Monthly Archives: August 2014

8 Best Practices for Tightening Internal Data Security

Tech AnnouncementJust how safe is your company data? According to the IBM Cyber Security Intelligence Index, U.S. businesses experienced over 1.5 million monitored cyber attacks in 2013 alone. Sensitive information regarding your internal operations, your customers and your employees is at risk if your organization does not take proper measures to secure its data. Take a look at these eight crucial security reminders for business leaders to keep in mind.

1. Password Character Requirements. There’s a reason why so many web-based consumer services require complex passwords. Unauthorized users are less likely to guess passwords when employees use a blend of phrases, upper and lower case letters, numbers, and punctuation. Work with your IT department to configure the password requirements for your employees.

2. Password rotation. Passwords that go stagnant are a liability for companies. For example, former employees might still be able to gain access to confidential information after they leave the company, if teams use the same outdated group email. Schedule password rotations every few months so that every user must update accounts with new passwords.

3. Session time out. This setting prevents a user’s account from remaining signed into a system after a certain period of time. For example, if a cashier leaves their point of sale terminal, their session should automatically expire after a delay so that no unauthorized users can attempt to operate the point of sale.

4. No outside hardware. No employee should be allowed to use external hardware in the office, such as storage devices or other peripherals, unless cleared by your company’s IT department. External devices can contain spyware or viruses that pose a significant risk to your computers and network. Additionally, this restriction reduces the risk of employees stealing internal data.

5. Installation restrictions. Employees should not be able to install unauthorized software on work computers or mobile devices, since unchecked installations can lead to malware infections. For example, a graphic designer might decide to download a freeware utility to complete a project. While they are well intentioned, this employee might accidentally install a trojan on their work computer.

6. Managed mobile devices. Mobile device management (MDM) software allows you to enroll in-house and BYOD technology in a system that deploys security configuration settings, company data and content over the air. This is an excellent way to enforce remote security restrictions, such as password updates or app restrictions. Once an employee leaves a company, company-related data can be quickly wiped from their device remotely.

7. Backup encryption. Copies of your company data can also be a weak point, if unauthorized users are able to view and edit these files. Work with your IT department to create redundant and encrypted backups of your business-critical data.

8. Remote wipe. Mobile device solutions like Android Device Manager and iCloud allow you to remotely wipe device data if your smartphone or tablet is lost or stolen. This will quell your fears about confidential data leaks, in case you forget your phone at a restaurant. Many of these remote security systems also help you track and lock your devices, so that you can attempt to recover your technology before erasing it.

Anyone  from the newest intern to C-level executives can become a target of digital crime. Train your employees to observe data security best practices. Taking proactive measures will help your business stay ahead of threats.

Make an impact with a career in UX/UI and e-commerce at Accenture Digital

Tech AnnouncementDigital has forever changed the way businesses operate: how they’re structured; how they market themselves; and how they sell to consumers. Find out if you’ve got what it takes to make an impact with a career at Accenture Digital.

Check out the openings in ‘UX/UI’ and ‘e-commerce’ and apply today!

-HTML5 – Hands-on experience in Javascript, JQuery, CSS, HTML and any of the frameworks like Sencha, Appcelerator, Jquery mobile. Apply today!

User Experience (UX) – Experience in Visual Designing for Web apps and Multi-Platform Mobile Apps, Style guide Preparation, Adobe Design Tools. Apply today!

-Adobe CQ5 – Proven ability to work, drive and continually learn the latest platforms, technology tools in Adobe AEM and its underlying technologies. Apply today!

-Hybris – Relevant Hybris experience with exposure to various Hybris modules like ecommerce, PCM, WCMS, SOLR search, REST services, and localization. Apply today!

-ATG Commerce – Relevant ATG experience with exposure to e-commerce, merchandizing(BCC), Endeca search, droplets and formhandlers, Repository, localization. Apply today!

-IBM Websphere Commerce – Relevant WCS experience with exposure to e-commerce, member, merchandizing(BCC), Frameworks like Commands framework, Struts, BOD, EJB, working experience with merchandising Management Center, and localization. Apply today!

Check out all opportunities in Accenture Digital.

Source: Tech Gig

Facebook plans to cut into Google’s advertising business

By Lisa Eadicicco

fGoogle may be dominating the online advertising business, but Facebook could be readying a new ad strategy to take some of that spotlight off the search engine giant, reports Tom Dotan and Amir Efrati at The Information.

Facebook is reportedly pouring more resources into Atlas, the ad server Facebook bought from Microsoft for an estimated $30-$50 million in 2013.

The social network is said to unveil a new set of features that aimed at competing with Google’s display advertising platform DoubleClick as early as September.

One of these new features will be a “demand-side platform,” which is a system that lets advertisers make automated bids for ad inventory. This demand-side platform would be designed to specifically compete with Google’s DoubleClick Bid Manager.

Facebook is also reportedly in talks to provide Nielsen with data from major publishers to improve ad tracking.

Facebook is already raking in a ton of revenue thanks to its mobile presence. Facebook saw a 50.5% increase in US digital ad display revenue last year, while Google saw a 33.3% growth rate, according to statistics published by eMarketer in March.

Facebook isn’t the only tech company looking to cut into Google’s ad business. Amazon is also reportedly building new software to compete with Google’s AdWords platform, the Wall Street Journal reported earlier this month.

Source: Tech Announcement

Amazon Is Turning Into Google

Amazon CEO Jeff Bezos.

Amazon CEO Jeff Bezos.

Tell me which company this sounds like:

A company that…

  • Has its own mobile operating system for tablets and smartphones.
  • Has its own app store.
  • Sells digital music, books, movies, and TV shows.
  • Will soon have an online ad network.
  • Created a way to accept payments with a smartphone.
  • Owns the servers that act as the backbone for several major apps and startups and even parts of the CIA.
  • Is experimenting with drones.
  • It’s not Google. It’s Amazon.

But just like Google has expanded beyond search into everything from finding ways to cheat death to making cars that can drive themselves, Amazon has been increasingly expanding beyond its core e-commerce business.

And in recent months, that only seems to be speeding up.

Amazon’s $970 million purchase of Twitch, a site that lets you watch people play video games via a live stream, is its latest push into original video content and a move to transform itself into part media company. It’s a longer-term bet that the trend of watching stuff online versus cable will continue.

Add that on top of the stuff listed above, and Amazon suddenly sounds less like an online store for buying books and gifts and more like a company trying to insert itself into everything you do online. It sounds very Google-y.

Plus …

There’s experimentation with same-day delivery, grocery delivery, and point of sale systems for brick-and-mortar retailers. Those are all things Google is working on or has at least experimented with.

The only difference, of course, is that Google is wildly profitable while Amazon continues to post losses each quarter. (Next quarter could be a doozy. Amazon said to expect at least a $410 million operating loss.)

But it’s also a changing company, one that’s no longly simply “the everything store,” but an entity creeping its way into everything we do from shop to play games to run our small businesses.

Disclosure: Jeff Bezos is an investor in Business Insider through his personal investment company Bezos Expeditions.

Source: Tech Announcement

Infosys Training Program for graduates with 10k as stipend: Apply Now

Tech AnnouncementIndia is home to more than 3400 engineering colleges. Several studies by NASSCOM have shown that only 25 percent of these students are employable in the IT industry. This is mostly due to constraints such as accessibility, exposure, communication skills, and orientation to the IT industry.

Spark-IT, an initiative by Infosys Foundation, endeavors to enhance the skill levels (technical and behavioral) of graduates and orient them to meet the needs of the IT industry. To achieve this, Spark-IT will extensively leverage tools, curricula, faculty, and expertise within Infosys. The initiative aims to bridge the gap between college education and requirements for a career in information technology for deserving and meritorious graduates who are at disadvantage due to their locational, educational, financial, and societal realities.

Program Details

Spark-IT plans to train 1,800 graduates spread across 8 – 10 batches at one of the Infosys campuses. These graduates will undergo a 3-month rigorous training program that will cover the basics of IT and help them build a strong understanding of concepts. Some of the courses covered include data structures, RDBMS concepts, algorithms, object-oriented concepts, programming, etc. In addition, the program will also impart soft-skills training to improve communication and interaction skills of the graduates. The course is designed to help these students learn in a world-class environment.

Graduates who are selected for Spark-IT will receive:

  • Reimbursement of one-time onward and return travel expenses
  • A stipend of INR 10,000 per month
  • Boarding and lodging allowance of INR 5,000 per month
  • Twin-sharing accommodation within the campus, chargeable at INR 3,000 per month
  • Hospitalization, medical, and personal accident insurance

    Apply Now

Source: Infosys Foundation