Stories by Staff - Page 8
New opportunity arises for partners in the channel
Fri, 15th Jul 2016
#
firewalls
#
network infrastructure
#
network security
With Australia's commitment to invest significantly in cyber security, the time is right to focus on your client's security requirements.
Platform-based services are fast becoming prime differentiators in the media transformation era
Mon, 27th Jun 2016
#
partner programmes
#
ovum
#
managed services
The emergence of new pure-play OTT services is gradually pushing digital service providers to embark on the media transformation journey.
Windows 10 security and privacy: An in-depth review and analysis
Wed, 22nd Jun 2016
#
malware
#
gaming
#
digital entertainment
As Windows 10 approaches its one year anniversary, it is interesting to take a look at how far the operating system has come.
From a drip to a flood - the impact of a data leak
Tue, 14th Jun 2016
#
cybersecurity
#
data leak
#
cyber attacks
Data leaks, especially from an organization's point of view, are a huge and growing problem, as the fallout can be devastating.
Protecting email is essential to your security strategy
Wed, 8th Jun 2016
#
firewalls
#
network infrastructure
#
network security
Fortinet's Gary Gardiner explains why email security is perhaps the most cost-effective network protection you can deploy.
Ransomware: Easy to get hit, difficult to stop and costly to recover
Wed, 8th Jun 2016
#
malware
#
firewalls
#
data protection
Fortinet's Gary Gardiner explains what ransomware is, how it works and ten tips to keep your data and applications from being held for ransom.
Windows flaw enhances DNS hijacking
Tue, 7th Jun 2016
#
malware
#
cybersecurity
#
microsoft
ESET discovers new version of DNS Unlocker with sneaky capabilities to re-configure DNS settings on victims' computers.
Fortinet and Ransomware: What your clients need to know
Fri, 3rd Jun 2016
#
malware
#
firewalls
#
network infrastructure
The best way to protect your digital assets from Ransomware is to not get compromised in the first place - but can it be done?.
Cool new features of the Samsung Galaxy S7
Mon, 30th May 2016
#
digital signage
#
displays
#
samsung
While some consider the latest update to the Galaxy line of handsets to be minor, there are some very important changes.
Internal segmentation firewalls: Securing the inner network
Thu, 26th May 2016
#
firewalls
#
network infrastructure
#
network security
The good news is that edge firewalls do an excellent job of protecting the network border. The bad news is that they can't help after a breach occurs.
Ransomware: What your clients need to know
Thu, 26th May 2016
#
malware
#
firewalls
#
network infrastructure
CryptoWall, Locky, TeslaCrypt. To make sense of today's tech headlines, you have to learn an entire new vocabulary. Here's a few basics.
Five easy steps to prep business for a software-defined WAN
Thu, 19th May 2016
#
network infrastructure
#
sd-wan
#
sdn
Software-defined wide area network (SD-WAN) tech is the latest advance in a steady evolution that continues to make business communications easier.
Data-centric security for the Internet of Things
Thu, 19th May 2016
#
data protection
#
data analytics
#
martech
The Internet of Things (IoT) & its dependence on the cloud has created new, critical security challenges in the escalating fight against cyber-crime.
Three ways to use IT operations management to empower business innovation
Mon, 16th May 2016
#
logicalis
#
it management
#
partners
According to a recent survey of 400 CIOs and IT directors in 24 countries, businesses today are at a tipping point of IT department transformation.
The customer experience expectation gap
Mon, 16th May 2016
#
crm
#
uc
#
cx
Last Monday afternoon, as I rode to JFK Airport en route to a conference, I realized that I'd left my travel credit card on my dresser.
Should the Government regulate cybersecurity?
Fri, 13th May 2016
#
firewalls
#
network infrastructure
#
network security
Trying to codify cybersecurity regulations can be a lot like trying to paint a racecar as it zips around the track.
Has IoT increased our exposure to cyber threats?
Thu, 12th May 2016
#
mdm
#
iot
#
supply chain
Cybersecurity is already top of the agenda for many corporate boards, but the scale and scope of the Internet of Things escalates security risk.
Acer works to maintain lead in competitive PC market
Mon, 9th May 2016
#
pc hardware
#
acer
#
notebook
Acer battles for supremacy in the fierce PC industry, positioning itself as an innovator amidst giants with clearer visions.
The key to digital success is time
Thu, 5th May 2016
#
healthtech
#
b2b
#
accenture interactive
Accenture reveals patience is essential for digital prowess, as time-honed strategies yield market leadership in new study.
Three steps to compliance for end-of-life systems
Tue, 3rd May 2016
#
windows
#
carbon black
#
partners
Each time a vendor terminates support for an OS or solution, organisations are put at risk of failing to meet regulatory and compliance mandates.