Safe as houses?

Information is an organisation’s most valuable asset. To protect that asset, it’s no longer viable that security is an external layer of core information management software. Security should be imbedded in the foundation of the software’s design. It...

Why you should protect data at all costs

It has long been said that ‘knowledge is power’ but never has that been more pertinent than it is for businesses today. What businesses know is a key differentiator as they seek to get closer to their customers and improve their own business processes...

What you need to know about IoT attacks

Something major happened in 2017. Internet of Things (IoT) devices were exploited by cybercriminals and turned into a rogue and malevolent army. A series of distributed denial of service (DDoS) attacks affected websites connected to the cloud-based internet...

Do villains care about biometrics?

Inadequate biometrics systems could be creating a false sense of security in banks, security estates and office blocks, and in effect rolling out a red carpet to criminals. By Marius Coetzee, MD of Ideco. Biometrics-based security devices, in particular fingerprint...

Cyberattacks: what to do when they happen to you

It’s the call that IT teams dread: an employee is reporting that their PC screen is flashing red, with a message telling them that their files are encrypted and that they need to pay a ransom to get them unscrambled. What should they do next? By Peter Alexander, chief...

Cloud offers security, efficiency, regulatory compliance

Data breaches that result in confidential data being compromised, whether it is just released to the general public or used for more malicious purposes, have become almost a daily occurrence, making cybersecurity a non-negotiable for organisations. This includes both...