Security challenges in a virtual world

Mobility and cloud computing are currently hot topics in the IT space, enabling users to work on the move and from practically anywhere in the world. However, in order to deliver the full capabilities of these two technologies, virtualisation is critical to creating a...

Endpoints are the new perimeter

Today’s threat landscape is unrecognisable from the one that we knew five years ago. Cybercriminals are no longer pimply teenagers in basements, but sophisticated, well equipped and well-funded thieves. Organised crime and nation states play a role too, funding the...

End of XP support a threat to enterprises

40% of all enterprises still on Windows XP posing serious risk of data loss now April 8 deadline has passed. McAfee urges business to execute their contingency measures. End of support for Windows XP which was scheduled for April 8 has exposed many businesses to...

Complex IT security outpaces in-house skills

The ever-growing complexity of IT security technologies will continue to push more companies to outsource IT security to managed service providers. The average company just doesn’t have the skills in-house to manage and maintain increasingly-sophisticated security...

E-mail can be a weak link in security

E-mail has just celebrated its 42nd to convey messages to different users of the same computer. Today, what was described as a “nice hack” in the 1970s has become the most widely used application on the Internet – over 2,2-billion people use e-mail every single...

ICT security can help build businesses

The perception that IT and cyber security stands in the way of innovation is incorrect. The reality is that if managed correctly with the assistance of an experienced service provider, ICT security can be a business enabler and serve as the conduit to a more mobile,...