How to professionally specify your IP camera network

The past decade has seen camera surveillance technology rapidly evolving. Of significance was the much-anticipated shift from analogue closed circuit television (CCTV) to Internet protocol (IP)-based systems. It is now widely accepted that the benefits of IP far...

Better connectivity increases risks

In today’s hyper-connected world, where it is possible for businesses and consumers alike to undertake multiple transactions on several devices simultaneously, convenience is enhanced, but so is the likelihood of crime, especially fraud. However, there are ways...

Defending the organisation against spear-phishing

One of the main worries for companies last year was the rise in the use of socially engineered phishing, which caused many organisations to lose thousands of rands, and immeasurable customer confidence. These scams are set to continue in 2016, says Sarel Lamprecht, MD...

The challenge of securing IoT

Connected devices are already counted in the billions, and analysts predict these numbers will hit 6.4 billion worldwide by the end of the year. While there’s plenty of business potential in these expanding connections, there’s a big downside however...

RSA unveils SecurID Suite

RSA, The Security Division of EMC, has unveiled its RSA SecurID Suite, which is a comprehensive identity solution that combines the separate disciplines of access, governance, lifecycle and identity assurance, working together in harmony. As a result, organisations...

Tips for managing BYOD security

BYOD has been a hot trend for some time now. More and more workers are using their personal cellphones and tablets to access company data. In fact, Gartner predicts that by 2017, 50% of businesses will require their staff to supply their own devices for business...