Protecting businesses’ endpoints

Endpoints are often the initial ‘surface’ where attacks and exploits occur. In fact, both the RSA breach and the notorious Google Aurora attack originated at a single compromised endpoint. It has long been known that technical departments need to invest in endpoint...

Wildcard certificates are a security risk

As the name suggests, the value of a Wildcard SSL certificate varies and is determined by its audience. There are several risks associated with this certificate type, says Megan Rehbock, LAWtrust certificate service manager. Wildcard certificates, which support all...

Size immaterial when it comes to security

IT security has no respect for size. A hacking group can have hundreds or thousands of members globally, like anonymous, or just a handful, like the group that mounted the successful Eurograbber attacks against banks in 2012 – but in either case, the disruption to the...

Insider data leaks a real risk for companies

South African companies are generally well aware of the dangers of external hacking attacks but often overlook the threat of internal data leaks – whether malicious or accidental. Companies in mining and construction tend be more vulnerable than they realise, and...

Gateway encryption eases cloud concerns

Cloud computing has moved well beyond buzzword status to become a bona fide business-enabling technology area that can be used enterprise-wide, by sales, marketing, procurement and line of business, and for multiple purposes – including collaboration, says Tony...

Security policies offer companies protection

Misuse of office computers does not just reduce productivity and waste time and money. More importantly, it puts corporate network security at risk, jeopardising critical data. Communicating on social networking sites or via IM, visiting entertainment sites, or...