MSPs: Your billing system should not be sitting at their own desk

Despite the economic setbacks shaped by the pandemic, demand for cloud communications services continues to grow. The remote “work-life” arrangement and increased displacement of face-to-face meetings by video conferences has managed service provider (MSP) leaders clamoring to take advantage.

On the downside, this heightened activity has exposed the flaws or outright failures of the billing processes for many MSPs. In fact, “processes” may be too technical a term for how...

The need to become a next-generation data organisation – and leaving the silos behind

Data has always been there. Right back at the start of the last century, organisations of the age still ran their operations using log books, paper folios and hand-drawn accounts sheets. It was still data, but it was predominantly static, often duplicated or inaccurate, tough to search and only accessible to a few people. 

After the second and third industrial revolutions and the arrival of the PC, things finally changed. Software spreadsheets became ubiquitous and dedicated...

How the ‘composable enterprise’ can help solve upgrade headaches

There’s a lot to be said for a really snazzy Lego kit. Maybe it’s the Millennium Falcon that your front room is crying out for (complete with hinged smuggling compartments for hiding from the Empire). Or perhaps paying homage to the city of New York with a 1,600-piece Statue of Liberty is just the ticket.

Completing a Lego kit is extremely satisfying. You can take your time, work instruction by instruction and you know what you’re going to get. But once a kit is completed,...

How CIOs can ensure technological prowess in a rapidly changing world

The COVID-19 crisis has not radically changed the future of technology. It has accelerated our path towards it. Conversations regarding digital transformation, moving to the cloud or using distributed architectures have been resonating in the market since the dot-com bubble. What this crisis has underlined is two realizations: those who had already made the digital transition were best equipped to deal with ambiguity, and that technology-enabled responsiveness trumped preparedness. The...

Five key ways machine learning can thwart phishing attacks

Global mobile phishing attempts surged by 37% amid shift to work-from-home for the thousands of businesses needing to adhere to shelter-in-place directives. According to Verizon, over 90% of breaches start with a phishing attack and with more than 60% of emails being read on mobile, mobile phishing is one of the fastest-growing threat categories in 2020. 60% of IT leaders believe that phishing is the most significant mobile security threat faced by their organization, according to...

Four key steps to transform cybersecurity into a business enabler

Cybersecurity has traditionally been viewed as the department of ‘no’ – thought to be cautious, restrictive, and restrained. COVID-19 demonstrated this to be far from the truth. When physical offices had to suddenly transform into digital, virtual hubs, cybersecurity became an essential part of the innovation process, rather than a roadblock.

Despite this, recent research shows that fewer than 25% of business leaders view security as a proactive enabler of digital...

10 ways AI is improving new product development

Startups’ ambitious AI-based new product development is driving AI-related investment with $16.5B raised in 2019, driven by 695 deals according to PwC/CB Insights MoneyTree Report, Q1 2020. AI expertise is a skill product development teams are ramping up their recruitment efforts to find, with over 7,800 open positions on Monster, over 3,400 on LinkedIn and over 4,200 on Indeed as of today. One in ten enterprises now uses ten or more AI applications, expanding the Total Available...

Managing the complexities of IT convergence: Exploring the future

Today, IT pros find themselves in a new reality, where IT roles have converged in response to the interconnected nature of modern environments. While a focus on cloud and hybrid IT architectures has been crucial in breaking down silos, it’s not without complexities. Ensuring uptime, availability, and performance of systems and applications, and greater collaboration with leadership to drive business success, is paramount. The global Covid-19 pandemic has amplified this, as organisations...

Why cybersecurity remains a key problem across the business

Bottom line: Absolute’s 2020 Endpoint Resilience Report illustrates why the purpose of any cybersecurity program needs to be attaining a balance between protecting an organisation and the need to keep the business running, starting with secured endpoints. Enterprises who have taken a blank cheque approach in the past to spending on cybersecurity are facing the stark reality that all that spending may have made them more vulnerable to attacks. While cybersecurity spending grew at a Compound...

Why securing endpoints is the future of cybersecurity

86% of all breaches are financially motivated, where threat actors are after company financial data, intellectual property, health records, and customer identities that can be sold fast on the Dark Web.70% of breaches are perpetrated by external actors, making endpoint security a high priority in any cybersecurity strategy. 55% of breaches originate from organized crime groups.Attacks on Web apps accessed from endpoints were part of 43% of breaches, more than double the results from last...