Emergencies and cyberattacks: Three common scams you need to watch for

Emergencies and cyberattacks are hard enough on their own. But disasters bring out the worst in cybercriminals, and if an event can be exploited, you can be sure that a hacker is going to do so. Whether you’re dealing with a recession, flood, or pandemic, it’s important to keep an eye out for scams that take advantage of emergencies.

From infected links to PDFs containing viruses, here are three types of scams you’ll likely see during an...

Managing enterprise authentication with single sign-on: The seven key benefits

The advent of online shopping created an expectation of 24/7 corporate availability and interaction that the arrival of the smartphone only solidified. Anything is possible now, it seems, at any time of day and from any location. In this world of limitless options, organisations must be cloud-enabled and mobile-ready to remain competitive.

This is great for users but tricky for organisations to pull off....

Putting the user first: Why goals, comms, and transparency are key for internal services

Internal services are the lifeblood of every organisation. Supporting departments, such as IT, human resources, and facility management, enable a slick working environment. Setting up an employee’s workstation, resolving a technical problem, or reserving a meeting room are all possible because of the provision of quality user service support.

These simple but vital functions are foundational to the...

How CIOs must address the most pressing cybersecurity issues of 2020: A guide

Cybersecurity has become one of the top concerns of enterprises around the world over the past several years, and in 2020, that trend is bound to continue. Privacy legislation like Europe’s General Data Protection Regulation and the upcoming California Consumer Privacy Act will begin to play a larger role in CIOs’ decision-making related to data handling and privacy.

Granted, many...

How automation will help enterprises overcome the cybersecurity skills gap

There are few verticals that can boast a 0% unemployment rate, but cybersecurity is one of them. There are far more job openings than there are skilled professionals to fill them. This is despite many efforts to train, upskill and reskill people to close this talent gap. With almost three million unfilled cybersecurity positions around the world, the industry needs to come to grips with the serious nature of this skills gap.

The speed at which the threat landscape is evolving is...

Allison Cerra, CMO, McAfee: On education and mindfulness in removing cybersecurity complexity

If you’re going to write a playbook around cybersecurity best practice, as a leading executive of one of the major security companies, then it may be a wise idea to deal with any skeletons in the cupboard before dispensing the pellets of wisdom.

Thankfully Allison Cerra, senior vice president and chief marketing officer at McAfee, does so in her new book with integrity, grace, and no little...

From culture to communication: Why the success of your ITIL initiative depends on many factors

One of the world's most famous (or infamous) structural frameworks for process and communication management is ITIL. ITIL often is used to generate results in a service-oriented organisation. ITIL benefits frequently cited include improved customer and user satisfaction, as well as increased service-orientation for IT staff. ITIL can increase professional standards by implementing best practices for specific processes, reducing costs, and...

How the CIO can win over the most tech-resistant and tech-reluctant employees

CIOs often face significant hurdles when building new technology or implementing it into their businesses. Budget restrictions, lack of buy-in from management, resistance from employees, or simply not knowing where to start can make success feel impossible. Adopting new technology is necessary for business survival, though.

Many CIOs underestimate the amount of strategy and planning necessary to pull off...

Alerts are ignored and turnover is high as security teams suffer from incident overload, report says

If everything incident which happens at an organisation is of super-critical importance, then how can the system fully function? Alert overload for security teams is not uncommon, yet a new report from Critical Start encapsulates the issues many personnel face.

The company’s report, ‘The Impact of Security Alert Overload’, polled more than 50 security operations centre (SOC)...

Why IT and HR can become surprising bedfellows

Advances in digital communication may have enhanced many lives - but it has also become a disruptive technology in more ways than one. Not surprisingly, the development of new communication tools is keeping pace with changes in the way people communicate, giving them a myriad of ways to get the right information in front of the right readers at the right time.

However, there has been a lot less...