Automation of routine tasks with applications is more efficient than using manual tools. Yet most companies rely on manual tools, according to a ServiceNow survey. Eighty percent of the 915 surveyed managers reported that their companies still use manual tools and that those tools cause significant delays. On average, the managers said they spend two days every week using them to …
Insider Threats: How to Counter Internal Cybersecurity Risks
If you ask people about cybersecurity, they will probably start talking about hackers breaking into a company’s computers from hundreds of miles away. However, a threat just as destructive could be hiding inside that company’s offices. This is commonly referred to as insider threats. These insider threats typically fall into two groups. The first group consists of careless employees who …
The Advantages and Challenges of Using Wearables in the Workplace
In the past, wearable computing devices, commonly known as wearables, were primarily used for health purposes. Runners, for example, would use them to track their vital signs as well as the distances they ran. Products like Android Wear and Apple Watch, however, have pushed wearables out of the health niche and into popular culture. These devices are not limited to …
Security Warning For Older Versions of Internet Explorer
If you are using an older version of Microsoft Internet Explorer, there is an important deadline that has just passed: January 13, 2016. From this date, only the most recent version of Internet Explorer available for a supported operating system will receive security updates and technical support. In other words, you will receive security patches only if you are running …
How Cloud Service Providers Can Prove Their Data Security Claims
Cloud service providers (CSPs) often claim that their customers’ personal data is secure in their clouds. You can now check to see whether that is the case, thanks to a global standard published in 2014. People often refer to the standard as ISO 27018 but its official title is “ISO/IEC 27018:2014 — Information technology — Security techniques — Code of practice …
8 Tips for Preparing Your 2016 IT Budget
While some businesses do not bother with an IT Budget, they can be extremely worthwhile. Besides helping you manage costs, an IT budget can highlight areas where you might need to invest more resources. It can also keep you on track in meeting your financial goals. Here are eight tips that can help you prepare an effective IT budget for …
Password protection, is your password secure enough?
Password protection is essential to avoid hackers into your private and personal data. On Tuesday, the password-management company SplashData released its annual list of the most popular passwords of the past year. SplashData took a look at the more than 2 million passwords that got leaked last year, analyzing the most commonly leaked passwords and those that were least secure. Most …
Reasons for Managed Services in 2016
As cited in CompTIA’s 4th Annual Trends in Managed Services report, “the global managed-services market is predicted to grow to $193B by 2019, at a Compound Annual Growth Rate (CAGR) of 12.5%.” What is fueling this impressive level of adoption? Why are so many business owners fans of your business model? We dug into the report to examine the top …
Making Sense Out of Wi-Fi Sense
Windows 10 includes the Wi-Fi Sense feature. It’s gotten good press and bad. By learning the facts without all the hype, you can make up your own mind about whether to use it. Wi-Fi Sense helps you find open wireless access points, better known as open Wi-Fi hotspots, so you can get online. You can also use it to connect …
What´s stopping innovation?
Innovation is the driving factor in our today´s economy and has to be engaged in. However, there are some factors in our society that are preventing innovation from taking place at a faster speed. A study of innovation and data use A study conducted by Intel and Harris Poll discovered that there is a distrust against data usage inhibiting the process of …
Cyberthreat Affecting 950 Million Mobile Devices
Cyberthreat vulnerabilities are everywhere. Cybersecurity firm Zimperium announced in July 2015 that it had discovered a major vulnerability in Google’s Android mobile operating system. The flaw potentially allows hackers to access approximately 95% of all Android smartphones and tablets. That adds up to around 950 million mobile devices that are at risk. A Uniquely Dangerous Cyberthreat Usually, hackers need their …
Planning your 2016 IT Budget
Planning for success is nice in theory, but it’s hard for any business, especially in South Africa. Everyone knows the term “if you fail to plan, you plan to fail.” The reason everyone has heard that term before is because planning and budgeting is critical for business success. Here at Multi we believe an IT Budget can help save you …