EternalRocks worm combines seven leaked NSA attack tools

Hard on the heels of the WannaCry ransomware attacks, a researcher has found a worm that combines four NSA exploits and associated attack tools, including EternalBlue used by WannaCry

Agile unlocked: Pivotal uses paired programming and PaaS to bolster cloud app development

Digital transformation consultancy Pivotal explains how paired programming, an empathetic work culture and open source PaaS help enterprises achieve their agile software development goals

Only 9% of parents want kids to be tech entrepreneurs

Study shows UK parents would prefer their children to have a traditional job such as doctor, teacher or lawyer

Dutch railway uses IoT to reduce people jams

Railway stations in The Netherlands are monitoring the movement of travellers to manage traffic flow and reduce people jams

Security Think Tank: Malware is sneaky

What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches?

HSBC voice authentication tricked by twins

Twin brothers managed to trick HSBC’s voice recognition security system into giving account access to the wrong person

Middle East largely unscathed after WannaCry cyber attack

The impact of WannaCry on the Middle East was reduced due to the attack falling on a weekend, but it is a stark warning

Windows 7 accounts for most WannaCry infections

Statistics show that computers running Windows 7 accounted for the biggest proportion of machines infected with the WannaCry ransomware, while NHS suppliers are blamed for hampering patching by NHS trusts

Denmark's Spar Nord bank in app dispute with Apple

Danish bank Spar Nord considers legal dispute with Apple over the supplier’s rejection of mobile app

McAfee researchers test WannaCry recovery method

Although there is evidence that some victims of the WannaCry ransomware attack on 12 May have paid the attackers, there is no evidence that they are getting their data back

Manx Telecom streamlines its business with VMware NFV

After deploying an NFV platform to replace its IMS service, Isle of Man-based telco has seen substantial improvements to its business agility and processes

WannaCry ransomware attack should push hospitals to gauge certain tech

The WannaCry ransomware attack affected hundreds of countries and hundreds of thousands of systems, including health systems. Experts discuss what healthcare orgs need to do.

Command and control communications key to detecting threats

Malware command and control (C&C) communications are key to detecting advanced threats, according to a security researcher

How to simplify IT integration

Pressure on IT is mounting and point-to-point integration does not scale. Opening up APIs is one of the approaches now being considered

Interview: Claude Moraes, MEP and EU Civil Liberties Committee chair

Claude Moraes, chair of the European Parliament's Civil Liberties, Justice and Home Affairs Committee shares his views, concerns, reservations about EU-US data transfers, encryption and Brexit

Microsoft to open African cloud datacentre region in 2018

Software giant plans to capitalise on business demand for its cloud services in Africa by offering users access to locally hosted Azure and Office 365

Neustar launches international security council

Sharing information in the face of threats such as WannaCry is crucial for organisations to improve their cyber security capability, according to Neustar, which is making it easier to do

Brits expect driverless cars to outnumber normal cars in 15 years

Survey shows 42% of people think autonomous vehicles will make roads safer, but 46% admit they would not feel safe as a passenger in a driverless vehicle

Cloud provider snubs SAN for StorPool hyper-converged infrastructure

Coreix found costly SAN capex outlays too onerous so opted to build its own hyper-converged infrastructure from StorPool storage software and SuperMicro x86 servers

Interview: Mark Potter, CTO, HPE

The head of Hewlett-Packard Labs speaks to Computer Weekly about a new era of computing, where memory is no longer a constrained resource

Consulting and Special Projects

At TBC, we understand that business can sometimes be overwhelming; that’s why we offer expert consulting on a range of issues.  Whether you’re looking into establishing a help desk, appropriately staffing your IT department, or thinking ahead with disaster planning and/or recovery, we can offer you a sure-fire solution.  Our knowledgeable advisors will provide you with consulting that will make any IT-related project a breeze.

Our areas of expertise are:

• Technical projects
• Network builds, migrations, and upgrades
• Disaster planning and recovery services
• Enterprise system design and consulting
• Technical project management
• Architecture and design
• Help desk (in-house and outsourced)
 
 

Not convinced?

We have effectively implemented IT project solutions for thousands of clients.  Our method is flexible and reliable, designed to cohere to nearly any project and situation you can come up with.  Our thorough project management process handles everything, including:
 
• Assigned technical project manager
• Pre-implementation technical review
• Installation check-points
• Documentation
• Best practices
• Client verification and acceptance
 
 

We’ve done it before…

We’ve dealt with literally everything that can be attached to a network.  That means we can install, configure, and fix anything network-related, including:
• Microsoft Exchange and Directory Services
• Disaster recovery solutions
• Virtualization
• Advanced security solutions
• Storage Area Networks
• Server farms
 


Again…

Dealing with TBC means dealing with certified professionals.  In order for our technical consultants to pass our (extremely difficult and comprehensive) training process, they must be incredibly proficient in every IT area and also display customer service propensity.  The consultants assigned to assist you will be experienced and more than qualified to assess your project and implement the best possible solution.