The underlying concept of Box Notes is not unique. Popular tools like Evernote and OneNote accomplish the same goal. But what sets Box Notes apart for businesses that rely on Box for file storage and sharing, is the fact that it's tied in to the same security controls, file sharing permissions, and data encryption as the rest of the data they store and manage in Box.
Have you ever had a smartphone or tablet stolen? The devices' size and portability makes them prime targets for criminals, and there is a rising trend of people being mugged for their mobile devices. A new study found that consumers are increasingly concerned with the risk of having a mobile device stolen.
In the study conducted by Inhance Technology, a provider of mobile device insurance and protection programs, 27 percent of U.S. consumers reported being more fearful of being mugged for their smartphone or tablet. The results were slightly lower—only 21 percent—for consumers in the United Kingdom.
Smartphones and tablets aren’t cheap, so it makes sense to be worried about having a mobile device get lost or stolen. One aspect of the study that stands out, though, is the fact that 77 percent of female respondents, and 72 percent of male respondents actually consider the personal content on the mobile device more valuable than the device itself.
It’s not news that mobility is one of the major driving forces in IT today. Smartphones and tablets continue to supplant traditional PCs as primary computing devices, as people are getting more done from wherever they happen to be. A new study from Aruba Networks found that the demand for mobile productivity also puts significant stress on IT personnel and budgets.
Aruba Networks conducted a survey of 1,000 IT professionals from around the world. The goal of the study was to learn more about how IT professionals are managing younger employees, dubbed "GenMobile" in the study. Aruba Networks also commissioned The Future Laboratory to conduct a separate, but related, study to examine what the workplace will look like in the near future. Combined, the studies are a good illustration of existing trends and challenges facing IT and a compass to help organizations plan for the rapid changes on the horizon.
One point that seems clear in both studies is that wireless connectivity is a business requirement. Businesses recognize that ubiquitous access to wireless connectivity leads to higher employee retention, more productivity, and greater cost savings. Aruba Networks also discovered, however, that there is a long way to go to achieve the goal of an all-wireless workplace for most businesses.
The 2014 World Cup tournament kicks off today in Brazil. Soccer (or football anywhere outside of the United States) is the most popular sport in the world, and billions of people will be following the matches closely. While you’re busy figuring out how to stream games to your work PC while appearing to be busy with an Excel spreadsheet, you should be aware that World Cup will also be a feeding frenzy of malware and phishing attacks.
This shouldn’t come as a surprise. Capitalizing on major news and current events is a common technique for cyber criminals. Millions of people sitting on the edge of their seats, waiting for any tidbits of information related to the World Cup tournament, are simply too big and too easy of a target to pass up.
Guillaume Lovet, senior manager of the FortiGuard Labs’ Threat Response Team, shared his thoughts with me about the top four scams you should be on the lookout for as the World Cup gets underway.
One of the best ways to demonstrate expertise and establish a positive reputation for your business or your employer is by sharing information through posts on a website. And one of the best ways to engage customers is to allow comments on those posts and to respond to them. If you’re not careful, though, spammers will derail your comments and possibly drive potential customers away.
A new report from Imperva reveals that 80 percent of the comment spam originates from less than one-third of the spammers, and a mere 17 percent of comment spammers actually account for a majority of the comment spam traffic. Imperva also found that nearly 60 percent of comment spammers are active for long periods of time.
Wikipedia defines comment spam as "a broad category of spam bot postings, which abuse Web-based forms to post unsolicited advertisements as comments on forums, blogs, wikis and online guest books.”
Six down, six to go. Today is the Microsoft Patch Tuesday for June, and it comes with seven new security bulletins. The good news is that five of the seven are only rated as Important, but one of the two Critical security bulletins—the cumulative update for Internet Explorer—is huge.
In all, the seven security bulletins address a total of 66 specific vulnerabilities. The Cumulative Security Update for Internet Explorer (MS14-035) accounts for 59 of them—a record for a single Microsoft security bulletin.
Microsoft issued fixes for flaws in remote desktop, Lync Server, XML Core Services, Word, the TCP protocol, and the Microsoft Graphics Component that affect a range of products and services including versions of Windows and Office. The impact of a successful exploit ranges from denial of service, to information disclosure, to remote code execution, but the “star” of the show is Internet Explorer.
This week at WWDC, Apple’s annual developer conference, Apple showed off some of the new features and capabilities coming soon in iOS 8 and Mac OS X Yosemite. The level of integration between the mobile and desktop operating systems looks impressive, but maybe Apple should be focusing on how to provide that level of integration for Windows users with iOS devices.
Apple revealed some very cool capabilities that blur the line between the mobile device and the desktop. Mac OS X has already been able to send and receive messages in Apple’s proprietary iMessage service, but Yosemite will be also be able to interact with SMS text messages sent to the user’s iPhone. The new version of Mac OS X will also be able to view Caller ID information for incoming calls on the iPhone, and make and receive calls directly from the PC.
Those are great features. But that Mac users are a relatively small market that misses most iOS users. Mac OS X has gained some market share in recent years, but it still hovers well below 10 percent. iOS, on the other hand, has been a dominant force in mobile devices since the launch of the original iPhone. The result is that most iOS users don’t actually use Mac OS X—in fact a recent report from Business Insider suggests that seven out of ten Windows users also have an Apple device.