Legacy tech giants look to gain a foothold in the enterprise hybrid cloud market, but public cloud leader Amazon calls it a short-term pipe dream.
This week’s news roundup looks at an unexpected type of leak at British Gas, the need to use unique and strong passwords for every website you visit, the scams commonly found on social networks and a quick look at just how much data WhatsApp’s new calling feature records about your calls.
Data breaches come in many different forms and sizes. Not all are a result of malicous hackers, but each can be just as devastating when victims’ personal information falls into the wrong hands.
Cloud-based enterprise tools can help keep remote staff on task, working efficiently, and communicating clearly. Here are the six essentials.
With the continual evolution of the internet and the devices that connect to it, there was a certain inevitability about the amalgamation of the two. Named the ‘Internet of Things,’ that coming together has opened up a whole new world of possibilities. But have manufacturers fully grasped the concepts of security and privacy surrounding this proliferation of web-enabled devices?
If nothing else, this week’s news has taught us the importance of having an incident response plan in place and reminded us that we are individually all targets for criminals. But it’s not all doom and gloom, as demonstrated by an enterprising 11-year-old who has made secure passwords her business.
For economic reasons above all else, Safe Harbour is likely to make a comeback, though possibly under a different name. The EU could force the hand of the United States to draw back its mass surveillance programs, succeeding on the behalf of businesses where the interests of individuals failed.
Why Dell, EMC, and other legacy enterprise hardware players won’t be put out of business by the cloud. A comeback is just a patent or acquisition away.
Has someone taken explicit video footage or still images of you and posted it on the internet? If they have, I really feel for you; it’s a horrific, damaging crime. But there is some help out there in the form of the law and specialised support groups run by people just like you.
If a recovery consists of over 100 terabytes of data, it could take days or even over a week to get up and running again. Pre-recovery solves that.