Two-factor authentication is a must

The repercussions of an online attack could be detrimental to a business, with both financial as well as reputation loss at stake, says Carey van Vlaanderen, CEO of ESET. With BYOD, mobility and cloud software becoming a standard for many companies, security should be...

Oblivious users under threat of attack

Mobile devices and tablets are no longer used solely for communication, with social media and the development of applications that can do almost anything you can think of, these devices are being used for work, play and everything in between, says Gregory Anderson,...

Identifying cyber enemies

It is no longer enough to understand how you are being attacked; you need to understand who is attacking you and why. It is only though this understanding that a successful defence can be undertaken, says Jayson O’Reilly, director of Sales and Innovation at DRS....

Thermal imaging as a method of security

The use of thermal imaging cameras for surveillance has increased significantly over the last three to five years as pricing has dropped. The benefits are significant, whether used to augment or replace traditional CCTV systems. This is driving organisations’ across...

Protecting your business data

Unstructured data is burgeoning. In order to protect and manage that data, organisations need to have systems and structures in place, and must understand how the data is being used, by whom it is being used, and most of all, they must know exactly who should not be...

Security challenges in a virtual world

Mobility and cloud computing are currently hot topics in the IT space, enabling users to work on the move and from practically anywhere in the world. However, in order to deliver the full capabilities of these two technologies, virtualisation is critical to creating a...