Endpoints are the new perimeter

Today’s threat landscape is unrecognisable from the one that we knew five years ago. Cybercriminals are no longer pimply teenagers in basements, but sophisticated, well equipped and well-funded thieves. Organised crime and nation states play a role too, funding the...

End of XP support a threat to enterprises

40% of all enterprises still on Windows XP posing serious risk of data loss now April 8 deadline has passed. McAfee urges business to execute their contingency measures. End of support for Windows XP which was scheduled for April 8 has exposed many businesses to...

Complex IT security outpaces in-house skills

The ever-growing complexity of IT security technologies will continue to push more companies to outsource IT security to managed service providers. The average company just doesn’t have the skills in-house to manage and maintain increasingly-sophisticated security...

E-mail can be a weak link in security

E-mail has just celebrated its 42nd to convey messages to different users of the same computer. Today, what was described as a “nice hack” in the 1970s has become the most widely used application on the Internet – over 2,2-billion people use e-mail every single...

ICT security can help build businesses

The perception that IT and cyber security stands in the way of innovation is incorrect. The reality is that if managed correctly with the assistance of an experienced service provider, ICT security can be a business enabler and serve as the conduit to a more mobile,...

How secure is your secure mail solution?

E-mail remains the most popular business communication tool in the world – 204-million mails are sent every minute, of which about 25% are business-related. Considering the sheer volume of communication, it is no wonder that e-mails are often the source of costly data...