 1

The two fundamental building blocks in ensuring that your data is secure are physical infrastructure and network security. Understanding and protecting your information from threats and human error requires meticulously layered security protocols.

Last year, British Airways canceled over 400 flights and stranded 75,000 passengers because of an IT outage caused by an engineer who disconnected a power supply at a data center near London’s Heathrow airport. When it comes to data centers and networks, even minor human errors can have a major impact on businesses and their customers. With the exorbitant costs and human resources required to maintain an on-premise system, organizations should look to public cloud companies. These companies bring capital and expertise to the table to properly manage their data centers, which are better protected than those that most companies could put in place themselves.

Continue reading

Edge computing changes everything, including your mobile strategy

Edge computing

It’s tempting to think of edge computing or the Internet of Things (IoT) strictly as something new that you’ll be adding to your enterprise architecture in the coming years. Your company has an enterprise architecture, and now thanks to the IoT revolution you’ll be adding lots of new internet-connected devices, which, depending on your line of business, might be actuators on a factory floor, sensors in a power station cooling tower, or GPS units on a fleet of tractor trailers.

But in reality, IoT and edge computing are not capabilities that are added separately to a company’s existing IT architecture and landscape. Rather, they need to be integrated into existing architectures to deliver on the company’s desired business outcomes.

Continue reading

© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.