New research shows extent of ‘polymorphic’ email phishing campaigns

We’re deluged by emails on a daily basis; many of which are not in good faith. Many others, like the old-fashioned telephone game, are passed down from scammer to scammer, changed a little here, and then sent to users’ inboxes.

According to new research from phishing prevention provider Ironscales, more than two in five (42%) email phishing attacks are polymorphic, with some attacks undergoing more than 500...

By James Bourne, 05 June 2019, 0 comments. Categories: Data & Analytics, Data Loss, Employee Education, Employees, Security.

How to secure mobile devices in a Zero Trust world: A guide

  • 86% of enterprises are seeing mobile threats growing the fastest this year, outpacing other threat types
  • 48% say they’ve sacrificed security to “get the job done” up from 32% last year
  • 41% of those affected say the compromise is having major with lasting repercussions and 43% said that their efforts to remediate the attacks were “difficult and expensive"

Bottom line: The majority of enterprises, 67%, are the least confident in the security of their mobile assets than any other device or platform today according to 

By Louis Columbus, 20 May 2019, 0 comments. Categories: Authentication, Data & Analytics, Data Loss, Employees, Security.

How artificial intelligence will affect the future of networks – and what you need to do about it now

"Prediction is very difficult, especially if it's about the future," said Nils Bohr, Nobel laureate in Physics, and that observation certainly applies to evaluating technology trends and their impact on the business networks of tomorrow.

Today’s network is built to deliver applications and services that didn’t exist 15 years ago, and is designed for companies that may themselves only be a few years old and...

By Carl Grivner, 13 May 2019, 0 comments. Categories: Applications, Data & Analytics, Design, Employees, Productivity.

Humanising automation: Understanding the five senses of artificial intelligence

In reality, AI's true potential can only be realised when organisations approach it like a portfolio of technologies, with different attributes, that work together to optimise operational efficiency whilst delivering better service levels and improving the customer and user experience.

This concept of a portfolio of technologies working together can be illustrated further by what I refer to...

By Christopher Stancombe, 10 May 2019, 0 comments. Categories: Applications, Data & Analytics, IoT, Marketing, Productivity.

The big enterprise security problem posed by small – or at least smaller – businesses

As the threat level grows and diversifies, global enterprises continue to make cybersecurity a top priority. As they should: high-profile attacks continue to wreak havoc on major brands—with Humana and Marriott among the most notable recent victims. One silver lining in the continued fight is that the pervasiveness of threats has elevated cybersecurity from an IT problem to a board-level issue.

In fact, according to

Why CIOs need to question 5G and the 'need for speed'

Who doesn’t want a bit of extra speed in their life – especially when it comes to mobile data? Well, quite a few people, as it turns out.

The advent of 5G services promises much faster mobile communications, with ten times the speeds of existing 4G services (and remember what a transformation that was). According to received wisdom, everyone stands to benefit – from consumers who will be able to download an HD film in seconds, to urban planners who can use 5G to provision the services that...

By Harry Chima, 02 May 2019, 0 comments. Categories: App Platforms, CIO, Data & Analytics, Development.

Why you need to be able to trust your SD-WAN platform

Imagine a scenario when an IT network manager settles into the task of remotely provisioning and configuring an SD-WAN edge router that’s located in a distant branch office. The router appliance was shipped from a supplier’s warehouse to the branch, unboxed, and plugged into power and Ethernet by a local non-technical employee.

Before this new connection to the corporate WAN can be...

By Anand Oswal, 17 April 2019, 0 comments. Categories: Applications, Case Studies, Data & Analytics, Development, Security.

Case study: How the National Crime Agency looks to squash the cybercriminals at source

Ben Russell, head of cyber threat response at the National Crime Agency (NCA), wants to get one thing clear. “We’re not a regulator – we’re not here to dish out fines,” he says. “We’re here to support businesses, investigate the criminals and try and catch people in order to help.”

The agency is not here to judge, or enforce anything in particular, but to help businesses if they...

By James Bourne, 03 April 2019, 0 comments. Categories: Case Studies, Data & Analytics, Employees, Privacy, Security.

Verizon finds organisations increasingly sacrificing security to ‘get the job done’

Have you ever been working on a project and, knowing it was a choice between ensuring security and getting to deadline, been forced to go with the latter? If you have, according to a new report, you have plenty of company.

The latest Verizon Mobile Security Index, published earlier this month, found almost half (48%) of the more than 600 survey respondents had sacrificed the security aspect of their work in order to ‘get...

By James Bourne, 28 March 2019, 0 comments. Categories: Data & Analytics, Employee Education, Employees, Enterprise Mobility, Security.