Tablets stories - Page 36
The humble printer: A useful tool – and a security risk
Fri, 22nd Sep 2017
#
document management
#
ecm
#
martech
Connected devices bring new risks to organisations, warns Y Soft, highlighting the overlooked vulnerability of networked printers.
Hands-on Review: The mStand will maximise your desk's space and aesthetics
Thu, 14th Sep 2017
#
gaming
#
digital entertainment
#
mobility
Transform your workspace with the mStand; for back health and desk minimalism, this stand's ergonomic design promises comfort and style.
Why IT security is a critical part of every learning environment
Mon, 11th Sep 2017
#
edutech
#
firewalls
#
network infrastructure
Many educational institutions lack a plan to manage the security risks posed by the hundreds of devices connected to their networks, according to Wavelink.
Hands-on Review: Shiny and functional, this is a great keyboard
Mon, 11th Sep 2017
#
gaming
#
digital entertainment
#
keyboard
The K63 encourages good typing posture, fingers don't appear to tire as easily as they do on a normal laptop keyboard.
What's up with Your mobile apps? Identifying and mitigating digital risk
Thu, 7th Sep 2017
#
cybersecurity
#
apps
#
cloud services
I'll venture to guess you're using a mobile device to read this - while mobile apps offer a host of new opportunities, they also introduce risk.
There is a boatload of Lenovo intelligent technologies coming to Austrialia
Wed, 6th Sep 2017
#
biometrics
#
smart home
#
lenovo
Lenovo unleashes a fleet of AI-driven gadgets across Australia, revolutionizing tech accessibility with smart features.
IGEL introduces UD Pocket for Apple Mac to simplify remote working
Mon, 4th Sep 2017
#
daas
#
hybrid & remote work
#
healthtech
IGEL's new UD Pocket now turns Apple Macs into secure remote working hubs, boosting BYOD security for mobile workforces.
Enterprise security: The hidden perils of 'unguarded talk'
Wed, 30th Aug 2017
#
micro focus
#
enterprise security
#
opinion
Some users will share information that seems innocuous, yet can be used by attackers in social engineering attacks. Here are some common examples.
Hands-on Review: Norton WiFi Privacy
Tue, 29th Aug 2017
#
gaming
#
vpns
#
digital entertainment
Norton WiFi Privacy, more than just a VPN, offers users encryption not just from crooks, but from prying eyes and geoblocks.
New Sony ANZ solution built for today's bring-your-own-device workplace
Tue, 29th Aug 2017
#
uc
#
sony
#
collaboration
Vision Exchange allows teams to brainstorm and work collaboratively through wireless sharing content from laptops and tablets.
Exclusive interview: Nearmap on competing with Google Maps
Mon, 28th Aug 2017
#
iot
#
google
#
cloud services
Cloud technology has the ability to break down borders, whether that be the four walls of an office, or geographical borders separating countries.
Sydney: You're invited to Blancco's data erasure event
Fri, 25th Aug 2017
#
data analytics
#
martech
#
planning
An increase in the amount of data businesses must store means the risk of a data breach or cyber-attack also increases.
Hands-on Review: Trend Micro's Home Network Security simplifies how we get protected from cyber attacks
Thu, 24th Aug 2017
#
malware
#
gaming
#
firewalls
As IoT devices proliferate, Trend Micro's Home Network Security offers a simple, router-based solution to protect all connected devices from cyber threats.
IoT and BYOD still putting firms in the face of danger
Thu, 24th Aug 2017
#
iot
#
byod
#
empired
As best practice security methods continue to evolve around the Internet of Things, so do the attacks on devices linked to corporate networks.
ESET reveals what to watch out for before you buy encryption
Mon, 21st Aug 2017
#
malware
#
data protection
#
encryption
Encryption services are becoming a focus for organisations and decision makers as new data protection laws such as the GDPR come into effect.
Webroot takes over Securecast in move to take cyber awareness training to mass market
Wed, 16th Aug 2017
#
phishing
#
email security
#
ai security
Webroot has officially acquired security awareness training platform Securecast and has plans to take the new integrated solution to the mass market.
FireEye uncovers Russian cybercriminal group targeting EMEA hotels
Mon, 14th Aug 2017
#
malware
#
breach prevention
#
wireless networks
The hospitality sector is a frequently attacked target by cybercriminals - one of the most prominent has been attributed to a Russian group.
Data-junkies saddle up, USB transfer speeds are doubling
Fri, 28th Jul 2017
#
supply chain
#
intel
#
usb
Get set for a digital speed boost as USB 3.2 promises to blaze data at 20Gbps, doubling the pace for file transfers.
DST donates IT equipment to Mtubatuba school in Mandela Day spirit
Thu, 20th Jul 2017
#
tablets
#
department of science and technology
#
industrial
The Department of Science and Technology also refurbished classrooms by installing new doors and windows at Khulubone Primary School.
Dell expands desktop virtualization offerings with new thin client solutions
Fri, 7th Jul 2017
#
virtualisation
#
network infrastructure
#
daas
Dell expands VDI solutions with new appliance, thin client and software options to simplify deployment and management of virtualized desktop environments.