New Offering from Imation in low cost BYOD
Imation a global provider of data storage and information security, have announced its IronKey Workspace W200 PC on a Stick USB flash drive.
This is a robust USB flash drive, with Microsoft Windows 10 certification, offering a high-performance, low-expense option for cost-sensitive enterprises, which can save up to 95 percent compared to providing employees with company laptops.
This brings a new vision to bring your own devise, it could be supporting a mobile workforce, a contingency staff or a BYOD programme, the IronKey Workspace W200 allows enterprise IT administrators to provide a Windows 10 or 8.1 mobile corporate environment containing all the IT security tools and policies to protect these users, no matter where they work.
Cost of Data Breaches will increase 4 fold
New Juniper Research, suggests that the cost of data breaches to will increase $2.1 trillion globally by the end of 2018, this is four times the estimated cost of breaches in 2015.
The document, entitled “The Future of Cybercrime & Security: Financial & Corporate Threats & Mitigation”, has predicted that the majority of these breaches will come from existing IT and network infrastructure. While new threats targeting mobile devices and the Internet of Things are being reported at an increasing rate, the number of infected devices is minimal in comparison to more traditional computing devices.
The Cybercrime Economy Driving Action
Free Tesla Cars Just call.... Electric Car Website Hack Attack
Back in 2015 Tesla Motors’ website and Twitter account was “hacked” . The teslamotors.com website was redirected to a server hosted in Amsterdam and within a few minutes, the account began sending tweets promising free Tesla cars. All very interesting for World Password Day , the first Thursday in May
Later that same day it was revealed that Tesla founder Elon Musk’s Twitter account was compromised. According to Dave Smith at Business Insider “though the parties claiming responsibility offer up different names, it appears to be one coordinated attack on all of Musk’s online and social properties.”
Andrew Hay from the OpenDNS Security Labs team has written a blog post that lays out the process that attackers used to hijack Elon Musk's personal Twitter account, as well as the Tesla Motors website. It gives a deep dive on the infrastructure used in the attack with highlights including:
Read more: Free Tesla Cars Just call.... Electric Car Website Hack Attack
25% of UK IT professionals Under Attack 2 Weeks Before they Realised
A new report, Tackling Attack Detection and Incident Response, from Enterprise Strategy Group (ESG), commissioned by Intel Security, reveals slow responses to cyber-attacks from UK enterprises are leaving companies vulnerable to targeted online crime. This report uncovers why UK corporations struggle to detect and defend against targeted online attacks and it found a quarter of UK IT Professionals took over two weeks to realise they were under attack from an advanced cyber threat in 2014
Highlights:
• 39% admitted that a threat, once discovered took between two and twelve weeks to remove and remediate
• Across the globe, businesses on average dealt with 78 security incidents last year
• 26% involved targeted and bespoke attacks
Raj Samani, EMEA CTO Intel Security
Read more: 25% of UK IT professionals Under Attack 2 Weeks Before they Realised
Darling here’s a Cute Teddy
Merry Christmas Darling here’s a cute present - so I can spy on you
Whilst the regular seasonal increase in cute toys and teddy bears is running as usual, what is new is how many cheap, simple to use, easily available and seemingly innocent; products are for the individuals to keep track of their property and family.
A wide variety of consumerised spyware is available to suit different types of situations, from personal situations through to industrial espionage, then there is domestic violence abusers, stalkers, online predators and trolls. Almost all use multiple digital means of accessing their targets including the Internet, social media, smartphones, GPS and surveillance technology to easily spy on and monitor every aspect of their lives. Many of these will use the holiday gift giving season to increase their spying through giving compromised gifts.
Employees Cost UK Business £130,000 Managing Passwords
But a third of workers do not use passwords on mobile devices used for work according to the Widmeyer survey
Poor password habits are putting employers at risk and losing them hundreds of thousands of pounds in lost productivity, according to new research from Centrify , a unified identity management company specialising in data centre’s, cloud and mobile.
The Widmeyer survey of 1,000 UK workers, showed the average employee wastes £261 a year in company time on trying to manage multiple passwords, which for a company with 500 staff is a loss of more than £130,000 a year.
High on many people’s list of ‘most annoying things’, passwords it seems are becoming the cause of major headaches today.
Read more: Employees Cost UK Business £130,000 Managing Passwords
How Long Should You Keep Email?
There’s no easy answer – The Data Protection Act’s deliberately woolly. Rather than define a period of time, it states that email must be kept for “no longer than is absolutely necessary”.
And different industries have very different ideas about what that means.
Many sectors operate Best Practice guidelines with penalties for non-compliance. There are books cataloguing recommended retention periods, going up to a mind-boggling 80-years plus for correspondence relating to pension policies. However, self-regulation is only as good as enforcement by the Self-Police.
PC on a Stick from IronKey (Imation)
VAD Wick Hill have announced it is signing a contract with Imation, a global scalable storage and data security company, to distribute Imation’s scalable storage solutions for SMEs in the UK. Wick Hill already distributes Imation’s mobile security solutions.
We are not sure at this point if this will include the PC on a Stick from IronKey (Imation)
Imation is at the forefront of developments in SME storage, utilising its experience at enterprise level to provide a range of ground-breaking SME solutions. With a ‘pay as you grow’ strategy, Imation solutions are easy to use flexible, scalable and cost- effective.
With 50 years of storage experience, Imation is an ideal partner for our VARs, both now and going forward. Imation solutions are enterprise-class with SME pricing, easily scalable, and offer options for multiple backup layers, as well as cloud storage. Imation also has innovative solutions for compliance and disaster recovery.
In an area of high growth, but with competitive pressures, Imation enables the channel to deliver a range of solutions that will differentiate themselves and make good margins.
Scotland Setting Sail Scam
With Scotland Setting Sail, away from the United kingdom tonight or Friday morning. The results of the Referendum will be a popular and the risk of scammers trying to access your inner sanctum or mobile phone and email system. Get Safe Online has published a warning telling computer users to be aware of fake early result messages. In response to the warning, Mark Sparshott, EMEA Director at Proofpoint, explains why widespread interest events generate an increase in email spam and what computer-users should be most aware of:
More Articles...
- Macmon Secure chooses Wick Hill As Sole UK Distributor
- Naked Videos of Facebook Friends
- Exhilarating Experience Open to Channel Partners
- MSSPs Rapidly Adopt AlienVault USM
- Facebook instant messaging Trojan spreads through EMEA
- Infosec 2014 survey reveals 50% of security professionals fail to secure data
- Mergers & Acquisition in the technology sector
- WICK HILL NOW SHIPPING WATCHGUARD’S NEW APT
- Synerzip has Developed Unified Threat Management Platform
- Security Threat and Multi-Factor Authentication
- Edward Snowdon and the RSA receiving $10 million for a back door with NSA
- Delivering M2M Security Within Encrypted Networks
- Best Practices for Secure Shell Key Management
- A Great time was had at the InfoSecurity Russia
- Infoseurity Russia 2014 A review as we look forward to 2014