MENU

Posts Tagged ‘data protection’

  • UN forum to bring ‘big space data' benefits to disaster response in Africa

    How South Africa can prepare for the Big Data Protection shake up

    September 8, 2017 • FeaturesComments Off on How South Africa can prepare for the Big Data Protection shake up

    While technology continues to evolve to protect a user and company’s data, organisations still find the most long-standing factors remain the most vulnerable, such as passwords and the person using the device. Many South African companies doing business...

  • Big Data: Convenient and Controversial

    How the new data protection act will affect startups

    September 7, 2017 • Southern Africa, Top StoriesComments Off on How the new data protection act will affect startups

    The protection of data has been the subject of thousands of conversations globally. As more and more businesses digitally transform, how they handle and analyse data is coming under more intense scrutiny. With the force of cybercrime growing by the day,...

  • 5 steps to managing GDPR compliance

    The POPI conundrum: Data protection vs data mining

    September 1, 2017 • GeneralComments Off on The POPI conundrum: Data protection vs data mining

    The office of the Information Regulator is expected to be fully operational by the end of this year. From then, organisations will have just 12 months to comply with the Protection of Personal Information (POPI) Act, or risk prison terms and fines of up to...

  • SA’s Protection of Personal Information Act has a bigger, foreign brother you must meet

    SA’s POPI Act has a bigger, foreign brother you must meet

    August 22, 2017 • Southern AfricaComments Off on SA’s POPI Act has a bigger, foreign brother you must meet

    Many South African businesses have now heard of the Protection of Personal Information Act (or POPI), and some have even spent time and money implementing their policies to prepare for their new responsibilities in terms of it. Businesses have realised that...

  • Public Cloud

    Cloud Technology: Discussing data compliance and security

    August 21, 2017 • Cloud Computing, SecurityComments Off on Cloud Technology: Discussing data compliance and security

    When it comes to the adoption of public cloud computing the major concerns often remain focused on privacy and data security. In a heavily regulated environment like financial services, this is often magnified, and perceived issues often become an inhibitor...

  • SMMEs, cloud services

    Moving your business into the cloud – there are simply no more excuses

    August 14, 2017 • Cloud Computing, Southern AfricaComments Off on Moving your business into the cloud – there are simply no more excuses

    With Microsoft recently making the big announcement that it will be opening cloud data centres in South Africa next year, there has never been a better time for small businesses to take the plunge and take their business into the cloud. Not only will it...

  • Nigeria: Smile offers customers all-in-one SIM

    Keeping your data backed-up on your Android smartphone

    April 3, 2017 • Mobile and Telecoms, Online & Social, Top StoriesComments Off on Keeping your data backed-up on your Android smartphone

    There’s nothing worse than realising that you have lost valuable data on your smartphone because you didn’t back it up. Here are some quick tips on how you can effectively recover your information should something happen to your phone. Backing up to your...

  • Four ways the cloud is creating, not eliminating, jobs

    Over 554 million records stolen in first half of 2016

    February 10, 2017 • Cloud Computing, Enterprise IT, Top StoriesComments Off on Over 554 million records stolen in first half of 2016

    More than 554 million data records were stolen during the first half of 2016, a 31% increase from the previous six months – and that was just from the enterprises that reported their breaches. Unfortunately, many organisations that experienced a breach...

  • Data – the key piece in the Digital Transformation puzzle

    Five key considerations for effective Big Data protection

    December 14, 2016 • FeaturesComments Off on Five key considerations for effective Big Data protection

    In the past few years there has been much hype around Big Data and why organisations need to harness and analyse it in order to deliver business value and overall success. Big Data initiatives are on the rise as enterprises strive to increase efficiency,...

  • Top 10 personal technologies to support digital business

    Corporate cyberattacks will continue to rise

    August 19, 2016 • Security, Top StoriesComments Off on Corporate cyberattacks will continue to rise

    Cyberattacks targeted at the corporate world continue to be on the increase. Terms like cyber espionage and corporate hacktivists are being thrown around over many boardroom tables these days, with decision makers expressing massive concern. The reality is...

  • By Johan Scheepers, Systems Engineering Director at Commvault for Middle East, South Africa and Turkey

    Treat your data like the strategic asset it is

    April 4, 2016 • Security, Top StoriesComments Off on Treat your data like the strategic asset it is

    In an increasingly digital world where it is no longer only time that is money, but information as well, data has become the equivalent of a new currency. Protecting this data is a top priority for businesses of all sizes. However, in tandem with the growing...

  • Infrastructure Management Trends in South Africa

    What’s next for disaster recovery?

    January 11, 2016 • Enterprise IT, Top StoriesComments Off on What’s next for disaster recovery?

    When it comes to modern data protection, not all data should be treated the same way. Long gone are the days of just dumping a bunch of files onto a tape overnight and sending it to the vault. Today’s organisations are less concerned about data backup...

  • Advanced Cyber defence is essential

    December 24, 2015 • Enterprise IT, Security, Top StoriesComments Off on Advanced Cyber defence is essential

    Online connectivity is nothing new, and threats delivered via this medium are almost as old as the Internet itself. However, cyber security has come into sharper focus recently as a result of how pervasive new technologies have become, and how they are...

  • Data Centres - the shift from long-term investment to commodity

    How to protect yourself from Digital Disasters

    November 24, 2015 • Top StoriesComments Off on How to protect yourself from Digital Disasters

    When we lose precious information, whether to a system crash, hard drive failure or even to hackers, it can feel like we are losing parts of our lives. Even with the advancement of technology in the past decade, much of our digital lives from important...

  • Controlling Data Risk in the BYOD Onslaught

    August 17, 2015 • Top StoriesComments Off on Controlling Data Risk in the BYOD Onslaught

    Data protection has always been a challenge, even when data flow was, more or less, confined to a closed network system. Now, we have the Bring Your Own Device (BYOD) era in which your employees and contractors basically feel they should be able to use...

  • Protect data availability to comply with POPI

    September 8, 2014 • Top StoriesComments Off on Protect data availability to comply with POPI

    Protecting customers’ personal information against loss or damage is just as important for companies considering the Protection of Personal Information (POPI) Act as protecting it against theft and unauthorised access. Section 19 of the Act says companies...