Welcome on GURU advisor

Professional reviews for the IT market

GURU advisor is the reference point for IT managers, System Integrators, Managed Service Providers and all the sys admins or companies that offer consuelling services in the Information Technology field and seek information on technologies, selling modalities and hardware.

Image not available

A tool for all IT professionals

Image not available

To stay informed and understand the evolution of the cloud and the IT world

Benchmark and analysis

To help you in the choice

From server to cloud services

Reviews and evaluations

How to

We'll explain how to do it

At your disposal

Contact us for advertising or to request info

Image not available
Image not available
Image not available
Image not available
Image not available

 

No just new products, but also a prolonged and active support

Professor Kevin Curran from IEEE spoked about privacy, cookie law and ransomware.

During MWC we’ve met lots of people that work in a business environment and talked about their company’s vision. We had a pleasant chat with an IT professor, Kevin Curran from Ulster University in Northern Ireland, IEEE senior member, the important organization that takes care of the technological progress with a particular attention to the advantages and benefits that are brought to humanity.

How is your visit to the MWC going? what do you think about the innovations presented here?
There’s a lot of fuss about 5G as the evolution of 4G, despite 4G being not a standard yet. Everybody's talking about Cloud and Internet of Things. All these technologies are important and interesting, but in my opinion there's a lack of attention to standardization and to the support of products that are announced and brought to the market for mere economical reasons.


It’s not a coincidence that one of the themes we’ve covered most in these days is security.
Sure, most companies sell new devices and products without putting due care to provide a prolonged support, to manage security updates that cover businesses and citizens and to prevent devices from being hacked or compromised.

Seen under this light, IoT is really scary: it won’t be “just” your router or PC to be attacked, but dozens of devices between your walls.

With that in mind, what do you think about the European legislation?
For sure there are some improvements, but not always in the right direction. Take for instance the cookie law, I don’t believe it achieved 100% of its goal: it should have limited users tracking, but in the end it brought only dozens of warnings to click without offering the user a real, effective control.

And what about the new European privacy law that will oblige companies to denounce any leak?
This time it’s a law that goes in the right direction. As I said, security will become a more and more important factor and only by discovering all attacks we can work on effective improvements. European and international governments must work to fight the tools and ways criminals use to attack people and companies. At the same time a law should be introduced clearly stating what the support period (from manufacturers) should be, for each device typology. Not just in terms of warranty, but also in terms of patching and updates, in order to guarantee the use in perfect safety even years after the release.

Lastly, what do you think about the evolution of ransomware attacks? Viruses nowadays have a different goals than in the past: making quick and effortless money.
Technological evolution in this field has been very quick, also by leveraging a value like BitCoins that surely must be better regulated because it’s the main channel used by these criminals to get paid. Ransomware will grow more and more in terms of sophistication. Just think about the recent infection that use a Javascript file as an attachment to create a multiplatform disease. Attacks to IoT devices will be even more dangerous in the business scenario, where ransomware attacks are more frequent, because the overall number of hackable devices grows and the collection of data coming from sensors and devices might be even more dangerous.

About the Author

Filippo Moriggia

After more than 10 years of experience in the technical journalism with PC Professionale (the italian version of PC Magazine) and other newspapers of Mondadori group, Filippo Moriggia founded GURU advisor, the reference website for IT professionals, system integrators, cloud providers and MSPs. He has a Master of Science in Telecommunications Engineering and works as a independent consultant and contractor for different firms. His main focuses are software, virtualization, servers, cloud, networking and security. He's certified VMware VCA for Data Center Virtualization.

banner eng

fb icon evo twitter icon evo

Word of the Day

In the field of Information Technology, the term piggybacking refers to situations where an unauthorized third party gains access to...

>

The acronym GDPR indicates the new General Data Protection Regulation, which will come into force on 25 May 2018. This...

>

The acronym DPO (Data Protection Officer) indicates the person or persons who, within the company context, are responsible for the...

>

InfiniBand is an input / output architecture for the transmission of data between high performance systems composed of CPUs, processors...

>

A Zero Day Exploit describes a situation in which specific and unknown vulnerabilities are disclosed to the public simultaneously with...

>
Read also the others...

Download of the Day

Netcat

Netcat is a command line tool that can be used in both Linux and Windows environments, capable of...

>

Fiddler

Fiddler is a proxy server that can run locally to allow application debugging and control of data in...

>

Adapter Watch

Adapter Watch is a tool that shows a complete and detailed report about network cards. Download it here.

>

DNS DataView

DNS DataView is a graphical-interface software to perform DNS lookup queries from your PC using system-defined DNS, or...

>

SolarWinds Traceroute NG

SolarWinds Traceroute NG is a command line tool to perform advanced traceroute in Windows environment, compared to the...

>
All Download...

Issues Archive

  • GURU advisor: issue 18 - April 2018

    GURU advisor: issue 18 - April 2018

  • GURU advisor: issue 17 - January 2018

    GURU advisor: issue 17 - January 2018

  • GURU advisor: issue 16 - october 2017

    GURU advisor: issue 16 - october 2017

  • GURU advisor: issue 15 - July 2017

    GURU advisor: issue 15 - July 2017

  • GURU advisor: issue 14 - May 2017

    GURU advisor: issue 14 - May 2017

  • GURU advisor: issue 13 - March 2017

    GURU advisor: issue 13 - March 2017

  • GURU advisor: issue 12 -  January 2017

    GURU advisor: issue 12 - January 2017

  • GURU advisor: issue 11 -  October 2016

    GURU advisor: issue 11 - October 2016

  • 1
  • 2
  • 3
  • BYOD: your devices for your firm

    The quick evolution of informatics and technologies, together with the crisis that mined financial mines, has brought to a tendency inversion: users that prefer to work with their own devices as they’re often more advanced and modern than those the companies would provide. Read More
  • A switch for datacenters: Quanta LB4M

    You don’t always have to invest thousands of euros to build an enterprise-level networking: here’s our test of the Quanta LB4M switch Read More
  • Mobile World Congress in Barcelona

    GURU advisor will be at the Mobile World Congress in Barcelona from February 22nd to 25th 2016!

    MWC is one of the biggest conventions about the worldwide mobile market, we'll be present for the whole event and we'll keep you posted with news and previews from the congress.

    Read More
  • 1