Strong social media passwords are key

Last week (23 April), the Twitter account of the Associated Press (AP) news agency was hacked and subsequently sent out a hoax tweet reporting that President Barack Obama had been injured in an explosion in the White House. Within seconds, Wall Street was in panic...

How to secure multiple devices

Today most company employees use multiple devices to access business critical information within and outside of the organisation, writes Fred Mitchell, Security business unit manager at Drive Control Corporation (DCC).  Computers, laptops, tablets and smartphones have...

Supersizing security monitoring

As more and more CCTV cameras are deployed in safe city networks, at residential and business sites, in industrial complexes and in moving vehicles, taking advantage of new and smarter security technology is becoming vital, says Mark Chertkow, MD of Graphic Image...

Navigating the morass of technology threats

The rate at which technology is currently progressing is so rapid that almost all government legislation regarding technology is out of date by the time it is written into law. In an attempt to prevent this, governments try to make legislation as technology neutral as...

Securing the best level of access control

Continuous research into, and development of, access control solutions means businesses can take advantage of a wider selection of low-cost technology. This technology is designed to offer complete security and empower decision-makers with control over the...

Home IT threatens corporate network security

As South African IT managers and network administrators grapple with increasing threats against their organisations from hackers, phishing, malware and naive insiders, there is another dark threat looming on the horizon. These risks involve the use of corporate...