IoT Device Security Doomsday on the Horizon?
Does it sound strange that many organisations believe they are exposed to major problems with Internet of Things device security, yet few of them have taken any measures to resolve those problems?
Are Routers Open Doors for Hackers?
Small businesses using low-end routers for their networks may be highly vulnerable to hackers.
Is It Time to Rename Malware as Sneakyware?
Malware (Sneakyware) is the software that gets into your system and causes havoc, unless you detect it and neutralize first.
BYOD, BYOT, BYOC, All One Facet of a Bigger Challenge
IT has no shortage of four-letter words. It’s not clear what the latest variations on the “BYO” or “bring your own” theme add.
Ransomware is so 2016 – The New Menace is Ransomworm
Don’t take this title too literally. Ransomware, the malware that extorts money from victims to prevent a disaster, will surely continue to be active, at least in the short term.
Our 2016 Business Continuity Review – From National Resilience to Toasters (and Back)
It’s always an editorial dilemma – Do we start with the event with the biggest business continuity impact? The event that was the most unbelievable? For the 2016 Business Continuity Review, we have some difficult choices, including the massive cyberattack of the toasters, the most powerful man in the world (soon) trying to carve up the Internet, and a smartphone threatening the health of a national economy.