Posts

Here at Serviceteam IT the team have written a lot about the Internet of Things (IoT). It seems to be everywhere. However, now there are an increasing number of reports which warn technology companies, governments and the insurance sector about cyber-security threats from the IoT. We all need to take an interest in how we can make sure this emerging technology of connected devices is safe to use.

Leverage Azure and Office 365 for Multi-factor Authentication. The geo-distributed, high availability design of Azure AD means that you can rely on it for your most critical business needs. With the prevalence of smart phones, tablets, laptops, and PCs, people have far too many options on how they are going to connect, and stay connected, at any time. Multi-Factor Authentication through Azure is an easy to use, scalable, and reliable solution that provides a second method of authentication so your users are always correctly authenticated.

Cyber-security incidents are at large, and everybody knows it. Data breaches are now a daily occurrence and threaten both businesses and individuals. But just how many people do these incidents affect, where do the hackers come from, and what should I look out for to prevent a cyber-security attack on my device?

Serviceteam IT’s Beyond the Cloud: UK Technology Research 2018 in partnership with Doogheno revealed that 75% of respondents held their cloud services in the UK. Europe was the second most popular answer but only with 35% of respondents. Is there a reason why the UK is such a popular location for cloud services for British business? Should you be doing the same? 

One thing is certain, Britain is facing an uncertain future. This means UK businesses across all industries are facing significant challenges. Do we have the skills to deal with them? More importantly, should businesses be changing their strategy to accommodate a skills shortage? 

Israel has accused Hamas – a Palestinian Islamist group – of using a World Cup live scores and fixtures app and two fake dating apps to hack soldier’s smartphones and spying on them. Who can be safe from cyber-criminals and hacking?

Dog collars to toasters are connected as part of the Internet of Things (IoT), with experts predicting that by 2020 more than 50% of new businesses will run on the IoT. However, cyber security and privacy are the biggest challenges for IoT, collecting large amounts of personal identifiable information. As soon as some financial benefit from hacking smart devices appears, cyber criminals will find a way to take advantage of it.

Many have labelled the rise of Artificial Intelligence (AI) as a new type of industrial revolution. AI has the potential to improve productivity across a range of sectors, whilst lowering costs. However, there are risks of AI, similar to any technology that is not adequately managed or secured. The criminal network has been improving this capability for years through the use of botnets, and AI brings with it a new range of cyber security risks.

The digital economy now contributes approximately £97 billion a year to the UK economy and is attracting a significant amount of investment each year. It was very important that the technology sector was included in the sampled population for the questionnaire. The survey aimed to determine what the current use of the cloud is within this industry and additionally what individuals from this sector view as the greatest challenges to their IT plans over the next few years.

Hundreds of Scientific Research companies hold their headquarters or research facilities in the UK. not only do they represent a significant proportion of the UK economy, but also attract a great deal of Government and investment activity. The survey aimed to determine what the current use of the cloud is within this industry and what individuals from this sector view as the greatest challenges to their IT plans over the next few years.