Jun 11, 2013
Although cybercriminals and scammers are increasingly using social media to launch attacks on companies and individuals, they haven’t abandoned e-mail as a channel. In South Africa malicious e-mail traffic is amongst the highest in the world and so is the phishing...
Jun 11, 2013
A financial institution not investing in a long term information security strategy is gambling with the protection of corporate and client data, according to information security experts at 4Di Privaca. The executive mind-set of viewing information security as a...
Jun 10, 2013
Cloud-based security services are gaining momentum as organisations look at smarter ways of managing their security strategies. Enterprise security no longer just encompasses firewalls and antivirus software, but a complex blend of secure e-mail and Web gateways,...
Jun 10, 2013
For companies, knowing who a person is, where they are on the premises and why they are there – and validating this information – is the main driver behind security and biometric access control technology integration in the workplace. To this end,...
Jun 6, 2013
Malware is always changing, adapting, being rewritten and re-released in a seemingly infinite number of ways, with the express intention of making your life difficult – and making the writers or owners of the code as much money as possible. Security threats have...
Jun 5, 2013
George Zervos, EMEA sales director at Kemp Technologies, looks at Microsoft’s decision to “end of sale” its Threat Management Gateway and what it means for enterprise users across Africa. In September last year, Microsoft announced that it was...