Having a fast internet connection in your hotel room is as likely to lead to a five star TripAdvisor review as to the quality of the sausages served from breakfast. In fact, a survey from UK four-star hotel chain Amba Hotels found that 67 per cent of guests thought free Wi-Fi was the most important factor when choosing a hotel . It was deemed more important even than a good night’s sleep, which came in at 58 per cent, and friendly, knowledgeable staff, at 40 per cent. Belinda Atkins, CEO of Amba Hotels said at the time: “Fast, free, unlimited…
Author: ISBuzz Team
Lack of security controls within aerospace technology could mean outer space is the next target for cyber hackers. Raj Samani, CTO EMEA Intel Security warns that security needs to be taken more seriously in this vulnerable sector. He explains, “Traditionally the aerospace industry has relied on obfuscation as a means to protect itself. However, as we have witnessed within Critical infrastructure the real world exploits quickly follow identified vulnerabilities. “The proliferation of satellites, used to support our everyday connectivity and communications, makes this a growing attack vector. Indeed we have seen multiple examples of vulnerabilities within satellite networks, and this being…
“A few cyber security tips and ways to be alert, helping you great deal in tackling safe and secured Internet, if something suspicious takes place online.” The images you see in daily lives on your smartphone, is just the single most representation of large amounts of data present in the mobile arena. Mobile devices carry much more data then you can ever imagine. Whether multimedia data related to pictures, videos, sounds, security data related to passwords, fingerprint scanning, backups, or even other data, your personal information gets stored at one place or another creating room for phishes or hacks. You…
The trend of moving from physical to virtual servers is likely to continue into 2016, according to Greg McCulloch, CEO of colocation data centre provider, Aegis Data. McCulloch also suggests that higher power consumption and the desire for a smaller physical footprint are driving the increase in server virtualisation: “The increase in power demands and the continuing cycle of server refreshes are having an impact on associated costs and as such, there is a move towards virtualising systems. With increasing cost constraints and the desire to achieve a lower carbon footprint, organisations are continuing the trend of server virtualisation, which…
The Kaspersky Security Bulletin Overall Statistics Report for 2015 highlights a new trend: for the first time ever, mobile financial threats rank among the top ten malicious programs designed to steal money. Two families of mobile banking Trojans – Faketoken and Marcher – were included in 2015’s top ten banking Trojans. Another remarkable and alarming trend for the year is the rapid spread of ransomware. Kaspersky Lab detected this in 200 countries and territories in 2015. Mobile financial threats mature In 2015 two families of mobile banking Trojans (Faketoken and Marcher) appeared in the rankings of the top ten financial…
Are you an IT security specialist dreaming about being something more? Does your career have a ceiling? What is a CISO? In the past, businesses were run by a small senior management team headed up by a managing director who reported to a president or board of directors. In addition, there were line managers who had a thorough knowledge of their own area, but little else. These were often seen as narrowly focused specialists. Today, however, the business landscape looks different. The top leadership has senior level deputies who are experts in their specific fields while at the same time…
‘Twas the night before Christmas, when all through the house not a creature was stirring, not even a mouse. But a laptop was open, the network logged on, and unfortunately for its owner, his security had gone. Unbeknownst to our user, and all others that care, this laptop had malware it wanted to share. It flew over wi-fi, pushed out through the router, and started its journey, from computer to computer. The owner worked, for a big corporate bank, who relied on protection to shield it from pranks. Had the virus arrived at the enterprises door, it’s journey would be halted, and it would…
Record breaking rainfall and strong winds characterise Storm Desmond. The storm has led to the suspension of hundreds of rail services, flooding, power cuts and landslides across the country. During such as major incident, IT teams will be under pressure to ensure that businesses continue to service clients and function at full capacity. Datto, a company that provides business continuity solutions to more than five million customers and thousands of partners worldwide, has experience of keeping businesses running during the severest weather episodes. Based on this expertise, we understand that severe weather conditions can affect local businesses’ livelihoods if IT…
Over half of IT professionals report they’re worried their network will suffer a data breach at the hands of a careless celebration Dealing with potential data loss will be the number one headache confronting IT professionals in the run up to the 2015 holiday season. According to the third annual “Happy Holidays?” survey from Ipswitch, over one-third of IT professionals in the UK (36%) confirm they have had an IT user report the loss of a device holding company data following holiday celebrations in a pub, restaurant, or at a party. A further one-in-five (19%) go on to say they…
Organisations operating across multiple locations face ongoing, extensive challenges in maintaining network security and are at a particularly high risk of suffering data breaches. The highly vulnerable ‘Network’s Edge’ must be carefully protected against threats and malicious attacks. Criminals view the Network’s Edge as a soft target, since the distributed locations frequently process highly sensitive data (e.g. credit cards) while often employing weaker security practices. According to Gartner, by 2016 thirty percent of advanced targeted threats will specifically target distributed locations as the entry point. A range of factors contribute to security weaknesses in distributed networks, but they can be…