Businesses are increasingly expanding the number of their applications and systems. In turn, it has been reported that Identity and Access Management (IAM) has leaked into becoming a business problem, not just an IT problem. Many companies are struggling to provide integrated employee access to the extent of applications and systems.
Here at Serviceteam IT the team have written a lot about the Internet of Things (IoT). It seems to be everywhere. However, now there are an increasing number of reports which warn technology companies, governments and the insurance sector about cyber-security threats from the IoT. We all need to take an interest in how we can make sure this emerging technology of connected devices is safe to use.
Entrepreneurs trying to grow their businesses are juggling so many demands on their time that they may find themselves unwittingly leaving the back door open to cybercriminals.
Leverage Azure and Office 365 for Multi-factor Authentication. The geo-distributed, high availability design of Azure AD means that you can rely on it for your most critical business needs. With the prevalence of smart phones, tablets, laptops, and PCs, people have far too many options on how they are going to connect, and stay connected, at any time. Multi-Factor Authentication through Azure is an easy to use, scalable, and reliable solution that provides a second method of authentication so your users are always correctly authenticated.
Cyber-security incidents are at large, and everybody knows it. Data breaches are now a daily occurrence and threaten both businesses and individuals. But just how many people do these incidents affect, where do the hackers come from, and what should I look out for to prevent a cyber-security attack on my device?
Israel has accused Hamas – a Palestinian Islamist group – of using a World Cup live scores and fixtures app and two fake dating apps to hack soldier’s smartphones and spying on them. Who can be safe from cyber-criminals and hacking?
The UK police are using technology and copious amounts of data to predict crime. Thousands of anonymised reports of previous offences allow police to be deployed where crime is predicted to occur over the next 24 hours. The time and place of previous criminal activity helps to determine future offences. Kent Police are at the forefront of this with their system PredPol.
Everyone has the right to protection of personal data, but the incoming GDPR regulation defines personal data as; any information that could be used, on its own or in conjunction with other data, to identify an individual. However, does the GDPR definition of personal data mean that we should delete all of our business and consumer emails to be compliant?
Xero Two-Factor Authentication (Xero 2FA): We’ve covered the notion of two-factor authentication (2FA) and multi-factor authentication (MFA) before, especially how you MUST enable it for all sensitive accounts. Personally I include ALL users.
Dog collars to toasters are connected as part of the Internet of Things (IoT), with experts predicting that by 2020 more than 50% of new businesses will run on the IoT. However, cyber security and privacy are the biggest challenges for IoT, collecting large amounts of personal identifiable information. As soon as some financial benefit from hacking smart devices appears, cyber criminals will find a way to take advantage of it.
Serviceteam IT Limited, 49 Frederick Road, Edgbaston, Birmingham, B15 1HN.
Copyright © 2011 Serviceteam IT Limited. Registered in England 07578043.