• Mar 05
    2018
    Walking into a Starbucks and seeing the tables occupied by people furiously working at their laptops is a common experience in today’s world. After all, working on the road can mean that you must find public Wi-Fi access points where they are accessible, such as the free network at your hotel, the airport, or your favorite coffeehouse. While public Wi-Fi is convenient, it does not come without risks. The two ...
  • Feb 27
    2018
    Out of office messages have become an integral part of modern day vacation preparation. After all, who wants to have irritated customer calling your cell phone to find out why their email has been ignored? Most people will write something like: “Thank you for your email! I am currently out of the country on a cruise until the 20th of March. Please forward your accounting questions to Lisa (Lisa@yourcompany.com) in ...
  • Feb 16
    2018
    Since 2013, over 9 billion data records have been lost or stolen in cyberattacks and breaches. This means that nearly 59 records are stolen every second with a total of 5 million records lost over the course of a single day. These terrifying statistics show no indication of stopping or slowing either – in fact, they have continually been in an upward trend. With the enormous breaches of last year ...
  • Feb 14
    2018
    James Cronin | Business Development Manager, Packt Publishing The way we build software is changing. This is because what consumers and businesses need from software is also changing - whereas software used to just be there, in the same way your desktop just sat on your desk, today it’s everywhere, constantly changing and moving forward - like the new phone in your pocket and the tablet in your bag. But ...
  • Feb 08
    2018
    Did you know that nearly half of all of the small businesses in the United States are in serious danger of being hacked? Because business owners are not taking their cybersecurity seriously enough, over 14 million out of the estimated 28 million small businesses have actually been breached already. Thankfully, there is some good news. Companies can make simple changes that will help reduce the chance of their data being ...
  • Jan 26
    2018
    The staggering amount of massive cyberattacks that occurred last year due to basic flaws in cybersecurity plans is a sobering reminder than many organizations still have yet to implement the basic protocols necessary to protect their data. In this hostile environment of today, organizations must be sure to focus on some elementary, but essential cybersecurity strategies to ensure that they are protected. These six strategies can help companies protect themselves ...
  • Jan 19
    2018
    At the end of 2016, the predictions that would dictate 2017 in terms of security came out. From ransomware and political disruption to the advancement of cybercriminals and social media attacks, most of these predictions became reality. However, no one could have imagined the extent of these issues, especially in terms of ransomware and the cases of WannaCry and NotPetya. What should we be prepared for this year? Here are ...
  • Jan 11
    2018
    James Cronin | Business Development Manager, Packt Publishing Change Emerging technologies are increasingly relevant in the enterprise world. Thanks to the growth of the internet and open source technology, a market once controlled solely by the big vendors has been opened and democratised. Rather than buying and using one vendor technology stack, developers and businesses are now choosing and combining the best tools for the job. As a result, the ...