Technology

Weekly Tech Roundup — February 27, 2017

When it comes to cyber threats, the future is here—malware attacking new devices in new ways and jumping on popular technology trends to do it. Phones aren’t safe, computers aren’t safe, and in some instances, it doesn’t even take clicking on the wrong link or attachment to become a victim of an attack. Keeping up with these threats is becoming a full-time job, and it’s imperative that we do whatever it takes to keep our data safe.

With each week looking slightly different from the last, what tech headlines did you miss?

Scuderia Toro Rosso STR12

Scuderia Toro Rosso has revealed its 2017 Formula 1 challenger, the STR12, at the pit lane outside the garage at the Barcelona-Catalunya Circuit. 

Eric O’Neill: Most of Ransomware Attacks Affect Home Users

Eric O’Neil: Ransomware Attacks Home Users

Frank Jablonski, Acronis Vice President of Global Product Marketing, talks about cyber security with Eric O’Neill, an accomplished public speaker and security expert, who lectures internationally about espionage, cyber security, fraud, and hacking.

What are the top 3 recommendations you would make to consumers to protect their data from security threats?

Security threats are certainly coming after consumers, not just enterprises. We tend to think of it as a problem for business or government, as we see so many hacks and attacks that go after the offices like the Office of Personnel Management, and different government agencies and businesses, like Sony. But the fact of the matter is that most of the malware is affecting the grandparents and parents and just the person with an email account and a computer. And so, if the regular consumers have to protect themselves, they have to do something. There are three good steps:

  1. Technology. You have to have a solution that gives you a preventative defence that you need. Something that is going to search out the malware, something that is going to stop it before it infects you.
  2. Good cyber hygiene.  If you don’t have that, if you’re not smart about how you access things online, if you’re not being careful with your social media, if you’re clicking those links that you get in those emails that don’t really come from your friends — but they are spear phishing attacks, then you’re going to get hit by something like ransomware and lose all your data (unless you pay some hacker sitting somewhere else in the world).
  3. Good backup. Even the best solution can sometimes miss the attack, just because the attackers are that good. So you have to have a good backup that is efficient and quick. It will protect you and let you recover your data in case you get attacked.

Alex Tapscott: Blockchain Will Impact Consumers in Every Industry

Alex Tapscott: Blockchain Will Impact Consumers in Every Industry

Frank Jablonski, Acronis Vice President of Global Product Marketing, talks about blockchain with Alex Tapscott, a co-author of Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World.

Alex Tapscott: Blockchain technology started in the world of financial services, and it’s unsurprising, because in many respects, every part of the industry is due for some form of reinvention. Financial services were really just a start. But what I think blockchain’s lasting legacy will be is the impact that it will have on every single company and the nature of the firm in the future. Because what blockchain does in many respects, is reducing the transaction cost and the need for trust in interactions in business between different entities, whether it’s consumers and companies, or companies and companies, or companies and somebody else. And that’s going to mean a big change to a lot of different industries.

4 Steps to Secure the Devices Your Employees Get for Christmas

During the holidays, many people receive tech gifts like laptops, tablets and smartphones. And many of them will want to bring these devices along with them to work in the new year.

BYOD has been a huge trend for 2013, and we expect it to increase in 2014 and beyond. It makes sense from a lot of perspectives. For one, letting employees bring their own devices cuts the cost of purchasing new hardware. It also means that employees are generally familiar and happy with the tech that they’re using. They wind up being more productive and more satisfied with their jobs in general.

Make the Most of Your IT Budget in Q4

Welcome to the fourth quarter, the time when most IT departments are working hard to tie up loose ends and complete projects before the end of the fiscal year. Economic conditions have caused organizations to do more with less. They are tasked with protecting a growing amount of mission-critical data, often with a shrinking budget.

Now is the time to review and adjust your current technology budget, to make room for investing in new services and new technology. It’s also the time of year when you’ll want to spend any remaining 2012 budget. Failing to do so may result in your budget getting reallocated in 2013. The clock is ticking, so make the most of your 2012 budget in the last quarter. Learn some best practices for technology budgeting: