Mar 13, 2018
Information is an organisation’s most valuable asset. To protect that asset, it’s no longer viable that security is an external layer of core information management software. Security should be imbedded in the foundation of the software’s design. It...
Mar 12, 2018
It has long been said that ‘knowledge is power’ but never has that been more pertinent than it is for businesses today. What businesses know is a key differentiator as they seek to get closer to their customers and improve their own business processes...
Mar 7, 2018
Something major happened in 2017. Internet of Things (IoT) devices were exploited by cybercriminals and turned into a rogue and malevolent army. A series of distributed denial of service (DDoS) attacks affected websites connected to the cloud-based internet...
Mar 6, 2018
Inadequate biometrics systems could be creating a false sense of security in banks, security estates and office blocks, and in effect rolling out a red carpet to criminals. By Marius Coetzee, MD of Ideco. Biometrics-based security devices, in particular fingerprint...
Feb 23, 2018
It’s the call that IT teams dread: an employee is reporting that their PC screen is flashing red, with a message telling them that their files are encrypted and that they need to pay a ransom to get them unscrambled. What should they do next? By Peter Alexander, chief...
Feb 19, 2018
Data breaches that result in confidential data being compromised, whether it is just released to the general public or used for more malicious purposes, have become almost a daily occurrence, making cybersecurity a non-negotiable for organisations. This includes both...