• How to thwart cyber criminals seeking to target smaller businesses

    How to thwart cyber criminals seeking to target smaller businesses
    Cyber criminals are increasingly targeting small and medium sized businesses (SMBs) in the belief that they have not invested in the security technology required to thwart attacks. In fact, 43% of cyberattacks are aimed at SMBs. Cybercriminals are rational, profit-driven and highly organised: they know that attacking easy targets can result in a bigger aggregate pay-day.  To read this article in full, please click here
  • Building the foundations of a sustainable innovation strategy

    Building the foundations of a sustainable innovation strategy
    Modern customer demands and evolving technology capability mean smaller businesses are seeking digital transformation as eagerly as their enterprise counterparts.   In the UK, for example, a recent survey by the Federation of Small Business (FSB) suggests that in the past three years, 69% of companies have either brought an entirely new product to market (25%), improved existing products (38%) or improved or introduced new internal or customer-facing processes (25%).  To rea
  • Australia’s new ‘right to disconnect’ law includes jail time — for now

    Australia’s new ‘right to disconnect’ law includes jail time — for now
    A new Australian law includes a “right to disconnect” that would give employees the right to seek an order from the government barring their employers from requiring them to respond to emails or phone calls outside of working hours. For the moment, it also provides for penalties that could include jail time.The Fair Work Legislation Amendment (also known as the Closing Loopholes No. 2 Bill), secured passage in both houses of Australia’s legislature on Monday. It leaves  o
  • The AI data-poisoning cat-and-mouse game — this time, IT will win

    The AI data-poisoning cat-and-mouse game — this time, IT will win
    The IT community of late has been freaking out about AI data poisoning. For some, it’s a sneaky mechanism that could act as a backdoor into enterprise systems by  surreptitiously infecting the data large language models (LLMs) train on and then getting  pulled into enterprise systems. For others, it’s a way to combat LLMs that try to do an end run around trademark and copyright protections.To read this article in full, please click here
  • Advertisement

  • Digital work apps arrive for Apple’s Vision Pro

    Digital work apps arrive for Apple’s Vision Pro
    Among the hundreds of native apps already available for Apple’s new Vision Pro headset, there’s already a range of tools focused on getting work done.Microsoft, Cisco, and Zoom are among the software vendors that have already optimized their enterprise apps to function on Apple’s spatial computing device. They  make use of the Vision Pro’s immersive virtual environments (to varying degrees) and large viewing space, promising new ways to view and interact with conten
  • Segro chief executive David Sleath says it is time to stand up for the biggest trading estate in Europe - This is Money

    Segro chief executive David Sleath says it is time to stand up for the biggest trading estate in Europe  This is Money

Follow @ITExecutiveUK on Twitter!