Monday , 23 April 2018
Breaking News

What is social engineering?

Social Engineering

Social Engineering is the art of manipulating, influencing, or deceiving you in order to gain control over your computer system. The hacker might use the phone, email, snail mail or direct contact to gain illegal access. Phishing, spear phishing, and CEO Fraud are all examples. More info : https://www.knowbe4.com/what-is-social-engineering/

Read More »

Can smart cities really save us all

smart cities

Smart cities, and the components which comprise them, will save us all time – and a new study puts the total at 125 hours per citizen per year. The study, put together by Intel alongside Juniper Research, found that 125 hours, or 15 working days, will be claimed in four buckets. Mobility, such as smart traffic systems, smart parking, and ‘open data platforms’ – so users can pick the least congested bus and train services – will account for 60 hours. Greater public safety – predicting crime spots through machine learning – will account for 35, while healthcare comprises nine and productivity – digital services simplifying administrative processes – will account for 21. by James Bourne Source :  https://www.iottechnews.com/news/2018/mar/22/can-smart-cities-really-save-us-all-125-hours-year/

Read More »

12 Ways to Increase Hotel Security

Even when hotels have strong security policies and procedures in place, they are still vulnerable to cyber attacks, break-ins, theft, fraud, and other crimes. That’s why it’s vital to take precautionary measures and continually evaluate security programs. “Having robust security in place means a better, safer, guest experience,” says Chad Callaghan, principal of Premises Liability Experts and AH&LA security consultant. “When department managers and other employees think more about safety and security, you can prevent a lot of theft and minimize dangers.” Inadequate security has repercussions beyond guests losing belongings to theft. Hotels can be held liable for the criminal acts of third parties. Civil litigation against property owners and managers has become commonplace ever since Garzilli v. Howard Johnson. In this 1976 court case, the jury ruled in favor of singer Connie Francis, who had sued a Howard Johnson in New York for negligent security after being assaulted by …

Read More »

Co-Management

Co-management is the deep integration between ConfigMgr and Intune that enables you to easily begin begin moving traditional, domain-joined and ConfigMgr-managed solutions to a deployment of Azure Active Directory and Intune with #Just4Clicks.  This functionality is so popular because it hands over total control for how this move to the cloud is managed.  An organization can move any workload, at any speed, at any time – based entirely on that organization’s unique needs. by : Brad Anderson Source : https://cloudblogs.microsoft.com/enterprisemobility/2018/04/10/co-management-is-instant-and-easy-with-just4clicks/?MC=MSAzure&MC=SysMagSof&MC=WinServer&MC=WebDev&MC=SecSys

Read More »

6 Ways to exercise in the Office

You’ve probably already heard that sitting at a desk all day is bad for your health. According to the World Health Organization, physical inactivity is classified as the fourth leading cause of global deaths, causing an estimated 3.2 million deaths worldwide.1 But don’t quit your desk job just yet! There are new innovative gadgets that can help you stay fit while working. We take a look at the top fitness inspired solutions designed to help you power through your workday. Watch your posture Bad posture while sitting creates a host of problems, from jaw pain to pinched nerves in your back. New wearables are designed to help keep you sitting straight and tall at your desk. These posture-training devices are about the size of a lapel pin and attach to your skin or clothing. They gently vibrate when they sense slouching, training you to improve your posture throughout the day. …

Read More »

How hospitals are keeping patient data secure

Given the wealth of sensitive personal data healthcare organizations process and store, it’s no surprise that hospitals, medical offices, and other healthcare systems are prime targets for cybercrime. In 2014, an estimated 85 percent of large healthcare organizations faced a data breach, and one in five of those breaches cost the organization more than $1 million to rectify.1 Due to the costs a data breach can inflict on the operation, as well as the patients it’s entrusted to care for, healthcare organizations have become more vigilant and determined to battle cybercrime—and their efforts underscore important steps any business can apply to improve data security. Source : http://www8.hp.com/us/en/TechnologyAtWork/keeping-patient-data-secure.html?flexfield10=021705

Read More »

Internet of Things security primer

The Internet of Things (IoT) provides convenience, comfort, and cost savings through a vast and growing collection of connected devices ranging from HVAC systems and printers to fitness trackers, medical devices, and automobiles. And not surprisingly, those benefits are attracting the attention of businesses big and small. “The alluring promise of an improved bottom line will encourage businesses to focus on IoT,” predicts HP Chief Technology Officer, Shane Wall. “It can lower operating costs, increase productivity, and help businesses expand into new markets or offer new products.” While it is true that IoT devices can help businesses drive improvements in areas such as operations, staff performance, and the customer experience, a serious issue bubbles below all of that promise: security.   Source : http://www8.hp.com/us/en/TechnologyAtWork/internet-of-things-security-primer.html?flexfield10=031705

Read More »