The vulnerability of things

There is a disconnect between business and the IT department, as most executives on the ‘business’ side don’t fully grasp the very real risks posed by today’s advanced cyber threats. Coupled with this, the technical department too often doesn’t have the influence...

Betting the farm on untested tech

While a plethora of new payment solutions are coming to market, businesses should be cautious about moving to new solutions just for the sake of it, Jonas Thulin, security consultant at Fortinet. Customers are driving a great deal of change in how transactions are...

How to fight and avoid ransomware

Ransomware is malicious software that cyber criminals use to hold a user’s computer or computer files for ransom, demanding payment in order for the user to get the files back. Sadly, ransomware is becoming an increasingly popular way for malware authors to extort...

Cyber fraud set to get worse

Paying bills or shopping online, or via your cellphone with your credit card, is convenient and most of us use it on a regular basis. “What all these methods of payment have in common is that sooner or later they will make use of cellular technology, either as the...

IT security relies on data security

Security is one of the foremost concerns when it comes to IT infrastructure, says Bryan Balfe, enterprise account manager at CommVault.However, protecting organisational data has become as important, if not more so, especially when one considers the critical nature of...

Peripheral devices require security

Plugging in peripheral devices into work computers and other assets like printers is pretty commonplace in today’s businesses. Employees in a lot of companies literally have free reign to plug in whatever they want – be it a smartphone that needs charging, an MP3...