Steps to successful biometric implementation

Biometrics can provide the organisation an intelligent balance of security and convenience if implemented and managed correctly. By Marius Coetzee, CEO of Ideco Biometrics has often been considered a risky and unreliable investment for many organisations. Its rocky...

Cyber security requires a new approach

From digital transformation through to the arrival of the Fourth Industrial Revolution (4IR), decision-makers are changing their views on how technology can benefit the organisation. But while much attention is placed on things like data analysis, the cloud, and...

Are SA firms flipping a coin on their cybersecurity?

Would you gamble flipping a coin for the effectiveness of your cybersecurity plan? Heads: you’re able to prevent – or recover from – a cyberattack. Tails: you fall victim to a cybercriminal, lose critical business data, suffer immense business...

The dark side of apps

With the world’s population of mobile phone users set to reach 4,68-million this year – 2,7-billion of those being smartphone users, mobile device security threats are on the rise. “Apps pose a real problem for mobile users, who give them sweeping...

Protection against APT’s everyone’s business

Companies should be as invested in protecting networks and data against advanced persistent threats (APTs) as cyber criminals are in targeting and implementing their attacks. In the past, APT counter measures were only implemented by certain sectors where there were...

Securing and managing devices the modern way

Organisations of all types and sizes are bringing vast numbers of devices into their IT infrastructure and networks. Moreover, these days, these devices are not only smartphones, wearables and tablets, because the Internet of Things (IoT) is seeing a slew of new...