FutureFive Australia - Consumer technology news from the future

Stories by Staff - Page 8

Opportunity ahead

New opportunity arises for partners in the channel

Fri, 15th Jul 2016
#
firewalls
#
network infrastructure
#
network security
With Australia's commitment to invest significantly in cyber security, the time is right to focus on your client's security requirements.
Television garbage

Platform-based services are fast becoming prime differentiators in the media transformation era

Mon, 27th Jun 2016
#
partner programmes
#
ovum
#
managed services
The emergence of new pure-play OTT services is gradually pushing digital service providers to embark on the media transformation journey.
Thinkstockphotos 522149584

Windows 10 security and privacy: An in-depth review and analysis

Wed, 22nd Jun 2016
#
malware
#
gaming
#
digital entertainment
As Windows 10 approaches its one year anniversary, it is interesting to take a look at how far the operating system has come.
Thinkstockphotos 515643568

From a drip to a flood - the impact of a data leak

Tue, 14th Jun 2016
#
cybersecurity
#
data leak
#
cyber attacks
Data leaks, especially from an organization's point of view, are a huge and growing problem, as the fallout can be devastating.
Email scam

Protecting email is essential to your security strategy

Wed, 8th Jun 2016
#
firewalls
#
network infrastructure
#
network security
Fortinet's Gary Gardiner explains why email security is perhaps the most cost-effective network protection you can deploy.
Thinkstockphotos 517277450 7v5wndw

Ransomware: Easy to get hit, difficult to stop and costly to recover

Wed, 8th Jun 2016
#
malware
#
firewalls
#
data protection
Fortinet's Gary Gardiner explains what ransomware is, how it works and ten tips to keep your data and applications from being held for ransom.
Thinkstockphotos 463151329

Windows flaw enhances DNS hijacking

Tue, 7th Jun 2016
#
malware
#
cybersecurity
#
microsoft
ESET discovers new version of DNS Unlocker with sneaky capabilities to re-configure DNS settings on victims' computers.
Ransomware laptop

Fortinet and Ransomware: What your clients need to know

Fri, 3rd Jun 2016
#
malware
#
firewalls
#
network infrastructure
The best way to protect your digital assets from Ransomware is to not get compromised in the first place - but can it be done?.
Samsung galaxy s7

Cool new features of the Samsung Galaxy S7

Mon, 30th May 2016
#
digital signage
#
displays
#
samsung
While some consider the latest update to the Galaxy line of handsets to be minor, there are some very important changes.
Security wall breach

Internal segmentation firewalls: Securing the inner network

Thu, 26th May 2016
#
firewalls
#
network infrastructure
#
network security
The good news is that edge firewalls do an excellent job of protecting the network border. The bad news is that they can't help after a breach occurs.
Ransomware1

Ransomware: What your clients need to know

Thu, 26th May 2016
#
malware
#
firewalls
#
network infrastructure
CryptoWall, Locky, TeslaCrypt. To make sense of today's tech headlines, you have to learn an entire new vocabulary. Here's a few basics.
Thinkstockphotos 505534246a

Five easy steps to prep business for a software-defined WAN

Thu, 19th May 2016
#
network infrastructure
#
sd-wan
#
sdn
Software-defined wide area network (SD-WAN) tech is the latest advance in a steady evolution that continues to make business communications easier.
Thinkstockphotos 141115581a

Data-centric security for the Internet of Things

Thu, 19th May 2016
#
data protection
#
data analytics
#
martech
The Internet of Things (IoT) & its dependence on the cloud has created new, critical security challenges in the escalating fight against cyber-crime.
Thinkstockphotos 78434806a

Three ways to use IT operations management to empower business innovation

Mon, 16th May 2016
#
logicalis
#
it management
#
partners
According to a recent survey of 400 CIOs and IT directors in 24 countries, businesses today are at a tipping point of IT department transformation.
Thinkstockphotos 521543634a

The customer experience expectation gap

Mon, 16th May 2016
#
crm
#
uc
#
cx
Last Monday afternoon, as I rode to JFK Airport en route to a conference, I realized that I'd left my travel credit card on my dresser.
Thinkstockphotos 133626971a

Should the Government regulate cybersecurity?

Fri, 13th May 2016
#
firewalls
#
network infrastructure
#
network security
Trying to codify cybersecurity regulations can be a lot like trying to paint a racecar as it zips around the track.
Thinkstockphotos 174472120a

Has IoT increased our exposure to cyber threats?

Thu, 12th May 2016
#
mdm
#
iot
#
supply chain
Cybersecurity is already top of the agenda for many corporate boards, but the scale and scope of the Internet of Things escalates security risk.
Backwards

Acer works to maintain lead in competitive PC market

Mon, 9th May 2016
#
pc hardware
#
acer
#
notebook
Acer battles for supremacy in the fierce PC industry, positioning itself as an innovator amidst giants with clearer visions.
Digitaltime

The key to digital success is time

Thu, 5th May 2016
#
healthtech
#
b2b
#
accenture interactive
Accenture reveals patience is essential for digital prowess, as time-honed strategies yield market leadership in new study.
Clock

Three steps to compliance for end-of-life systems

Tue, 3rd May 2016
#
windows
#
carbon black
#
partners
Each time a vendor terminates support for an OS or solution, organisations are put at risk of failing to meet regulatory and compliance mandates.