Around The IT Industry 1/23 – 1/27

by Modis on January 26, 2012

No Gravatar

Symantec recommends disabling pcAnywhere in light of Anonymous threat
Symantec acted in an unprecedented manner when it recommended users disable the product pcAnywhere until Symantec could resolve “vulnerability risks.” The company admitted that its network was breached in 2006, and the source code was put into the hands of Anonymous recently.

5 Microsoft Apps That’ll Impact the IT Industry
Scott Lowe from TechRepublic outlines 5 apps from Microsoft he thinks will dramatically affect IT over the next few years. One of the apps he mentions is the System Center Configuration Manager 2012, which he says will offer an enhanced end-user experience.

EU nations sign ACTA, Polish citizens protest
Digital rights groups have been pushing for the European Parliament to reject ACTA after several EU nations signed up to the controversial agreement. Even though it’s been signed, it still has to get ratified; this is why opposition has arisen, especially in Poland, where more than 10,000 people have gone to the streets in protest.

HD Moore estimates 150,000 videoconferencing systems are vulnerable to hackers
Security researcher HD Moore and Mike Tuchen, the Rapid7 CEO, found 5,000 videoconferencing systems that were set to answer incoming calls automatically, which would let attackers get access to corporate meetings. In light of this finding, the article suggests 3 steps to take to secure your system.

CFOworld writer advises to remember employees when building the cloud
Even though people realize the cloud will be impacting the role of IT, they also need to realize how these changes in the functions of IT will affect business operations, says Dallon Christensen.

7 tips and tools for protecting health care data
Because some of the biggest data security breaches in the health care industry have been at least partly caused by stolen or lost mobile computing devices, this article offers advice on how to protect patient information as well as privacy and security breaches.

Related Posts

Leave a Comment

Previous post:

Next post: