Empowering you with mission-critical IT and Communications Information

News and Resource Center

News and Happenings

  • What’s Ahead for Tech, Media and Telecom in 2020?

    (Morgan Stanley) What will be the biggest Tech, Media and Telecom trends in 2020? Morgan Stanley’s analysts and TMT Barcelona conference attendees share key debates and topics for the year ahead. Highlights include: Katy Huberty, Head of North American IT Hardware Equity Research, discusses how 5G will go from promise to rollout in 2020, driving a decade of growth, productivity and IT spending.

    Read More
  • Ransomware may have cost the US more than $7.5 billion in 2019

    Cybersecurity

    #Cybersecurity (MIT Technology Review) It was another big year for ransomware, the extremely profitable style of cyberattack in which computer systems and data are taken over by hackers and held hostage until the victim hands over a payoff. In 2019, these attacks wreaked havoc around the globe, earned criminals vast sums, and even occasionally provided a weapon for government hackers.

    Read More
  • The Chaos of California’s New Privacy Law Has Already Begun

    (Gizmodo) California is becoming a monument to how much businesses surveil and abuse its residents, as apps and stores are scrambling to put up “Do Not Sell My Info” notices in compliance with the state’s hefty data privacy law. Under the California Consumer Privacy Act, which goes into effect on Wednesday, January 1, 2020, businesses operating within the state will be forced to provide consumers an option to opt-out of having their data sold, to have their data deleted, and to see data collected about them.

    Read More
  • 2019 Data Breach Hall of Shame

    Cybersecurity

    #Cybersecurity (CNET) The biggest recurrent motif among the major data breaches of 2019 wasn’t the black-hooded hacker in a dark room, digging into a screen full of green text. It was a faceless set of executives and security professionals under the fluorescent lights of an office somewhere, frantically dialing their attorneys and drafting public relations apologies after leaving the front doors of their servers unlocked in public.

    Read More
  • Apple Has Secret Team Working on Satellites to Beam Data to Devices

    (Bloomberg) Apple has a secret team working on satellites and related wireless technology, striving to find new ways to beam data such as internet connectivity directly to its devices, according to people familiar with the work. The Cupertino, California-based iPhone maker has about a dozen engineers from the aerospace, satellite and antenna design industries working on the project with the goal of deploying their results within five years, said the people, who asked not to be identified discussing internal company efforts.

    Read More
  • New Orleans Targeted by Ransomware Attack, Shuts Down City Network

    Cybersecurity

    #Cybersecurity (Digital Trends) The city of New Orleans has been the target of a cyberattack which lead to officials shutting down the city’s network and declaring a state of emergency, as reported by Forbes. This follows a number of high-profile attacks against city infrastructure in the U.S., such as the ransomware attack which hit Baltimore earlier this year and a cyberattack against Dallas in 2017.

    Read More
  • 15 Alarming Cyber Security Facts and Stats

    Cybersecurity

    #Cybersecurity (Cybint) The cybersecurity industry is rapidly growing every day. Although more resources are being deployed to counter cyber attacks, the nature of the industry still has a long way to go before we can, as a whole, catch up with these threats. It’s important for us to define what the current information security and cybersecurity industry looks like with these alarming 15 Cyber Security Facts and Stats.

    Read More
  • Go passwordless to strengthen security and reduce costs

    Cybersecurity

    #Cybersecurity Go passwordless to strengthen security and reduce costs (from Joy Chik, Corporate VP, Microsoft Identity) We all know passwords are inherently unsecure. They’re also expensive to manage. Users struggle to remember them. It’s why we’re so passionate about eliminating passwords entirely. Passwordless solutions, such as Windows Hello, FIDO2 security keys, and the Microsoft Authenticator app, provide more secure and convenient sign-in methods.

    Read More
  • The Verge’s Gadgets of the Decade

    Mobile Device Management

    #Mobile Device Management From Google Glass and fidget spinners to iPhones and the Tesla Model S. (The Verge) The story of technology in the 2010s is the story of gadgets going from the corners of our lives to everywhere all the time. The tools to create and consume culture are omnipresent now, offering us incredible new capabilities but also demanding that we care for them more than any consumer products in history.

    Read More
  • Apple iOS 13.3 Drops With Killer New Security Feature, Here’s How To Use It

    Cybersecurity

    #Cybersecurity (Forbes) Apple iOS 13.3 is finally here with a bunch of cool new features, including the ability to use security keys with the Safari browser. News that security keys such as the iPhone compatible 5Ci YubiKey would be supported in iOS 13.3 first arrived in November as part of the release notes for Apple’s second developer beta.

    Read More
  • Study: Ransomware, Data Breaches at Hospitals tied to Uptick in Fatal Heart Attacks

    Cybersecurity

    #Cybersecurity Hospitals that have been hit by a data breach or ransomware attack can expect to see an increase in the death rate among heart patients in the following months or years because of cybersecurity remediation efforts, a new study posits. Health industry experts say the findings should prompt a larger review of how security — or the lack thereof — may be impacting patient outcomes.

    Read More
  • Unified Communications as a Service: What It Is and How It Works

    Voice and Data Services

    #Voice and Data Services In today’s world, we are constantly communicating with each other and there are many different forms for these communications. We make phone calls and send emails and text messages like we have for many years. But we also communicate online via voice over IV (VoIP) conference calls and meetings, social media, chat and messaging services, collaboration tools, file sharing, and so much more.

    Read More
  • Your Toolkit for 2019 National Cyber Security Awareness Month is Here

    Cybersecurity

    #Cybersecurity National Cyber Security Awareness Month. It’s the month you’ve been training for all year. As a security awareness professional, this is your time to shine and help spread cyber awareness across your organization. And we’ve got the toolkit to help you create a stellar campaign. Observed every October, the annual National Cybersecurity Awareness Month (NCSAM) aims to secure behaviors and maintain digital privacy in the cybersecurity landscape.

    Read More

BetterBlog

  • Ransomware may have cost the US more than $7.5 billion in 2019

    News and Resources

    It was another big year for ransomware, the extremely profitable style of cyberattack in which computer systems and data are taken over by hackers and held hostage until the victim hands over a payoff. In 2019, these attacks wreaked havoc around the globe, earned criminals vast sums, and even occasionally provided a weapon for government hackers.

    Read More
  • 5 Benefits of Hiring a Managed IT Services Provider

    News and Resources

    The increasingly competitive business landscape demands that businesses evolve rapidly to stay relevant to their customers. They must understand their customers better, innovate faster than ever before, and deliver consistently superior value to them. All of this can be possible only when the businesses are able to focus on customer satisfaction, innovation, product development, and other mission-critical activities without stretching their resources too thin on non-core activities.

    Read More
  • Why a Communication Audit Is Worth the Hassle

    News and Resources

    In business, audits tend to represent both a short-term hassle and a chance at positive long-term change. But many organizations may not be aware of the value a communication audit can provide. Defined by content and PR firm Ragan as a tool to “uncover glaring weaknesses” in company communications, an audit can be particularly effective when moving tools to the cloud is the right step.

    Read More
  • Fixed Vs. Non-Fixed VoIP Phone Numbers – Everything You Need To Know

    News and Resources

    The difference between fixed and non-fixed VoIP numbers isn’t particularly complex, though it may not be readily apparent to someone who doesn’t fully understand what VoIP is to begin with. In short, fixed VoIP numbers are associated with an account holder’s physical address while non-fixed VoIP numbers aren’t fixed to any specific address.

    Read More
  • Quick-Start User Guide for Polycom Phones

    News and Resources

    Polycom phones are one of the most commonly-used communication tools for businesses, and it’s no surprise — they are versatile, reliable, and have a wide variety of options available. They’re a great option for use with hosted VoIP or SIP solutions in conference rooms, at employees’ desks, and in call centers.

    Read More
  • How Employee Mobility is Improving the Customer Experience

    News and Resources

    When it comes to customer service, quality and convenience have become baseline expectations. According to PwC, nearly 80 percent of American consumers say speed, convenience, knowledgeable help, and friendly service are the most important elements of a positive customer experience. The report also found employees are not meeting customers’ expectations, stating only 38 percent of U.

    Read More

Subscribe to our newsletter

Resources

© 2002 - 2020 BetterWorld Telecom, LLC | All Rights Reserved