BetaNews Staff

Combating insider threats: The pillars of an effective program

insider threat

Insider threats can be the most dangerous threats to an organization -- and they’re difficult to detect through standard information security methods. That’s partially because the majority of employees unknowingly pose a risk while performing their regular business activities.

According to data we collected from analyzing the behaviors of more than a million insiders across organizations, in approximately 90 percent of data loss prevention incidents, the employees are legitimate users who innocently send out data for business purposes. They are exhibiting normal behavior to their peers and department, even though it might be in violation of the established business policy and a significant risk to their employer.

Continue reading

Dell announces Datacenter Scalable Solutions server line

In an effort to expand its share of the server market, Dell has announced today that it will be launching a new line of servers targeting companies that do not require the server volume of a hyperscale data center.

Instead, Dell will be catering to companies involved in web technology, telecommunications, hosting, utilities such as oil and gas, and research institutions. Dell hopes to meet the unique needs of companies in these fields with its Datacenter Scalable Solutions (DDS) units.

Continue reading

Post Deletion Stress Disorder: Is it real?

Delete button

A recent study, which asked 1,000 UK consumers about their digital device habits, has revealed that more than half of them (56 percent) delete things from their devices to make room for something else, and then regret doing so.

The move is called Post Deletion Stress Disorder and, according to a press release from the study’s maker WD, is only set to continue.

Continue reading

UK banking customers believe PIN will soon be obsolete

ATM keypad

A grim future awaits the PIN code, if Brits are to be believed. According to a recent survey, a majority of Brits believe PIN will be a thing of the past, and soon.

In a survey of 2,000 UK banking customers, financial technology company Intelligent Environments has found that two thirds of Brits (67 percent) believe the PIN will soon be obsolete. When those respondents were asked to predict how quickly this might happen, the average response was just under five years.

Continue reading

Security tips for Black Friday shoppers

More than a quarter of UK and US-based online shoppers would proceed with a bargain purchase without first checking if the website is secure, a new survey has shown.

Moreover, shoppers in the US are more likely to put themselves at risk than those in the UK, with more than a third of US-based respondents admitting that they wouldn’t check the website’s security before purchasing. This is particularly worrying given that more than half of shoppers are expecting to use their credit or debit card to purchase goods this Black Friday weekend.

Continue reading

BullGuard Internet Security 2016 offers good value for home users [Review]

Recent reports have highlighted that it’s security at the endpoint which often leaves businesses exposed. This applies not just to machines in the office but also to mobile and BYOD devices, so some sort of security solution is essential.

BullGuard has released its latest Internet Security suite this month which is fully Windows 10 compatible and includes a number of things that make it an attractive option for business users. New features like Dropbox compatible backup and storage ensure that business data is properly protected.

Continue reading

Companies want to go after their attackers

Corporates on both sides of the Atlantic are calling for changes in the law to allow them to fight back against the current wave of cybercrime.

As things now stand, corporates are discovering that the very laws meant to protect individuals against being hacked are now serving to protect the organized criminal gangs (OCGs) who are stealing billions from their accounts, compromising sensitive customer data and ransoming their most confidential data.

Continue reading

Li-Fi wireless transfers are 100 times faster than Wi-Fi

Li-Fi, the technology which uses light instead of radio waves to transmit data has been tested outside the laboratory environment. The result? Possible Internet speeds a hundred times faster than what we currently have.

So how does this technology work? An LED flicks on and off at speeds imperceptible to the naked eye which can be used to write and transmit information in binary code. It’s basically Morse code, only for computers.

Continue reading

Budget airlines driving in-flight Wi-Fi adoption

Man holding an iPad tablet on a plane next to the window

A new study from Juniper Research, titled In-Flight Entertainment & Wi-Fi Connectivity, Market prospects 2015-2020, has revealed that the adoption of in-flight Wi-Fi by budget airlines will provide a boost to the connected IFE (in-flight entertainment) market.

Juniper’s findings suggest that budget airlines hosting in-flight Wi-Fi will drive the number of connected commercial aircraft to over 10,400 by 2020, which is a threefold increase from an estimated 3,200 this year.

Continue reading

Five best practices for securing mobile devices and everything they touch

In the span of just one year from 2012 to 2013, smartphone thefts in the U.S. nearly doubled to 3.1 million, and another 1.4 million were lost, according to Consumer Reports. For businesses and other organizations, every one of those losses and thefts could enable multiple security breaches. That’s because confidential data stored on the phone isn’t the only asset that’s vulnerable. As a trusted device, that phone also has access to corporate networks and the data stored on them.

More than half of North American and European companies are developing a bring-your-own-device (BYOD) policy, Forrester Research says. These policies implicate security risks because, for example, employees are reluctant to give their IT departments the power to remotely erase their smartphone or tablet when it’s lost, stolen, or the employee separates from the company. Part of employees’ fear is that the device will be wiped by mistake, costing them irreplaceable personal data such as photos.

Continue reading

SAP's customers are tired of hearing buzzwords

SAP customers are growing tired of vendor buzzwords and hype, desiring more practical advice on digital products, according to a recent survey.

Research conducted by the UK & Ireland SAP User Group found that 80 percent of respondents were skeptical of terms such as "digitalization" and "digital transformation". Fifty-eight percent of SAP customers also believe that vendors over-hype their terminology.

Continue reading

Adware uses Android's accessibility features to install malware

Mobile app threats

There’s an adware out there which uses features for the visually impaired to install malicious apps on an Android-powered device. The worst part is that it doesn’t use a vulnerability in the system, but instead abuses a service’s legitimate features.

Researchers from mobile security provider Lookout have spotted the abusers and published a blog post about it.

Continue reading

The cost of cybercrime in UK reaches £1.6 billion

cyber criminal

Norton by Symantec has released the findings from its Cybersecurity Insights Report. This online survey was conducted across 17 markets and took into account the responses from 17,125 consumers over the age of 18.

Norton’s report has revealed how heavily British consumers have been affected by cybercrime and the stark differences between the ways in which Baby Boomers and Millennials protect themselves online.

Continue reading

EE might block ads at cellular network level

EE is looking to start a debate on a particularly sensitive topic -- online ads on mobile platforms. According to a news report by Tech Radar, the British mobile network operator and internet service provider is weighing its options on the idea of blocking advertising on a network level.

Chief executive Olaf Swantee said it’s an important debate about customer control.

Continue reading

Choosing an enterprise search tool

data search

Having the right enterprise search tool is essential if you want to get the most use of your content and databases. However, many companies have no idea what they should be looking for with these tools.

In this article, we'll be covering some of the most important capabilities that the software you choose should contain. We'll also be covering what each of these capabilities does and why it is important.

Continue reading

© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.