Let’s Talk Big Data More and more consumer data is collected every day. In fact, according to an infograph provided by Elexio, 90% of it was produced and collected these past couple of years. From how we use our credit cards, which stores we shop at and how we use social platforms, data is being collected in mass quantities. Now it is just a matter of how we use the data. Is all this information really significant or does the data in the amounts of hundreds of petabytes have little worth? Based on the evidence provided by Elexio’s infograph, information
Why BYOD Is Boosting Business Cloud Computing Adoption The popularity of BYOD (or ‘Bring Your Own Device’) has surged in recent years, with around 67% of employees bringing their own computing tech into the office for work – whether that’s something large like a laptop to function as your ‘office computer’, or something smaller like a smartphone or tablet which is used for pulling up data and accessing records while in the boardroom and away from your desk. With the cloud computing market value expected to reach hundreds of billions of dollars within the next years, it comes as no
Beware of Computer Malware: The Cross-Platform Problem There was a time where you could safely assume a portable drive hooked onto to a windows PC wouldn’t be able to transfer some strain of malware to a MAC system. Most viruses were a match made in heaven for Windows, and MACs were getting none of that action. Things have changed, however. We’re now faced with cross-platform threats such as Koobface, the story of which has been illustrated in the following infographic. Malware such as Koobface is only a tiny part of a much larger botched up security puzzle. One way to
Understanding Twitter’s Security Enhancements Last week Twitter announced a significant security enhancement – enablement of forward secrecy on twitter.com, api.twitter.com, and mobile.twitter.com domains. The prime objective of this change is to deprive hackers of an important exploitation tool. Why was this necessary? In the past 18 months, Twitter, akin to many other social network companies, has come under several cyber attacks by hacking community. Though not publicly acknowledged, some of them may have lead to data breaches as well. Also in between a new adversary has emerged in the form of Govt. assisted programs like NSA. It is now widely
Let’s Talk Workspace Cloud Security! Let’s face it, security most likely tops the list for IT challenges and now with cloud technology’s significant expansion over the years and the increase of personal devices, also known as BYOD, being used in and outside the workplace, the challenges have gotten that much more intense. As per BT.com’s infograph nearly half the concerns about BYOD security includes giving out unauthorized security information, using an unsecure device, and even theft of devices. (Image Source: Shutterstock) BYOD’s are the biggest concern; however, a company’s most fragile security spot begins with its employees. More specifically, human
What Do People Expect Out Of Cloud Telephony? Due to the wide variety of advances in communications and information technology, people now have high expectations regarding this different methods of communication that are coming out. A lot of people are also interested in having a look at cloud telephony and seeing how it can help their business. Using cloud telephony often means browsing through the different options and seeing what sort of package will work best in your company. Cloud computing as a whole is becoming more popular and is often seen as a much easier and safer method, though
The Lighter Side Of The Cloud – Black Friday Online By David Fletcher *Please Note: All David Fletcher comic images on this site are owned by CloudTweaks.com. If you would like to reuse them on your social media network, please feel free to do so as long as there is a clearly defined link to the original comic source. If you would like to use them in a Newsletter, Print, Powerpoint or Website. Please contact us regarding the licensing details and policies.