August 31, 2020
Industry Wrap № 11.
And that’s a wrap! Next Dimension curates the most practical and useful tools and strategic IT insights from the web.
This week we shared articles across our social media covering the following topics: IT ROI: Security, IT Strategy to enable Business Strategy, Filling the Vap between the boardroom and server room
Looking for details? Continue reading to see more.
Covid-19 Pandemic has shown us just how ruthless scammers can be. Here are a few tips to avoid falling victim
A dangerous tactic employed by scammers is to create a sense of panic among their targets. That’s one of the main reasons crooks have been able to exploit the pandemic. With so many people fearful of contracting the virus or breaking government-imposed restrictions, it is easier to provoke panic. A fake message tells the recipient that they have been near someone who has had the virus and that they need to get tested. However, the link in the text actually directs recipients to a website that attempts to gain bank details and other personal information.
Here are a few tips to avoid falling victim
- Stay calm. Scammers use time pressure to encourage people to make decisions under stress
- Check the sender. If you receive a message that instructs you to click a link or provide information, always check the sender’s details.
- Install antivirus and cybersecurity software. The battle against malware, phishing and all other types of online and offline threats starts with installing multilayered protection on your devices.
66% of Global phishing attacks are against Canada! The U.S. only gets 7%. This suggests Canadian companies need to raise our cybersecurity awareness.
The increasing number of fraudsters luring in victims with fake domains that resemble legitimate websites, a rising number of which are tied to COVID-19, has led to an overall 12 percent spike in brand abuse attacks. Canada’s proximity to the U.S., a largely English-speaking language, which means phishing attacks can be written in English and appear more legitimate, and our economic status. Phishing remains the go-to weapon of choice for fraudsters, accounting for nearly 55 percent of all cyberattacks observed by the Dell Technologies subsidiary. The internet is being used against us more than before due to the isolation millions of people have been exposed to and the added reliance on the internet it has led to.
RSA researchers also analyzed mobile app trends related to cyberfraud. RSA defines mobile application fraud as mobile applications using an organization’s brand without permission
Filling the Gap Between the Boardroom and Server room
76% of IT Leaders reported employee downtime while adapting IT systems and processes to new business models. An IT Roadmap will minimize this transformation challenge.
When stores and restaurants shut down, suddenly everyone needed to think about how to effectively reach customers virtually. The same for business offices closed, a mad scramble arose to ensure that employees remain productive at home. Every organization is considering how to become more digitized and automated. The cloud, the Internet of Things and artificial intelligence, among other modern technologies, present unlimited ways to make workplaces smarter, more agile and even safer, especially now as governments reopen work and public places. Here are some things to consider when turning short-term IT fixes into long-term sustainability:
- Scale costs to needs
- Go more digital and automate
- Prepare for permanent remote work
- Get smart on going back to work
IT Strategy to Enable Business Strategy
Technology spend will remain conservative through 2020. To justify spend, IT has to tie technology investments to business outcomes. Here are 3 tips.
The pandemic put the brakes on technology spend as companies navigated through short, medium and long-term business projections. Becoming more cautious businesses deferred where possible and closely scrutinized spending. To justify spend, IT has to tie technology investments to business outcomes. Here are three cost-management technology cost management tips to consider:
- Understand what’s in the application stack
A large number of applications have legacy roots. As companies assess their portfolio, previously hesitant organizations are more open to application cuts and the prioritization of decommissioning
- Negotiate with Vendors
Companies purchasing technology have leverage. The potential for negotiations applies to the entire technology stack. The larger the contract, the more leverage.
- Not in use? Turn it off
It’s no different than turning the lights off when leaving a room. Company policies can define cloud usage and automatically turn instances off.