Steps to application-aware data protection

Many IT organisations have had the same data protection tools and practices for years, even decades, and see no need for that to change. However, Application Owners need to know that they’ll be able to recover their data at the application level when disaster strikes,...

Predicting DDoS attacks

Distributed denial of Service (DDoS) attacks are back in the news; it seems that barely a month goes by without media reports of a Web site or service being brought down by a DDoS attack. Sony’s PlayStation Network again became the victim of such an attack recently,...

IT security ‘fire drills’ key

IT security “fire drills”, supported by executive management and the risk committee should be conducted regularly in organisations, in order to understand the appropriate course of action in advance of a security breach. So says Neil Campbell, group GM for...

Online security in the new school year

Those sunny summer holiday days are over and so your children, instead of spending their time playing outside or on the beaches, will be back in front of their computers, tablets and smartphones busily exploring online encyclopaedias and dictionaries to help them...

Risky mobile behaviour endangers companies

The bad news for companies is that employees are increasingly taking part in risky mobile behaviour, with nearly 90% accessing confidential information on mobile devices, despite less than a quarter of them receiving mobile security training, said Derick Roberts, CEO...

Thermal imaging cameras for surveillance

Surveillance is an essential component of many security systems today, as it acts both as a deterrent and provides evidence to assist with identifying and prosecuting offenders, says Leon Cahill, security product manager at Jasco Enterprise. However, in many instances...