How might you begin your IT security transformation? 100TB has put together some key pointers to help you come to terms with the growing threat of cybercrime, and more importantly, show you how to proactively overcome such threats.
A politician, by definition, needs to be able to connect with different groups of voters, with varying views and priorities, in order to get elected. And those seeking the ultimate political prize, the US presidency, have vast teams of political analysts, pollsters and campaign strategists, all trying to understand what those different groups want and how best to appeal to them.
In the wake of last month’s Brexit vote, the UK needs to stimulate its economy and ensure it becomes an increasingly attractive place to do business, both for home-grown and overseas companies.The UK must also improve the quality of life for citizens and focus on healing the social divisions exposed by the referendum result, particularly since it seems a significant number of people voted ‘leave’ as a general protest against political elites, growing social inequality and years of inadequate strategic planning and investment in communities and public services.
“If I’m a cyber-terrorist I’m going to hack into Nest, take its servers down for 24 hours during a cold snap in the middle of winter and wait for the pensioners to die…”
Fortunately Derek McAuley isn’t a cyber-terrorist. He’s Professor of Digital Economy at the University of Nottingham and director of the Horizon Research Institute, a respected IT expert whose career spans academia, industry and start-ups.
When people talk up the promise of open data and big data analysis, there’s invariably an elephant in the room: the thorny question of data protection. Many of the more exciting possibilities touted for the technology rely on systems being able to process sensitive data sets such as patient health records, detailed logs of people’s movements, web browsing habits, what appliances they use and when, and so on. But increasingly, people are only likely to permit this data to be processed by third parties if they can be sure it’s handled in a safe and secure manner that cannot expose any of their personal information.
Ever since the Luddites protested against the mechanization of textile industry in the early 19th century, people have feared that technology will dehumanize the workplace. And in some ways, of course, it has.
IT industry analysts are typically gung-ho about the potential of the Internet of Things to transform business and society, with lofty predictions of exponential growth.
Can computers put some pizazz into our presentations? On past evidence, you might not think so. The phrase “death by PowerPoint” hasn’t become a business cliché for nothing.