Securing your growing home network

The number of connected devices in South African homes are expected to increase exponentially. Smart TVs, connected appliances, online fitness devices, entertainment and gaming systems, smart cars, connected water and power meters, climate control systems and online...

Weaponised IoT attacks: what does the future hold?

The explosion of connected devices onto our networks is fuelling our imaginations and inspiring incredible visions for the future. There is limitless potential in being able to connect and integrate our cars, houses, appliances, and everything else we own. We’re...

When do-it-yourself IT security no longer does

The complexities and continuous evolvement of IT security threats have made managing them a specialist field. With cloud services, third party applications and mobile devices proliferating the workplace, nobody without the necessary experience, technical skills or...

Staying secure in the mobile-first, cloud-first era

The operating environment for organisations of all sizes has changed as a result of technology trends such as cloud computing, big data analytics, and the Internet of Things. Consequently, the security landscape has also undergone significant change in the last few...

10 reasons why cybercriminals target smartphones

Smartphones have become a central part of our lives, allowing us to perform all sorts of tasks that make our everyday existence easier and more enjoyable. But, while they aim to heighten convenience, there is a real feeling that smartphones are becoming a bigger...

Get the most out of your surveillance cameras

Recently, there has been much discussion about the differences between (and resulting advantages of) thermal cameras and traditional visual cameras for surveillance purposes, writes Laurence Smith, executive at Graphic Image Technologies. Visual cameras use light to...