Category: IT Management

Broken backups: Why backup alone isn’t enough to ensure business continuity

Determining your risk profile is the first step when it comes to improving how your business backs up data.

IT Managers lack visibility into almost half of network traffic

IT managers lack visibility to about 45% of their organization’s network traffic, creating significant security challenges.

Most IT Execs have zero control over password hygiene

Despite the clear danger that passwords pose to organizations, more than half of IT executives rely solely on employees to monitor their own password behavior.

The surprising truths and myths about microchip implants

Microchip implants, now being offered to workers by some companies, do come with risks, but not the ones you might imagine. The tiny bump on the back of Dave Williams’ hand is barely noticeable — most people would miss the rice-grain-sized lump between his thumb and forefinger at first. It is only when the 33-year-old ...

It’s happening! Wisconsin company becomes first in the U.S. to microchip employees

A Wisconsin company called "Three Square Market" will have employees (voluntary) receive RFID (microchip) implants that will allow them to access doors, vending machines and other facilities around the workplace. This may sound good on paper, but could have very dangerous consequences in the future if RFID implants become accepted and mandatory worldwide. The rice ...

Google funds automated news project

Google is funding a robot journalism project in which computers will write 30,000 stories a month for local media. The Press Association (PA) news agency received £622,000 for its Reporters and Data and Robots (Radar) scheme. Radar will benefit "established media outlets", independent publishers and local bloggers, PA said. One expert said it was unlikely ...

You don’t need a metal hook anymore to steel a car. A smartphone will do just fine!

Charles Henderson found he still had smartphone access to his old car even though he'd sold it Charles Henderson loved his "awesome" convertible, particularly the fact that he could start, lock and unlock it remotely via his mobile phone. But after he sold the vehicle, he was astonished to discover that he could still control ...

Astonishing! How Facebook’s tentacles reach further than you think

Facebook's collection of data makes it one of the most influential organisations in the world. Share Lab wanted to look "under the bonnet" at the tech giant's algorithms and connections to better understand the social structure and power relations within the company. A couple of years ago, Vladan Joler and his brainy friends in Belgrade ...

Ransomware cyber-attack threat escalating – Europol

Friday's cyber-attack has affected more than 200,000 victims in 150 countries, Europol chief Rob Wainwright says. He told the BBC the act was "unprecedented in its scale". The virus took control of users' files, demanding payments; Russia and the UK were among the worst-hit countries. Experts say another attack could be imminent and have warned ...

Which locks your phone best: Pins, Patterns or Passwords?

The popular pattern lock system used to secure millions of Android phones could be cracked within just five attempts - and more complicated patterns are the easiest to crack. With hacking methods getting more advanced all the time, which phone lock should you be using: pin, pattern, password, or print?

Trending topics on The Resilience Post

A new Twitter feature to make life easier for emergency managers! Top 5 misconceptions of IoT network and device security Nintendo offers $20K to hack the Switch Adidas and Amazon re-write the rules on supply chain management When your mojo drops by Paul Kudray And many more posted daily! Follow us on your favorite social network: ...

Apps vs. Chatbots: The fight for the Supply Chain future

Apps mean a simpler Supply Chain; Bots mean a more personal one The user end of the supply chain has a huge effect on the whole thing. It’s for this reason that the current fight between apps and chatbots is so important. When shopping evolved into its online form, so too did the supply chain. ...