A new approach to backup and recovery

Deloitte made two significant technology predictions for 2015. The first was the idea of the re-enterprisation of IT, which suggests that there is a shift in the way enterprises are adopting technology, says Demetri Petropoulos, head of business development at Global...

Credit card fraud in the tourism industry

The tourism industry is a popular target for credit card fraud, according to a leading payment services provider – but there are ways to manage the risk. “Accommodation establishments like hotels, guesthouses and B&Bs are especially vulnerable when it comes...

Surviving a ransom situation

The Trend Micro Q1 Security Roundup, Bad Ads and Zero Days: Reemerging Threats Challenge Trust in Supply Chains and Best Practices, revealed that cryptoransomware set their sights on enterprises. Ihab Moawad, vice-president MMEA and CIS at Trend Micro explores what...

Understanding a cyber-attack

Cyber-attacks today are highly advanced, and the developers and perpetrators are constantly evolving their tactics in order to breach an organisation’s perimeter defences. In addition, cyber criminals and their attacks are highly persistent, constantly adapting,...

Data’s journey across the network

While it’s convenient to link various personal online accounts and identities, users must beware of the security risks, says Martin Walshaw, senior engineer at F5 Networks. It’s nice when everyone gets along, isn’t it? When Web sites play fair with each other and...

TransUnion updates 1Check app

TransUnion Auto, the automotive solutions division of TransUnion, has announced the addition of a new Stockloader feature to its innovative 1Check application (app) for auto dealers. The app, which assists dealers with reducing their risk of test drive fraud and...