Shadow IT could be why businesses “wannacry”

There are mixed opinions about implementing unauthorised, IT applications (apps) within the organisation, a practice known as Shadow IT. Simeon Tassev, MD and QSA at Galix Networking, examines the issue. Opinion on Shadow IT is divided into two camps. Some believe...

Migrating to a digitised environment?

Consider the security risk, urges Simeon Tassev, MD and QSA of Galix. The emergence of the digital world has caused a number of organisations to shift from analogue to digitised environments. Among the many complexities and challenges this transition gives rise to,...

Securing customer communication is best left to experts

Every day, several times a day, customers trust businesses with their personal information. A single transaction can generate reams and reams of data. Identification numbers, physical addresses, phone numbers, bank account details — a customer parts with all...

Cybersecurity and the future model

Industry leaders presented a wide range of topics and case studies at the Cyber Security in Banking Conference recently, highlighting the latest trends and development in cyber security. The event offered a comprehensive and multi-facetted agenda relevant to all...

Mission-critical myths about DDoS attacks

Bryan Hamman, Arbor Network’s territory manager for sub-Saharan Africa, examines whether these “myths” are fact or fiction. For anyone in ‘denial’ about the power of Distributed Denial of Service (DDoS) attacks in South Africa –...

Mobile users are in denial …

Leo Meyer, MD of Black Castle Technologies, gets under the covers with the mobile security denial syndrome. A myriad of polls over the last year have confirmed what we would expect; consumers don’t want their mobile devices to fall victim to security onslaughts....