Laptops stories - Page 42
Sex toys and cyber crims, oh my
Wed, 16th Mar 2016
#
cybersecurity
#
trend micro
#
tablets
At a news conference, security firm Trend Micro demonstrated how a smart sex toy could be easily hacked and controlled.
IT departments need to up their unified solutions game
Tue, 15th Mar 2016
#
endpoint protection
#
edr
#
cybersecurity
New study reveals IT departments must bolster unified security strategies amid growing endpoint and patching challenges.
The four largest threats to your data
Tue, 15th Mar 2016
#
dr
#
cloud services
#
opinion
The warnings about your data are everywhere, but have you ever stopped to think what you're protecting your data from?.
Mobile payments get easier with new Visa product
Mon, 14th Mar 2016
#
martech
#
commerce systems
#
supply chain
Visa lauches digital swipe product enabling shoppers to complete online purchases by sliding a virtual image of their credit, debit or prepaid card.
Analyst Opinion: Coming to a device near you – the enterprise digital workplace
Fri, 11th Mar 2016
#
cx
#
martech
#
byod
Persistent and rewarding customer experiences are designed, delivered, and managed using enterprise software and line-of-business applications.
Passwords are so last year. Today, it's all about the doodles
Fri, 11th Mar 2016
#
endpoint protection
#
edr
#
passwords
In the future, free-form gestures, such as a doodle or signature, may be used in place of passwords to keep mobile devices secure.
Got an Android device? Here's some tips for keeping it secure
Thu, 10th Mar 2016
#
malware
#
cybersecurity
#
operating systems
As Android malware surges, ESET issues some tips on how Kiwis can protect themselves - and how to know if you might have been compromised already.
Unmanaged wearables pose threat to the enterprise
Tue, 8th Mar 2016
#
wearables
#
physical security
#
centrify
Wearable device owners in the enterprise are neglecting login credentials, posing a growing IT security concern, warns Centrify RSA Survey.
Govt's data breach bill will unleash confusion, says expert
Mon, 7th Mar 2016
#
breach prevention
#
cybersecurity
#
data breach
Australian organisations will struggle to comply with the Federal Government's mandatory data breach notification proposals.
What is Disaster Recovery and why should your business have it?
Thu, 3rd Mar 2016
#
dr
#
dlp
#
cloud services
20 years ago, disaster was usually delivered by Mother Nature as survival of the business depended on bricks and mortar. Today, that's all changed.
Hands-on Review: Microsoft Surface Book
Thu, 3rd Mar 2016
#
gaming
#
digital entertainment
#
microsoft
Microsoft's Surface Book is a sleek, responsive and intuitive, albeit slightly expensive, laptop/tablet hybrid.
SPCA Auckland goes digital
Tue, 1st Mar 2016
#
data analytics
#
martech
#
cdp
SPCA and tech firm Fronde partner to streamline pet adoptions with a custom-built app, replacing paper-based system.
Going mobile: How to have secure file-sharing, backup recovery and access
Tue, 1st Mar 2016
#
storage
#
dr
#
endpoint protection
How do you maintain the security of your organisation's data in a world where your employees, contractors and partners are working on mobile devices?.
Free Wi-Fi at Northland DHB hospitals
Tue, 1st Mar 2016
#
wireless networks
#
cloud services
#
wifi
The objective is to make the hospital experience more pleasant by enabling patients to maintain communication with family and business contacts.
Student information software in hot demand
Mon, 29th Feb 2016
#
edutech
#
uc
#
cloud services
Student information systems are being more readily adopted by schools, thanks largely to advancements in cloud computing and the growth of mobiles.
Endpoint data protection: A buyer's checklist
Mon, 29th Feb 2016
#
storage
#
data protection
#
dr
Endpoint data is often one of the most forgotten aspects of an enterprise data protection strategy, yet it is among the most valuable to a company.
Technology: It's not just for youngsters
Mon, 29th Feb 2016
#
uc
#
spark
#
tablets
New survey by Spark shows that New Zealanders over 55 are tech-savvy, with 70% feeling confident using technology.
What is the rumour mill generating about future MacBooks?
Mon, 29th Feb 2016
#
apple
#
tablets
#
technology gifts
Rumour has it that by this June we could be approaching warp speed with the introduction of a new generation of MacBook Pros.
What are the cyber security commandments?
Thu, 25th Feb 2016
#
wireless networks
#
cybersecurity
#
cloud services
Despite growing cyber threats, CompTIA finds many businesses and consumers lack adequate cyber security knowledge, making human error a leading risk.
Network security and tips for using free WIFI
Thu, 25th Feb 2016
#
wireless networks
#
cybersecurity
#
cloud services
Wireless networks can be left vulnerable if you have an old router with poor security. Likewise, free WiFi can be used to intercept your transactions.