How AI is predicting the future of online fraud detection

Bottom line: Combining supervised and unsupervised machine learning as part of a broader artificial intelligence (AI) fraud detection strategy enables digital businesses to quickly and accurately detect automated and increasingly complex fraud attempts.

Recent research from the Association of Certified Fraud Examiners (ACFE)

By Louis Columbus, 22 August 2019, 0 comments. Categories: Applications, Authentication, Employees, Security.

Why IT and HR can become surprising bedfellows

Advances in digital communication may have enhanced many lives - but it has also become a disruptive technology in more ways than one. Not surprisingly, the development of new communication tools is keeping pace with changes in the way people communicate, giving them a myriad of ways to get the right information in front of the right readers at the right time.

However, there has been a lot less attention given to the development of...

By Cyrus Gilbert-Rolfe, 09 August 2019, 0 comments. Categories: Employee Education, Employees, Enterprise Mobility.

Myth-busting mobile in the enterprise: Day two support is the same as other IT resources

As mobile devices have grown indispensable for enterprises, so too has their ability to disrupt mission-critical work when they malfunction or when other complications arise. The support obligations that come with mobile technology deployments are considerable.

Just because you have an in-house IT help desk team doesn’t mean you’re meeting all of those obligations. A Blue Hill Research study estimates that your IT...

By Ross Homans, 07 August 2019, 0 comments. Categories: Applications, Employees, Enterprise Mobility.

A roadmap to Zero Trust for SMBs: Keeping security solid while moving swiftly

Bottom Line:  Small businesses don’t need to sacrifice security due to budget constraints or productivity requirements – a Zero Trust roadmap can help them keep growing and stop breaches.

Having worked my way through college in a series of small businesses and having neighbors and friends who operate several today, I see how cloud, databases, and network devices save thousands of dollars, hours of tedious work, and streamline operations. Good friends running an AI startup, whose remarkable...

By Louis Columbus, 27 July 2019, 0 comments. Categories: Data & Analytics, Data Loss, Employees, Security.

Why passwords are the weakest defence in a Zero Trust world

  • 90% of security professionals have witnessed security incidents stemming from the theft of credentials, according to a recent MobileIron study conducted by IDG.
  • 86% of CIO, CISO and Security VPs would abandon password authentication if they could.
  • Another survey by EMA found that mobile devices secured by biometric authentication methods present the best option for replacing passwords.
  • There is a direct correlation between the number of times a user authenticates and the number of user access problems that need to be addressed.

These and many other fascinating insights...

By Louis Columbus, 24 July 2019, 0 comments. Categories: Data & Analytics, Employees, Security.

Protecting your organisation from phishing scams: A guide

The recent announcement of British Airways’ record-breaking £183 million GDPR fine has put phishing scams back in the spotlight, as this was an integral part of the company’s data breach. Unlike many other forms of cyberattack, phishing scams go after your customer or employee data, including credentials like passwords, financial details or sensitive personal information. This data can then be used or sold on for malicious intent, from identity theft or false transactions, to brute force or...

By Elad Schulman, 19 July 2019, 0 comments. Categories: Data & Analytics, Data Loss, Employee Education, Employees, Security.

Exploring mobility as a service - and the drivers behind it

Effective managed mobility for your enterprise is the key to getting the most out of your mobile technology spend, but what’s the best way for you to manage how you spend your budget?

If you’re a typical mid-to-large enterprise IT director, you’re probably spending a lot of time wrestling with your capital expenditure allotment or CAPEX. It’s the “traditional” way of acquiring technology for your employees, especially tablets and smartphones....

By Ross Homans, 17 July 2019, 0 comments. Categories: Employees, Enterprise Mobility.

Today’s CIO needs to learn the language of the board: The first lesson

As IT has become more integral to business the role of the CIO is changing. In fact, of all the roles within an organisation, the job of the CIO has changed the most in recent years.  And as businesses everywhere go through their own flavour of digital transformation, the role will continue to evolve.   Where once they were primarily concerned with building and delivering technology, CIOs today are likely to focus more on influencing the...

By Agata Nowakowska, 10 July 2019, 0 comments. Categories: CIO, Employees.

Hiscox cyber readiness report notes air of cautious optimism among enterprises

A new report from insurer Hiscox has revealed that while the numbers for cyberattack cost and frequency continue to rise, knowledge and concern is increasing with it.

The report, which analysed 5,400 firms across seven countries, argued cyber threat has “become the unavoidable cost of doing business today.”

Looking at the top figures make for pessimistic reading. The number...

By James Bourne, 09 July 2019, 0 comments. Categories: CIO, Employees, Enterprise Mobility, Security.

Myth-busting mobile in the enterprise: The price of mobile lifecycle management

If I were to ask you what it takes to keep your mobile device ecosystem functioning in a business environment 24/7/365, the answer would probably come easy. You’d probably be able to reference managing frequent OS/application requirements or rapidly deploying replacement devices.

If I asked you, however, what is the true total cost of ownership (TCO) of these very same mobile devices and what’s the biggest cost...

By Ross Homans, 01 July 2019, 0 comments. Categories: Employees, Enterprise Mobility, Mobile, Research.

Security executives want to push forward a password-free future, finds MobileIron

The password is increasingly becoming an endangered species – and it is an area which vendors focused on Zero Trust Security (ZTS) are becoming increasingly focused. According to a new study from MobileIron, the future of authentication for enterprise services will soon be through mobile devices.

The study, which polled 200 IT security leaders across three continents and at organisations with more than 500 employees,...

By James Bourne, 28 June 2019, 0 comments. Categories: Data & Analytics, Employees, Enterprise Mobility, Security.

Myth-busting mobile in the enterprise: Combining speed with sustainability in device rollout

Opinion Technology moves at a remarkable pace of acceleration. For enterprises, that means “the perfect solution” is a dynamic moving target. Unfortunately, your mobile spend capacity and business requirements are not as dynamic, so creating a mobility program for those needs is no small feat. Does that mean that the speed of mobility will always outpace your capacity to engage and harness it for your enterprise?

By Ross Homans, 24 June 2019, 0 comments. Categories: Applications, Employees, Enterprise Mobility.

The changing role of the CIO: Evolution and embracing agile management

Since the dawn of the digital age, expectations of the chief information officer (CIO) continue to change. As the pace of digitisation continues to accelerate and new technologies are introduced, CIOs are becoming increasingly responsible for the variety of data sources that proliferate and impact every department in an organisation.

It is expected that the CIO will plan and develop a computing infrastructure that supports all business and product lines in heterogeneous computing environments both...

By Oded Blatman, 19 June 2019, 0 comments. Categories: CIO, Employees.

How the top PAM-mature enterprises are thwarting privileged credential breaches

  • Energy, technology and finance are the most mature industries when it comes to privileged access management (PAM) adoption and uses, outscoring peer industries by a wide margin
  • 58% of organisations do not use multi-factor authentication (MFA) for privileged administrative access to servers, leaving their IT systems and infrastructure exposed to hacking attempts, including unchallenged privileged access abuse
  • 52% of organisations are using shared accounts for controlling privileged access, increasing the probability of privileged credential...

By Louis Columbus, 18 June 2019, 0 comments. Categories: Data & Analytics, Data Loss, Employees, Security.

The 2019 CIO strategy analysed: Leaders needed combining CIO knowledge and CEO flair

The role of the CIO in 2019 remains a fascinating one. Where do companies invest in their technology initiatives? What position does the CIO hold? What emerging technologies need to be explored?

According to the 2019 CIO survey from Harvey Nash and KPMG, which polled more than 3,600 IT leaders, almost two thirds (63%) of organisations are now allowing technology to be managed outside the IT department.

By James Bourne, 14 June 2019, 0 comments. Categories: CIO, Development, Employees, Enterprise Mobility, Research.

New research shows extent of ‘polymorphic’ email phishing campaigns

We’re deluged by emails on a daily basis; many of which are not in good faith. Many others, like the old-fashioned telephone game, are passed down from scammer to scammer, changed a little here, and then sent to users’ inboxes.

According to new research from phishing prevention provider Ironscales, more than two in five (42%) email phishing attacks are polymorphic, with some attacks undergoing more than 500...

By James Bourne, 05 June 2019, 0 comments. Categories: Data & Analytics, Data Loss, Employee Education, Employees, Security.

Is the speed of mobile technology too fast and too furious for the enterprise?

Opinion If you think of technological advancement for the enterprise as a highway, there seem to be two distinct lanes with very different speeds.

The first lane is where “traditional” technology such as monitors, laptops, and desktops live. While OEMs refresh this technology every year (usually timed to chipset refreshes from Intel and their...

By Ross Homans, 03 June 2019, 0 comments. Categories: Applications, Employees, Enterprise Mobility, Tablet, Wearables.

Report: Two in three industrial firms are accelerating AR deployment to improve productivity

Two thirds of industrial companies polled by PTC say they are accelerating deployment of augmented reality (AR) to improve worker productivity.

In a newly released ‘State of Industrial Innovation’ report series, PTC has analysed the industrial AR and IIoT markets. Among the findings included in the latest AR report are those focused on delivering enhanced methods of training for frontline workers, enabling the workforce optimisation necessary to address the growing skilled labour shortage the...

By Enterprise CIO, 21 May 2019, 0 comments. Categories: Applications, App Platforms, Employees, Productivity, Wearables.

Does your organisation need a chatbot or a digital agent? Three important distinctions

Conventional ITSM solutions are finding it difficult to cope up with today’s business needs. Complex public, private and hybrid cloud infrastructures add hundreds of thousands of endpoints to the network, and they all must be managed. More is being demanded of IT professionals at the same time that IT talent is hard to find. Organisations are in search of new ways to provide excellent customer service and meet their service level agreements (SLAs).

AI is being touted as the answer for many of...

By Dr. Akhil Sahai, 21 May 2019, 0 comments. Categories: Applications, Employees, Productivity, Security.