Welcome to Cyberport
A A A
  • Cyberport Facebook Page
  • Cyberport Twitter Page
  • Cyberport LinkedIn Page


Tech News

News feed provided by SMBWorld.

 

01-04-2020
Apple’s AR plans are becoming a little easier to see

Apple’s take on augmented reality will leverage its existing solutions to deliver personalized experiences, with a particular focus on health, location and entertainment.Why do I think this? Yesterday I broke the news that Apple is working with a company called Dent Reality on indoor mapping technologies.The smaller company has been working with ARKit since the system made its debut. Now it uses Apple’s Indoor Maps ecosystem to provide highly accurate indoor mapping solutions it claims are highly accurate and don’t require beacons.To read this article in full, please click here

View More
01-04-2020
Get the March Windows and Office patches installed, but watch out for known bugs

It’s been another Keystone Kops month, with a reasonably stable Patch Tuesday, followed by a hasty Patch Thursday to cover a security hole Microsoft accidentally blabbed, then the usual buggy “optional, non-security, C/D Week” patch, finishing with a fix for yet another bug introduced by earlier patches.To read this article in full, please click here

View More
01-04-2020
BrandPost: Avoid security breaches: How to protect your data

Data security breaches at major corporations seem to be perpetually in the news. The hacks range in size and scope, but it’s no secret that firms hit by hackers often suffer serious consequences.What can you do to help prevent your organization from becoming tomorrow’s cyber-breach news headline? Here are 18 pointers: Educate all employees on the importance of protecting data. Explain the need to avoid risky behavior such as downloading music or videos from rogue websites. Once employees understand that criminals want the data with which the employees work, their thinking changes in ways that can make the organization’s data much safer than before. Understand what data you have and classify it. You cannot secure information if you do not know that it exists, where it is stored, how it is used, how it is backed up, and how it is decommissioned. Make sure you know those things about all of your sensitive information. Because not all data is equally sensitive, make sure to classify data according to its level of importance. Do not give every employee access to every system and piece of data. Create policies governing who has physical and/or electronic access to which computer systems and data, and implement procedures, policies, and technical controls to enforce such a scheme. Authorize people to access the data that they need in order to do their jobs but do not provide them with access to other sensitive data. Consider moving sensitive information and systems to a cloud provider. Unless you have an adequate information security team, the odds are pretty good that a major cloud provider will do a better job than you at securing your system and information against various risks. Enable remote wipe. All portable electronic devices on which sensitive information will ever be stored should have remote wipe capabilities enabled. Give everyone his or her own access credentials. Ensure that each person accessing a system housing sensitive information has his or her own login credentials. Ensure that everyone uses proper passwords to access such systems. People like to use easy-to-remember passwords; without policies and technology to enforce the selection of proper passwords, organizations are at risk of having passwords such as “1234” being the only line of defense against unauthorized access to sensitive information. So, craft proper policies and implement technology to ensure that the policies are properly enforced. Go multi-factor. For accessing systems with especially sensitive information, consider implementing some form of strong, multi-factor authentication. Deal with BYOD. Make sure that you have policies and technology in place to address the many risks created by employees, contractors, and guests bringing personal devices into your facilities and connecting to corporate networks. All access to the Internet from personal devices or devices belonging to other businesses should be achieved via a separate network than is used for company computers. Encrypt sensitive data when storing it or transmitting it. There are many commercial and free tools available to do this – some operating systems even have encryption capabilities built in. As you probably suspect, if you are not sure if something should be encrypted, encrypt it. Backup. Backup. Most people and businesses do not backup frequently enough, and many (if not most) will not realize the danger of their mistake until it is too late. Keep your backups separate from production networks. If ransomware gets onto one of your production networks, it could corrupt any backups attached to that network. Maintain offsite backups in addition to onsite backups. Create appropriate social media policies and enforce them with technology. As so many organizations have learned the hard way, policies alone do not ensure that employees do not leak sensitive information or make otherwise inappropriate social media posts; implement technology to help with this task. Remember, many serious breaches begin with criminals crafting spear-phishing emails based on overshared information on social media. Comply with all information security regulations and industry standards. Consider such regulations a baseline – but not rules that if adhered to will offer adequate protection. GDPR, for example, is a regulation for which many businesses still need to prepare. Use appropriate security technology. Do not just buy the latest and greatest. Acquire and utilize what you actually need by defining functional and security requirements and selecting security controls accordingly. On that note: All computers and mobile devices that handle sensitive information or ever connect to a network to which devices that house sensitive information connect need have security software installed. Ensure that technology is kept up to date. Besides keeping security software current, make sure to install patches to server and client-side operating systems and software. Many major vendors have automatic update services – take advantage of these features. Keep IoT devices off of production networks. Treat Internet of Things devices as if they were a special class of risky BYOD devices – and keep them on their own networks. Only purchase IoT devices that have proper security capabilities such as the ability to be patched and to have default passwords changed upon installation and activation. Hire an expert to help you. There is a reason that businesspeople go to doctors when they are ill and don’t try to perform surgery on themselves, or utilize the services of lawyers if they are being sued or accused of a crime. You need experts on your side. Remember, the criminals who are targeting your data have experts working for them – make sure that you are also adequately prepared. While there are no guarantees when it comes to information security – even the most security-conscious organizations still face some level of risk – by following these 18 tips, you can greatly improve your odds of fending off hackers who seek to steal your organization’s confidential information.To read this article in full, please click here

View More
01-04-2020
BrandPost: Protect your data to protect your business

The most important thing your business provides isn’t a service or a product. It’s trust. And it comes from letting your customers and employees know that you’re protecting your business—and their data—against cyberattacks.Building a foundation for trust isn’t easy. Cyberthreats continue to grow in number and complexity as businesses shift more of their operations online and enable anytime/anywhere access to information to support an increasingly remote workforce. This ongoing digital transformation exposes more systems and data to potential attacks – increasing risk for your organization.Addressing this challenge requires a new approach to protecting business information. “The assumption that everything’s on-premises and protected behind a firewall has largely disappeared,” says Robert Crane, principal at CIAOPS, a technology consultancy that specializes in helping businesses improve their productivity by using technology and smart business practices. “But some businesses are still locked into that old-world thinking.”To read this article in full, please click here

View More
01-04-2020
Wayback Wednesday: It’s either this or spin the Wheel o’ Fish

The IT help desk at this pilot fish’s company has come up with a new approach for assigning trouble tickets: They search the headers for previous tickets on the same application, looking for the name of anyone who has touched a ticket for that application before.Then they route the ticket to that person with this piece of boilerplate: Previous records indicate that you have solved problems with this software before, although we don’t have any documentation that supports this routing. Please assist if possible, or if out of your scope, suggest us with an alternate destination for this ticket. “We're not sure,” says fish, “what it means that ‘records indicate’ when they ‘don’t have any documentation.’”To read this article in full, please click here

View More
01-04-2020
What is Project Treble? The Android upgrade fix explained

It's tough to talk about Project Treble without getting lost in a forest of technical gobbledygook.And it's no wonder: Project Treble (take a deep breath) is Google's ambitious effort to rearchitect Android in order to establish a modular base in which the lower-level code created by silicon vendors is separated from the main Android operating system framework so that device manufacturers can update the OS code without having to rely on silicon vendors to refresh the lower-level code for every release.Whew! See what I mean?In reality, though, Project Treble doesn't have to be so complicated. Let's break down what Treble is actually all about, in real-world terms — and what it actually means for you, as someone who uses Android and doesn't necessarily speak the language of mumbo-jumbo.To read this article in full, please click here

View More
01-04-2020
This project management training can supercharge your team's efficiency

Business owners know the importance of efficiency. That’s why project management methodologies, like Lean Six Sigma, have grown so popular. But wrapping your head around the art of project management is usually easier said than done. Thankfully, The Ultimate Lean Six Sigma Green Belt Certification Bundle is here to guide you through it, all for just $99.99.To read this article in full, please click here

View More
01-04-2020
A socially conscious cash management account

Today, it’s common to see businesses going out of their way to meet the socially conscious nature of their customers. Organic farming, manufacturing goods from recycled materials, and ethically sourcing labor are just a few ways companies are meeting the needs of consumers.Despite those widespread changes, many financial institutions entrusted by consumers to manage their funds are putting profits first. In 2018 for example, the world’s largest banks lent approximately $654 billion to finance businesses in the fossil fuel industry.To read this article in full, please click here

View More
01-04-2020
Microsoft promotes upcoming Edge enhancements

Microsoft on Monday talked up a slew of future features planned to land in Edge in coming months, including tabs stacked vertically along the browser's side and a Firefox-esque Password Monitor.And although Microsoft has not come out and put it plainly, it appears it will mimic Google's Chrome as it resumes releasing Edge builds, including skipping a version to make up for lost time."It's time to expect more from our browsers - more control over our data and our family's online information, new ways to organize our online research and more value back as we browse," wrote Liat Ben-Zur, an Edge marketing executive, in a post to a company blog.To read this article in full, please click here

View More
01-04-2020
Give Chrome a time-saving tab switcher

When I'm working on a computer these days, I tend to think of Chrome as my desktop. And really, it's no wonder: Regardless of whether I'm using Chrome OS or Windows, nearly everything I do now takes place in the browser — or some form of it.And yet, by default, Chrome isn't exactly designed to act like a desktop. It's just missing too many pieces and overlooking too many efficiency-enhancing opportunities. That's why, little by little, I've been looking for creative ways to fill in those gaps and turn my browser into a true desktop-caliber productivity tool.To read this article in full, please click here

View More
31-03-2020
Apple may introduce iPhone 9 this week

I was a little astonished to receive an email from a small iPhone case manufacturer sharing details today of its new case for the iPhone 9, and now it looks like this isn’t an exception, but a wave. Is Apple about to introduce the device?Apple's March announcement? The Apple rumor websites are packed with reported iPhone 9 case sightings. 9to5Mac tells us cases for the device are arriving at retailers (including Best Buy) with “an April 5 merchandising date."To read this article in full, please click here

View More
31-03-2020
Apple may introduce iPhone 9 very soon

I was a little astonished to receive an email from a small iPhone case manufacturer sharing details today of its new case for the iPhone 9, and now it looks like this isn’t an exception, but a wave. Is Apple about to introduce the device?Apple's March announcement? The Apple rumor websites are packed with reported iPhone 9 case sightings. 9to5Mac tells us cases for the device are arriving at retailers (including Best Buy) with “an April 5 merchandising date."To read this article in full, please click here

View More
31-03-2020
COVID-19 puts new demands on e-health record systems

As healthcare providers face unprecedented challenges fighting the COVID-19 outbreak worldwide, electronic health record (EHR) systems are having to adapt to shifting requirements for patient care.  “We have never had an international crisis of this proportion in the lifetime of the current EHR,” said Dana Bensinger MSN, RN-BC, informatics nurse specialist and client solution executive at consulting firm CTG. “Once things settle down, there will be a lot of analysis of how well our systems performed, what our areas of vulnerability are, and how we fix them for the future.”With a surge in demand for hospital capacity, one of the challenges facing hospital IT staffers is figuring out how to quickly deploy EHR systems to alternative care locations. To read this article in full, please click here

View More
31-03-2020
But water has always been our friend!

It’s many decades ago, and this pilot fish’s company gets a call from a customer, a small town’s municipal waterworks. A pipe has burst pipe at the pumping station, which also happens to be the site of the waterworks’ business offices.Good news, though: The computer (yes, there is only one) is fine, having been located on a desk above the high-water mark. But all the floppy disks holding backups are ruined. Those had been stored in the “vault,” which is actually a pit in the concrete floor protected by a lockable manhole cover.The reason for the call is that city hall requires the water department to keep the six most recent monthly backups.To read this article in full, please click here

View More
31-03-2020
Microsoft to shift SMBs' Office subscriptions to 'Microsoft 365' brand

Microsoft today announced name changes to the Office 365 subscription plans in the Business line, substituting "Microsoft 365" instead.The Redmond, Wash. developer did not touch subscription plans aimed at enterprise, education and government.Plan names will automatically change on April 21, Microsoft said in an online statement. Prices of the plans will not change. Office 365 Business Essentials, the lowest-priced plan in the Business line, will become Microsoft 365 Business Basic. Office 365 Business, the middling plan in the trio that provides the Office applications and OneDrive, but no other services, will become Microsoft 365 Apps. Office 365 Business Premium, the most capable and most expensive subscription plan of the three, will become Microsoft 365 Business Standard. Microsoft will change the moniker of Microsoft 365 Business to Microsoft 365 Business Premium to fit it into the Business line as the top-dollar $20 per-user per-month plan. That subscription adds security and management tools to Office 365 Business Standard, née Premium. (Currently, this is the lowest-priced plan in the Microsoft 365 line. After the name changes, though, it will fall somewhere in the middle.)To read this article in full, please click here

View More
CyberLink Vol.138 Mar 2020

Cyberport launches FinTech Training Programme to better equip financial practitioners

Read More >
CyberLink Vol.137 Feb 2020

MAD Gaze raises US$18M to ramp up product R&D and 5G applications

Read More >
CyberLink Vol.136 Jan 2020

Cyberport spotlights digital trade finance and virtual banking at AFF 2020

Read More >