Why Pokémon GO is a security risk

Doros Hadjizenonos, country manager at Check Point Software Technologies South Africa, examines the mobile security implications of the wildly popular mobile augmented-reality game – and how these can be addressed. Pokémon GO has taken one of the biggest...

Six principles of resilience to manage security

Security professionals in South Africa need to protect their enterprise by building resilience. Speaking ahead of the Gartner Symposium/ITxpo 2016 in Cape Town, Tom Scholtz vice president & Gartner Fellow, says resilience is the best approach to address both...

Tips on securing your social media account

In today’s world, we are increasingly living digital lives, where we interact and engage with our friends and family online. Social media has become central to our lives, writes Carey van Vlaanderen, CEO at ESET Southern Africa. And yet, while millions use these...

How to professionally specify your IP camera network

The past decade has seen camera surveillance technology rapidly evolving. Of significance was the much-anticipated shift from analogue closed circuit television (CCTV) to Internet protocol (IP)-based systems. It is now widely accepted that the benefits of IP far...

Better connectivity increases risks

In today’s hyper-connected world, where it is possible for businesses and consumers alike to undertake multiple transactions on several devices simultaneously, convenience is enhanced, but so is the likelihood of crime, especially fraud. However, there are ways...

Defending the organisation against spear-phishing

One of the main worries for companies last year was the rise in the use of socially engineered phishing, which caused many organisations to lose thousands of rands, and immeasurable customer confidence. These scams are set to continue in 2016, says Sarel Lamprecht, MD...