Detecting Mobile Malware

Detecting Mobile Malware

Since the breakthrough in botnets specifically for mobile began in 2011, they have been a major headache, and cause for concern, for all those involved with the security of mobile devices. While early generations of botnets have been in operation on computers and...
Handling Self Service IT

Handling Self Service IT

For end-users these days, it’s a wondrous world. IT departments are rolling out tools to enable these end-users access the data and services they require; from employee benefits accounts, to once inaccessible corporate data stacks. Before handing over the reins...
Encrypting Smartphone Calls

Encrypting Smartphone Calls

Many companies, looking to cut the cost of their employee’s tech use, now operate a bring your own device (BYOD) policy. This has obvious benefits, not least of which is the reduction in capital cost of buying smartphone technology for their employees. However,...
Hackers Focus on Cryptoransom Malware

Hackers Focus on Cryptoransom Malware

The fast moving world of information security faces a new challenge as attackers are increasingly focusing on mobile users, embracing cryptoransomware in particular. This makes a change from the years before 2014 as mobile attacks increase exponentially alongside...
Self Service Revolution in Healthcare

Self Service Revolution in Healthcare

Waiting weeks or months for proper analysis of data is a problem for any business. In that time, trends may have come and gone, sales lost, or customers overlooked. Keeping up with the flood of data means IT departments have been overwhelmed with requests and there...
Self Service Shortcut is No Miracle

Self Service Shortcut is No Miracle

The success of BI is in some ways its undoing. Such is the increasing demand that BI teams are struggling under an avalanche of unmet BI needs. In an effort to lighten the load, many are ’embracing a self-service mantra.’ Those in anticipation of a quick...