Facebook iconTwitter icon
B2B-Network:
Latest Articles
Practical Advice
Top 5 cloud security threats in 2018
Thumb cloud7

Information technology will continue to fight against cloud security threats in 2018 just as it has been in the previous years. With the lingering threats that continue looming over businesses this year, the need for practicing data protection is more important than ever before. To know more about these threats, here are the top 5 cloud security dangers:

 

1. Inadequate security tools in the cloud

Most businesses aren't fully equipped with adequate cloud security tools, hence the reason data leakages occur. By investing a little time in an efficient cloud security tool, every...

» Read more
Analysis
Physical Fences Don’t Make Sense in 2017; Companies Need Digital Security
Thumb fingerabdruck2

Identity and Access Management, also known as IAM, involves defining and managing the roles and access rights of network users in an organization. It helps organizations to create authentic digital identities for their people. Administrators need to maintain, modify and monitor these idenities for as long as users retain their access privileges. 

 

IAM's Goal

IAM's overriding goal is to provide prompt access to specific information assets to the right users. The system enables administrators to modify a user's role, track their activities and enforce security...

» Read more
Trend
Ransomware gets an evil brother: extortionware on the rise
Thumb geldwa%cc%88sche

Many people are aware of the widespread ransomware, but only a few know or have experienced extortionware. Although these two elements are security threats, their definition is different and may have diverse effects on the firm. Ransomware involves cyber criminals taking information and blackmailing the company to part with a defined sum of money to have it restored. In this case, the attack may be by the use of a virus which restricts data access by the attacked firm. When such an occurrence happens, the company may risk losing all its data if they do not have an alternative backup.

...

» Read more
Trend
Botnet Army Attacks On Iot Devices to Rise This Festive Season
Thumb christmastree

The recent report on the state of the internet released by Akamai Technologies is a must-read for people dealing on the Internet of Things (IoT) devices. The report points out the changes that have taken place on the security of web application and Android platforms during the third quarter of 2017. Here are some of the highlights of the report:

 

Rise in Web Application Attacks

Web application attacks increased by 48% from the 2nd quarter. The incidents were 30% higher than they were in the same period last year. The number of these attacks increased by 217% over the past year from...

» Read more
News
CEBIT 2018: What you need to know
Thumb cebit

CEBIT 2018 will take place in June next year with a complete new outset, and will feature new event formats, layouts and a new theme. It will focus on four elements;

 

D!conomy

D!conomy is focused towards the digitisation of government and business. It will address the means by which international companies can leverage on the benefits of the digital economy as they can present effective solutions that industrial users require to digitise their operations. D!conomy will feature the following themes; digital office, communication, process and data management, security and...

» Read more
Practical Advice
The Underestimated Importance of Workplace Mobility
Thumb indien

Workplace mobility is a growing business strategy used by some managers to commission the staff to work from anywhere regardless of the time or device being used. This move is backed by the fact that tablets, smartphones, and other smart devices bring flexibility within the workplace when connected through broadband. Various organizations are adopting this idea owing to the following reasons:  

 

Productivity  

Different mobile applications have played a major role in helping workers access and share documents and presentations from different...

» Read more
News
Big Players in Tech Caught in Paradise Paper Leaks
Thumb paradies2

The Paradise Papers is in the news for all the wrong reasons, and it drags the tech industries down with its mire. Paradise Papers constitute about 13 million leaked secret corporate files. The leaks outline tax and financial affairs of corporate and other individuals. Among others, big players in tech industry such as Apple and Facebook figure in the leaked papers.

 

Apple Accused of Exploiting tax Loopholes

Apple has been accused of funnelling its worldwide sales through subsidiaries in Ireland. These subsidiaries, technically “stateless,” pay as little as 0.005...

» Read more
Studie
It's Time to Make the Most of IT Professionals for IT Security
Thumb it

Findings of a recent ISC² study show that companies are not fully using their IT professionals when it comes to cybersecurity. Also, they are not making the most of opportunities to train equip these professionals who play such a vital role in protecting their organisations from cyber threats. Over 3,300 IT professionals were surveyed across the world to deliver these findings as part of a Global Information Security Workforce Study for 2017. The survey shows that proper training and accreditation for IT staff is important because it is the most effective way for many companies to...

» Read more
Studie
How the Digital Workplace is Affecting Every Aspect of Work
Thumb workplace

The use of mobile gadgets has continued to grow, and with it, collaboration solutions have been born. The digital workspace, which is made up of collaborative technologies and mobile has had a significant impact on how businesses are currently using them for decision making in changing purchasing process and attitudes. Digitalisation has also affected employee relation, their interaction with clients, and support partners to create a more efficient and effective business. A workspace strategy is needed for any company to ensure that it remains relevant and competitive in the digital world.

...

» Read more
Analysis
Successfully implementing compliance in business
Thumb ordnung

Regulatory compliance is a key element in every business which needs to stay ahead of the competition in its service delivery. An organisation should always be prepared for a random audit by creating a tradition of compliance. The employees will adopt this culture of compliance and learn acceptable behaviours in the organisation which will, in turn, prevent the business from facing regulatory sanctions. There are, however, some key factors which should be considered when implementing an effective compliance program:

 

Well-Structured Code of Conduct

The company policies...

» Read more

<< Older posts
Loader