Cloud Service Providers

How Cloud Service Providers Can Prove Their Data Security Claims

Cloud service providers (CSPs) often claim that their customers’ personal data is secure in their clouds. You can now check to see whether that is the case, thanks to a global standard published in 2014. People often refer to the standard as ISO 27018 but its official title is “ISO/IEC 27018:2014 — Information technology — Security techniques — Code of practice …

IT Budget

8 Tips for Preparing Your 2016 IT Budget

While some businesses do not bother with an IT Budget, they can be extremely worthwhile. Besides helping you manage costs, an IT budget can highlight areas where you might need to invest more resources. It can also keep you on track in meeting your financial goals. Here are eight tips that can help you prepare an effective IT budget for …

Password protection

Password protection, is your password secure enough?

Password protection is essential to avoid hackers into your private and personal data. On Tuesday, the password-management company SplashData released its annual list of the most popular passwords of the past year. SplashData took a look at the more than 2 million passwords that got leaked last year, analyzing the most commonly leaked passwords and those that were least secure. Most …

VoIP

VoIP will Take Small Business Communication and Collaboration to the Next Level

Voice over Internet Protocol (VoIP) is a set of technologies allowing multimedia communication over the Internet. VoIP has had a substantial impact on the functioning of businesses and communication. The key benefit is obvious — saving money. With no long distance or toll charges, VoIP became an instant hit after launch. Over the years, the application of VoIP has grown …

Wi-Fi

Making Sense Out of Wi-Fi Sense

Windows 10 includes the Wi-Fi Sense feature. It’s gotten good press and bad. By learning the facts without all the hype, you can make up your own mind about whether to use it. Wi-Fi Sense helps you find open wireless access points, better known as open Wi-Fi hotspots, so you can get online. You can also use it to connect …

cyberthreat

Cyberthreat Affecting 950 Million Mobile Devices

Cyberthreat vulnerabilities are everywhere. Cybersecurity firm Zimperium announced in July 2015 that it had discovered a major vulnerability in Google’s Android mobile operating system. The flaw potentially allows hackers to access approximately 95% of all Android smartphones and tablets. That adds up to around 950 million mobile devices that are at risk. A Uniquely Dangerous Cyberthreat Usually, hackers need their …