Penny Swift
Cybercriminal Report Users are the weakest link when it comes to cybersecurity, with only 1 percent representing 75 percent of the security risk in a cloud environment, according to a new cloud cybersecurity report released yesterday. The CloudLock Cyberlab analyzed
Read MorePublic-Private Cyber-Catastrophe The increasing risks from cyber threat could result in the United Kingdom (and other countries) being exposed to “catastrophic consequences” that could never be covered by existing insurance cover – with single event estimates ranging from between £2
Read MoreConference Call Survey Online conference calls using Cloud and Connected devices have become a norm in most modern businesses. As long as employees can access a computer, or have a smartphone or other mobile device available, they can make the
Read MoreWomen Discriminated Against In Tech Sector It is no secret that the tech industry is considered sexist since most women are paid less than men; there are considerably fewer women in tech jobs; and generally men get promoted above women.
Read MoreCybersecurity Survey Reveals Endpoint Risk A survey conducted at Black Hat 2015 reveals that endpoint poses the greatest security to threat to cybersecurity, with 90 percent of respondents stating their organizations would be more secure if Flash was disabled. Black
Read MoreUS Government OPM Cyber Breach Much Worse Than Reported The much publicized breach at the US government Office of Personnel Management (OPM) in May this year was much more serious than initially reported, in terms of the number of people
Read MoreControversial Cybersecurity Bill As the US Senate prepares to vote on the controversial Cybersecurity Information Sharing Act just days before the August recess, the Department of Homeland Security (DHS) has warned that the privacy of US citizens and organizations may
Read MoreDigital Marketing Successful digital marketing campaigns are being driven largely by trending technologies, specifically the Internet of Things (IoT), Big Data, and The Cloud. These may be used for a huge number of marketing applications, from optimizing the performance of
Read MoreWorld Wide Web Labeled Wild Wild West of Internet Cyber Attacks A new “threat report” labels the World Wide Web (www) the Wild Wild West of cyber warfare stating that the Internet is still “an untamed frontier.” The report from
Read MoreImproving Efficiency With The Cloud A major percentage of IT professionals are following cloud adoption strategies to improve IT efficiencies and reduce their costs. Additionally, a large percentage of professionals see cloud usage and cost tracking as vitally important to
Read MoreCybersecurity Efforts For 2015 The White House has issued a fact sheet that details its efforts to ensure that cyber defense strategies are meeting the critical cybersecurity challenges currently facing the USA. This is in response to the increased sophistication
Read MoreCode42 Appoints Joe Payne As New CEO The US endpoint data protection and security company, Code42 has appointed experienced software-as-a-service (SaaS) executive, Joe Payne as its new president and chief executive officer (CEO). Payne, who has a strong reputation for
Read MoreCyber Security Threat A recent whitepaper on cyber security in the US government reveals that that the increasing number of mobile phones being used within federal agencies is escalating the risk of cyber threat from inside agencies. It also cites
Read MoreChina Drafts New Law State media in China today revealed that its parliament has published a draft law that will “safeguard national cyberspace sovereignty,” as well as “security and development.” It is widely agreed that once accepted, the new law
Read More