In the past, wearable computing devices, commonly known as wearables, were primarily used for health purposes. Runners, for example, would use them to track their vital signs as well as the distances they ran. Products like Android Wear and Apple Watch, however, have pushed wearables out of the health niche and into popular culture. These devices are not limited to …
4 Reasons to Use a Cloud-based Data Backup Solution
A solid data backup plan can help your company survive catastrophic data loss. Both cloud-based and traditional in-house solutions can be used to back up data. However, cloud-based solutions have several notable advantages. Here are four reasons to use a cloud-based data backup solution: 1. Cost To implement an in-house data backup solution, your company must purchase all the required …
How Cloud Service Providers Can Prove Their Data Security Claims
Cloud service providers (CSPs) often claim that their customers’ personal data is secure in their clouds. You can now check to see whether that is the case, thanks to a global standard published in 2014. People often refer to the standard as ISO 27018 but its official title is “ISO/IEC 27018:2014 — Information technology — Security techniques — Code of practice …
Password protection, is your password secure enough?
Password protection is essential to avoid hackers into your private and personal data. On Tuesday, the password-management company SplashData released its annual list of the most popular passwords of the past year. SplashData took a look at the more than 2 million passwords that got leaked last year, analyzing the most commonly leaked passwords and those that were least secure. Most …
What´s stopping innovation?
Innovation is the driving factor in our today´s economy and has to be engaged in. However, there are some factors in our society that are preventing innovation from taking place at a faster speed. A study of innovation and data use A study conducted by Intel and Harris Poll discovered that there is a distrust against data usage inhibiting the process of …
Email Mistakes That Can Cause Serious Data Security Breaches
Email mistakes caused by careless human error is one of the main causes of IT mail problems. Many companies know how disastrous these mistakes can be. As the Ponemon Institute’s 2014 Cost of Data Breach Study pointed out, nearly one-third of all data breaches were caused by careless human error. Email mistakes in particular stand out as significant causes of …
Cyberthreat Affecting 950 Million Mobile Devices
Cyberthreat vulnerabilities are everywhere. Cybersecurity firm Zimperium announced in July 2015 that it had discovered a major vulnerability in Google’s Android mobile operating system. The flaw potentially allows hackers to access approximately 95% of all Android smartphones and tablets. That adds up to around 950 million mobile devices that are at risk. A Uniquely Dangerous Cyberthreat Usually, hackers need their …
What Surveys Say about Moving to the Cloud
Cloud computing has surged in popularity. The 2015 Cloud Security Spotlight Report clearly makes this point. More than 70 percent of the 1,010 participants reported that they use or plan to use a cloud computing solution. Yet, some organisations are still apprehensive about using the cloud. Common Concerns Organisations hesitant about cloud computing are often concerned about: Security. Security is …
3 Ways to Protect Your Data During a Power Outage
[one_half padding=”0 5px 0 0″] The only thing longer than the Load Shedding schedule is the list of damaged equipment and data loss we have seen from it. When Rolling Blackouts and Load Shedding occur, protecting your computer and network may not be on your list of priorities. However, Load Shedding damaged equipment is more common than you think. With the …