MENU

Posts Tagged ‘security breaches’

  • Vox launches visitor management solution for South African residents

    Vox launches visitor management solution for South African residents

    July 30, 2019 • Southern AfricaComments Off on Vox launches visitor management solution for South African residents

    Integrated ICT and infrastructure provider Vox has expanded its cloud-based Visitor Management solution that will provide body corporates and resident associations with a tool to send bulk communications to residents, as well as a workflow tool to log and...

  • OT organisations are stepping up cyber security focus- Fortinet study

    OT organisations are stepping up cyber security focus- Fortinet study

    May 6, 2019 • Security, Top StoriesComments Off on OT organisations are stepping up cyber security focus- Fortinet study

    Environments running Operational technology (OT) are stepping up their focus on cybersecurity amid a growing number of attacks. This emerged insecurity breaches Fortinet’s recent State of Operational Technology and Cybersecurity Report, which found about 74...

  • Cloud implementations growing but strategies lack security

    December 4, 2018 • Cloud Computing, Security, Top StoriesComments Off on Cloud implementations growing but strategies lack security

    Private, public and hybrid clouds are growing in popularity as lift and shift cloud apps are making migration easier for businesses. Christian Mahncke, Enterprise Business Development at Routed, a vendor neutral cloud infrastructure provider, says that while...

  • The impact of hyper-availability on e-tailing

    How to stay ahead of data breaches in a Hyper-Available world

    August 25, 2018 • SecurityComments Off on How to stay ahead of data breaches in a Hyper-Available world

    Security breaches are an ongoing threat in the digital landscape. The impact they pose on a data-driven business can be catastrophic. Being able to access sensitive personal or corporate data, compromise it, and take parts of your business offline while it is...

  • Regulatory requirements for crypto assets: the springboard to mainstream adoption

    Steps to take in the event of a security breach

    May 28, 2018 • Security, Top StoriesComments Off on Steps to take in the event of a security breach

    Businesses around the world continue to be plagued by a high number of security breaches. The larger the business, and the more confidential data it houses, the bigger the risk. Despite companies having solid security policies and procedures in place,...

  • Leveraging technology to boost productivity

    5 Ways to avoid Shadow IT

    January 22, 2018 • GeneralComments Off on 5 Ways to avoid Shadow IT

    What is Shadow IT? It is technology used within an organisation without explicit approval — could be aptly termed as the modern Trojan horse! Since these technologies are not IT-approved, they have the potential to allow ransomware and malware to invade an...

  • Fundamental fintech shift in 2018

    Fundamental fintech shift to take place in 2018

    January 8, 2018 • Security, Southern Africa, Top StoriesComments Off on Fundamental fintech shift to take place in 2018

    Far-reaching changes that govern Europe’s retail banking system will be implemented early this year – and the effects will be felt in South Africa. Several local banks that have branches in Europe will have to comply with a new European Union (EU)...

  • Unpacking Bitcoin security

    Credential stuffing: what it is and why you need to worry

    April 25, 2017 • SecurityComments Off on Credential stuffing: what it is and why you need to worry

    We’ve all heard about the myriad of security breaches over the past year, resulting in the exposure of billions of credentials and more. And while we’re likely all aware that those credentials being out in the wild on the black market is a threat, many...