Destroy old hard drives, backup tapes before it’s too late

Old hard drives and backup tapes are a major security threat for any business, they store a massive amount of confidential data that can easily be compromised. Regardless whether the drives or tapes are outdated or inoperable, this data is always accessible and needs...

Why risk managers are interested in flexible working

Risk managers have a new weapon in their arsenals - flexible working. The use of flexible working, and a connected property strategy, as tools for risk management is a relatively new trend, and one expected to grow significantly as more businesses understand the new...

Being prepared is key to mitigating cyber attacks

In an age where cyber criminals are a dime a dozen, and the threat landscape more complex than ever, it pays to prepare and be always on guard. This means being up to date with the strategies and tricks used by cyber adversaries, and investing in monitoring solutions...

Critical data at risk from unauthorised access

Recent local cyberattacks are a forewarning of things to come and it clearly shows the vulnerabilities of South African companies, according to security experts. Although in recent attacks customers have not necessarily suffered any financial losses, this could...

Reaching today’s CISOs

Information security is top of mind for most businesses today. Not only to they have to worry about increasingly sophisticated and motivated hackers, they have to worry about their own staff, and data loss through either carelessness or malice. Should a security event...

read more