Eskenzi PR ad banner Eskenzi PR ad banner

This Week's Gurus

Standing still is the kiss of death for any service provider. If you fail to evolve, your competition advances. Ultimately, you’re either left in the dust or rendered obsolete. It’s imperative for service providers to always look several steps ahead. Planning for the next technology shift or solution set that helps you optimise you network and your applications will lead to improved and modernised service offerings and new customers. This, in turn, can spark a boost...

Read more

Just over a year ago, the European Commission approved and adopted the new General Data Protection Regulation (GDPR). The GDPR is the biggest change in data protection laws in Europe since the 1995 introduction of the European Union (EU) Data Protection Directive, also known as Directive 95/46/EC. The GDPR aims to strengthen the security and protection of personal data in the EU and will replace the Directive and all local laws relating to it. AWS...

Read more
Smart city

A report by the Local Government Association (LGA) last year found that shared services are so embedded across local authorities that they have become standard practice. The LGAs shared services map shows that the vast majority of councils are working together in some form to save money. There are over 400 local authorities in the UK and each are charged with delivering around 800 services, including public transport, local amenities, education, social services, maintenance of...

Read more

Recently payday lender Wonga suffered a monumental data breach with personal details from hundreds of thousands of accounts likely to have been illegally accessed. More than a quarter of a million customers have since been warned that their personal data may have been stolen. This is yet another substantial attack. This comes on top of the recent hugely damaging attacks on a number of well-known UK brands including Tesco Bank and telecoms provider Three. The...

Read more

Defence-in-depth is a philosophy that we’re all familiar with, layering security controls throughout and IT systems so that if one fails or, if vulnerability is exploited, another is there to prevent an attack.  Having become standard practice for the vast majority, this sounds like a great approach, right? Well, perhaps wrong. If the slew of headlines about compromises and breaches - as well as the velocity at which they occur - are to be believed,...

Read more

IoT is having a profound effect on business. 57 per cent of all global businesses have adopted IoT practices and 72 per cent of those believe their company is more profitable since embracing IoT. With this large scalability, however, comes the potential for catastrophe. More connected devices bring new business challenges around scale, interoperability, security and the management of devices and endpoints. Businesses need to think strategically about IoT adoption and not become caught up...

Read more
Hacker sinister threat

As part of its #NoHacked campaign, Google released a report about website security trends, including hacking. Unfortunately, one of the major statistics within the report indicates there’s a lot of progress yet to be made in reducing successful hacks. That’s because, in 2016, the number of hacked sites went up by about 32 percent. Google’s representatives don’t expect that statistic to decrease over time. Hackers are notoriously aggressive and they often target outdated sites. Both...

Read more
malware

Non-malware is a massive and growing cybersecurity issue. Recent research from Carbon Black has shown that the issue is akin to a ticking time bomb with nearly two thirds (64%) of security researchers reporting that they’ve seen an increase in non-malware attacks since the beginning of 2016. The vast majority (93%) of security researchers surveyed also said non-malware attacks pose more of a business risk than commodity malware attacks. A non-malware attack is one in...

Read more

Okay, it’s true. I’m a big fan of the song “Manic Monday” by The Bangles. Released in 1986 by Columbia Records, the song—written by Prince under the pseudonym “Christopher”—was the band’s first hit. It’s a sure bet Prince didn’t have the IT Service Management (ITSM) world in mind when he penned the lyrics. But after reading the research report “Anatomy of the Service Desk in 2016” prepared by the Service Desk Institute (SDI), the song’s...

Read more

For as long as there has been cyber crime, there have been illegal exploit kits for sale. Sure, these vary from the elementary to the advanced, but the malicious tools needed to commit cyber crime, theft, hacktivism or participate in run-of-the-mill online havoc are only a click away. But the raw power, scale and sophistication for sale via those clicks is growing at unprecedented rates. The catalyst for this momentum is, yet again, unsecured Internet...

Read more
Page 29 of 69 1 28 29 30 69