Protect company data from insider theft

Despite news of hacking, industrial espionage, corporate data theft, data leaks and other breaches and assaults on enterprise information coming to the fore and grabbing headlines almost daily, a shocking amount of businesses – especially smaller ones – are still...

Protecting businesses’ endpoints

Endpoints are often the initial ‘surface’ where attacks and exploits occur. In fact, both the RSA breach and the notorious Google Aurora attack originated at a single compromised endpoint. It has long been known that technical departments need to invest in endpoint...

Wildcard certificates are a security risk

As the name suggests, the value of a Wildcard SSL certificate varies and is determined by its audience. There are several risks associated with this certificate type, says Megan Rehbock, LAWtrust certificate service manager. Wildcard certificates, which support all...

Size immaterial when it comes to security

IT security has no respect for size. A hacking group can have hundreds or thousands of members globally, like anonymous, or just a handful, like the group that mounted the successful Eurograbber attacks against banks in 2012 – but in either case, the disruption to the...

Insider data leaks a real risk for companies

South African companies are generally well aware of the dangers of external hacking attacks but often overlook the threat of internal data leaks – whether malicious or accidental. Companies in mining and construction tend be more vulnerable than they realise, and...

Gateway encryption eases cloud concerns

Cloud computing has moved well beyond buzzword status to become a bona fide business-enabling technology area that can be used enterprise-wide, by sales, marketing, procurement and line of business, and for multiple purposes – including collaboration, says Tony...