An holistic approach to data protection

Complexity around data protection in the enterprise is increasing, especially with hybrid cloud implementation patterns. Kelly Brown, senior director: Regional and Channel Marketing for EMC Corporation’s Data Protection and Availability Division, says: “Successfully...

Beware of the man in the middle

The motive for the vast majority of cybercrime is either to steal money or data. These attacks are sometimes small, targeting individuals, or sometimes massive, targeting large enterprises and stealing thousands of users’ details. In the majority of cases, attacks try...

IoT is already here

With 2014 being dubbed as the year of the Internet of Things (IoT), there are major concerns regarding the security and privacy issues that consumers face now, and potential problems they could have in the future, says Trevor Coetzee, regional director South Africa...

Fighting the new style of cybercrime

The nature of the cybercrime landscape is shifting. No longer are the main threats related to the theft of personal details and financial information – like capturing logon credentials, identity theft and stealing credit card data. Today’s most destructive breaches...

Malware hides in Android apps

A common piece of advice for Android users is to refrain from downloading applications from unknown sources. Although malware does show up at the Google Play store from time to time, it is much better controlled, than on other app stores, says Carey van Vlaanderen,...

Making the most of a CCTV solution

CCTV surveillance is becoming an increasingly popular addition to the security portfolios of both business and home users. The presence of CCTV not only acts as a deterrent for many would-be intruders, it also gives users themselves additional peace of mind that their...