Why can’t you detect a breach?

Recent reports of the Hilton Hotel Group’s Point of Sale (POS) systems being breached in order for hackers to gain access to credit card data were the latest in a series of attacks directed at the hospitality sector. These have proven that today’s advanced...

Next-generation endpoint security

Today’s advanced threats are highly targeted and sophisticated. Traditional security measures are falling short, and businesses need a new approach to endpoint security to secure against these ever-present dangers. “Billions of rands are being spent on...

E-signatures gain traction in SA

Successful companies have a long history of leveraging technology to replace slow, complicated, manual processes to drive efficiency, reduce costs, and improve customer satisfaction. Liz De Freitas, account manager at AdvanceNet says, in spite of this drive, many...

How to minimise the security threat

Very few people escape the unpleasant experience of being defrauded at least once in their lifetime, but how you react to it can minimise the damage it causes to your psyche and your wallet. There are many different ways fraudsters can dip into your pockets, and with...

Identity theft: how to avoid an identity crisis

There’s nothing like that sinking feeling you get when you realise you’ve lost your wallet. Usually this isn’t even related to any money that’s in it, but rather the inconvenience of having to cancel all your bank cards and sort out items such...

Understanding ‘bad’ user behaviour

A common maxim today is that a determined enough hacker will eventually get in, usually within minutes. Even more frightening, most of today’s advanced threats remain undetected for weeks or even months. This is presenting huge challenges for the security...