Data breaches come in many different forms and sizes. Not all are a result of malicous hackers, but each can be just as devastating when victims’ personal information falls into the wrong hands.
Cloud-based enterprise tools can help keep remote staff on task, working efficiently, and communicating clearly. Here are the six essentials.
With the continual evolution of the internet and the devices that connect to it, there was a certain inevitability about the amalgamation of the two. Named the ‘Internet of Things,’ that coming together has opened up a whole new world of possibilities. But have manufacturers fully grasped the concepts of security and privacy surrounding this proliferation of web-enabled devices?
If nothing else, this week’s news has taught us the importance of having an incident response plan in place and reminded us that we are individually all targets for criminals. But it’s not all doom and gloom, as demonstrated by an enterprising 11-year-old who has made secure passwords her business.
For economic reasons above all else, Safe Harbour is likely to make a comeback, though possibly under a different name. The EU could force the hand of the United States to draw back its mass surveillance programs, succeeding on the behalf of businesses where the interests of individuals failed.
Why Dell, EMC, and other legacy enterprise hardware players won’t be put out of business by the cloud. A comeback is just a patent or acquisition away.
Has someone taken explicit video footage or still images of you and posted it on the internet? If they have, I really feel for you; it’s a horrific, damaging crime. But there is some help out there in the form of the law and specialised support groups run by people just like you.
If a recovery consists of over 100 terabytes of data, it could take days or even over a week to get up and running again. Pre-recovery solves that.
When I was growing up The Smurfs were cute cartoon characters and petrol station collectibles. In 2015 they’re something far more sinister – a collection of tools used by the security services to compromise smartphones and the people who own them.
CJEU Advocate General Yves Bot says the European Commission’s decision granting Safe Harbour status to the US should be suspended in the wake of Snowden.