Industrial control system myths

Despite growing awareness of cyber-based attacks on industrial control systems, many IT security models continue to adhere to the outdated belief that physically isolating systems and ‘security by obscurity’ is enough. It’s not, says Andrey Nikishin, head of Future...

BYOD security still lacking

Most companies today have implemented bring your own device (BYOD) strategies, that allow their staff to use their personal devices, whether tablets or smartphones, at work. However, a recent BitDefender survey has revealed that BYOD policies, aimed at securing...

Securing the home office

As increasing numbers of employees work from home, organisations often overlook the security needs of remote workers, says Perry Hutton, Fortinet Africa regional director. Telework predates the BYOD phenomenon by decades. Despite Yahoo!’s move to the contrary, many...

What makes a firewall next-gen?

Fortinet, the global leader in high-performance cyber security solutions and a Networks Unlimited reseller partner, has released a white paper titled “5 1/2 things that make a firewall ‘Next Gen’”. “Network protection can be a difficult balancing act for security...

Winning the security war

Negligence is cited in almost half of cyber-attacks – are you protecting yourself from giving out the wrong information?  According to a recent report released by IBM and the Ponemon Institute, carelessness was the primary root cause of data breaches in 2014. A...

Taking cybercrime seriously

According to a cybercrime report compiled by global Internet security firm, Norton, South Africa lost R3,7-billion in 2012 as a result of cybercrime. This number is sure continue to rise in parallel to the continued rapid expansion of the Internet – the technological...