Christmas Tree

Have a cracker of a Christmas

By now all your Christmas shopping should be wrapped and lying safely under the tree, the mad dash for stocking fillers is over and all that’s left to do is sit back, relax and enjoy all that this festive season has to offer.

We’d like to wish you all a very Merry Christmas from everyone here at Let’s Talk and what better way to do that than with a bit of festive poetry. [Read more...]

Top 5 Stories

June’s Top Picks

Your monthly round up of the stories everyone’s been reading  

Cyber attacks… innovation… collaboration… June’s top stories cover the hot business topics, along with an incisive article that discusses our need to focus on the networks behind our shiny new devices.

Take a look and discover them for yourself. Here are our top five articles from this month’s Let’s Talk blog. [Read more...]

Cyber Security

SATURN Runs Rings Around Cyber Attacks

By Ben Azvine, Head of Security Futures Practice, BT Technology, Service & Operations

As someone who works largely behind the scenes in Research & Innovation, it’s great to have an opportunity to talk about some of the ground-breaking, innovative projects my team are working on.

My colleague Nicola Millard, BT’s Customer Experience Futurologist, has done a great job of explaining BT’s innovation heritage in her recent blog and I’d like to carry on that theme by focusing on how our latest innovation efforts are making a practical difference to our customers, using protection against cybercrime as an example. [Read more...]

Data Security

Enterprise Security Begins At Home

Since writing a book on home computer security I’ve become increasingly aware of how poor security on home computers is having an effect on enterprise security. But the converse is also true; good home security can have a beneficial influence on the enterprise.

There are several ways in which deficiencies in home computer security can impact businesses. Firstly, malware on home computers is being used by criminals and hacktivists to commit fraud and to disrupt legitimate business use of the internet, through botnets for example. Secondly, more and more staff are telecommuting, or working from home, which may involve transferring documents to the home PC, or using a business laptop in an insecure environment. [Read more...]

Step away from the bunting (carefully)

How to approach cyber security in 2013

By Mark Danton, general Manager, BT Assure

Looking ahead in 2013, what steps can organisations take to try and manage the threats to their network?

In the second part of our two-part issues on cyber security in 2012/2013, we take a look at three things for organisations to think about in the year ahead. [Read more...]