Saturday, July 13, 2024
No menu items!

data protection

Advanced Cyber defence is essential

Online connectivity is nothing new, and threats delivered via this medium are almost as old as the Internet itself. However, cyber security has come into sharper focus recently as a result of how pervasive new technologies have become, and...

How to protect yourself from Digital Disasters

When we lose precious information, whether to a system crash, hard drive failure or even to hackers, it can feel like we are losing parts of our lives. Even with the advancement of technology in the past decade, much...

Controlling Data Risk in the BYOD Onslaught

Data protection has always been a challenge, even when data flow was, more or less, confined to a closed network system. Now, we have the Bring Your Own Device (BYOD) era in which your employees and contractors basically feel they...

Protect data availability to comply with POPI

Protecting customers’ personal information against loss or damage is just as important for companies considering the Protection of Personal Information (POPI) Act as protecting it against theft and unauthorised access. Section 19 of the Act says companies must take appropriate...

Top 5 ways to keep your data safe in a natural disaster

With Hurricane Sandy just about mopping up the Eastern seaboard of the U.S and another storm brewing on the western coast of Mexico (tropical storm Rosa), a vast amount of damage has been done to lives and property  -...

Improving visibility and transparency to better manage virtualised data environments

Data is getting bigger, virtualisation is expanding, and data protection applications are ill-prepared to deal with the challenges this model poses. There is a distinct need within virtualised environments to improve visibility and transparency, as virtual machines simply lack...

How to add intelligence to power management solutions

The importance of power management and backup solutions for South African businesses cannot be argued. After all, even though we have seemingly moved past the infamous load-shedding incidents of 2008 our power remains notoriously unstable, with spikes, surges and...

SentryBay warns of social network phishing attacks

Phishing attacks on social networks have escalated to unprecedented levels and Internet banking scams are increasing at an alarming rate. This is according to local software security specialists and SentryBay partner, J2 Software. According to research by SA Banking Risk...
- Advertisement -spot_img

Latest News

A New Extended Partnership for Managing People and Money

Amazon Web Services (AWS) has partnered with Workday, a provider of solutions for managing people and money. The partnership aims...
- Advertisement -spot_img