How to Delete Old Accounts Containing Personal Information | McAfee Blog

How to Delete Old Accounts Containing Personal Information | McAfee Blog

Your digital footprint grows with every internet account you make. While your old Tumblr account may be fun for reminiscing, dormant accounts are actually one of the most significant sources of user data on the internet. These accounts can be used by data brokers or third parties to access your personal information.   To improve your data security, it’s good practice to remove public-facing information by deleting unused accounts. Simply put, having less personal data stored…

Read More

SwipeGuide’s CTO on data and the human element in Industry 4.0

SwipeGuide’s CTO on data and the human element in Industry 4.0

An alarm sounds on the factory floor: a critical piece of equipment has malfunctioned. An engineer approaches the machine, scans its QR code, and immediately accesses visual step-by-step instructions for fixing the issue created by the people who work with the same machines every day. This is SwipeGuide, a B2B cloud-based SaaS platform that captures and scales operational knowledge, helping teams in industrial environments to create, improve, and share instructions and standard operating procedures using…

Read More

What Personal Data Do Companies Track? | McAfee Blog

What Personal Data Do Companies Track? | McAfee Blog

Private tech companies gather tremendous amounts of user data. These companies can afford to let you use social media platforms free of charge because it’s paid for by your data, attention, and time.   Big tech derives most of its profits by selling your attention to advertisers — a well-known business model. Various documentaries (like Netflix’s “The Social Dilemma”) have attempted to get to the bottom of the complex algorithms that big tech companies employ to…

Read More

Lessons from the Russian Cyber Warfare Attacks

Lessons from the Russian Cyber Warfare Attacks

Cyberwarfare tactics may not involve tanks and bombs, but they often go hand-in-hand with real combat. The Russian invasion of Ukraine is a prime example. Before Russian troops crossed the border, Russian hackers had already taken down Ukrainian government websites. And after the conflict started, the hacktivist group Anonymous turned the tables by hacking Russian media to shut down propaganda about the war. In these unprecedented times of targeted attacks against governments and financial institutions,…

Read More

Technical Support Scams – What to look out for | McAfee Blog

Technical Support Scams – What to look out for | McAfee Blog

Authored by Oliver Devane Technical Support Scams have been targeting computer users for many years. Their goal is to make victims believe they have issues needing to be fixed, and then charge exorbitant fees, which unfortunately some victims pay. This blog post covers a number of example actions, that scammers will go through when they are performing their scams. Our goal is to educate consumers on the signs to look out for, and what to…

Read More

Black Kite: Cost of data breach averages $15 million

Black Kite: Cost of data breach averages  million

With the median cost per incident coming in at $130,000, most data breaches do not cross the $1 million threshold. Image: Adobe Stock Based on a review of 2,400 cyber incidents between 2017–2022 at 1,700 companies, cyber risk monitoring firm Black Kite concluded the average cost, excluding outliers, of a data breach today is $15 million. According to Black Kite’s 2022 report, The Cost of a Data Breach: A New Perspective, when outliers are factored…

Read More

3 places edge-computing challenges can lurk

3 places edge-computing challenges can lurk

How much computing power should we put at the edge of the network? In the past when networks weren’t supposed to be very smart, it wasn’t even a question. The answer was none. But now that it’s possible to bring often substantial amounts of computational equipment right to the very edge of the network, the right answer isn’t always so easy. The arguments in favor are simple. When packets travel shorter distances, response time is…

Read More

CIO Profile: GroundProbe’s Johnny Serrano shares his journey to IT leadership

CIO Profile: GroundProbe’s Johnny Serrano shares his journey to IT leadership

Johnny Serrano, CIO with Australian mine safety specialists GroundProbe always had a fascination with how things worked, from his first Sony Walkman to the growing number of games that had suddenly become available to kids. “I really knew that I wanted to get paid to make games. That was my whole motivation,” Serrano tells CIO Australia. But it wasn’t until the now CIO50 alumnus finished high school that he started seriously contemplating a professional career…

Read More

Cloud infrastructure sales rise as Microsoft closes in on AWS

Cloud infrastructure sales rise as Microsoft closes in on AWS

Fueled by enterprise demand for data analytics, machine learning, data center consolidation and cloud-native app development, spending on cloud infrastructure services jumped 33% year on year to $62.3 billion in the second quarter, according to Canalys. The Singapore-based market research firm said its latest cloud spending research, released Tuesday, shows that demand for cloud services remains strong despite a global economy suffering from inflation, rising interest rates and recession. Google, Microsoft and Amazon collectively made…

Read More

CVE-2022-31656: VMware Patches Several Vulnerabilities in Multiple Products (VMSA-2022-0021)

CVE-2022-31656: VMware Patches Several Vulnerabilities in Multiple Products (VMSA-2022-0021)

CVE-2022-31656: VMware Patches Several Vulnerabilities in Multiple Products (VMSA-2022-0021) VMware has patched another set of serious vulnerabilities across multiple products including VMware Workspace ONE Access. Organizations should patch urgently given past activity targeting vulnerabilities in VMware products. Background On August 2, VMware issued an advisory (VMSA-2022-0021) for ten vulnerabilities across several of its products. Affected products include: This may seem familiar, as this is the third similar release from VMware so far in 2022. The…

Read More
1 2,801 2,802 2,803 2,804 2,805 4,084