Shadow IT could be why businesses “wannacry”
There are mixed opinions about implementing unauthorised, IT applications (apps) within the organisation, a practice known as Shadow IT. Simeon Tassev, MD and QSA at Galix Networking, examines the issue. Opinion on Shadow IT is divided into two camps. Some believe...
Migrating to a digitised environment?
Consider the security risk, urges Simeon Tassev, MD and QSA of Galix. The emergence of the digital world has caused a number of organisations to shift from analogue to digitised environments. Among the many complexities and challenges this transition gives rise to,...
Securing customer communication is best left to experts
Every day, several times a day, customers trust businesses with their personal information. A single transaction can generate reams and reams of data. Identification numbers, physical addresses, phone numbers, bank account details -- a customer parts with all these...
Cybersecurity and the future model
Industry leaders presented a wide range of topics and case studies at the Cyber Security in Banking Conference recently, highlighting the latest trends and development in cyber security. The event offered a comprehensive and multi-facetted agenda relevant to all...
Mission-critical myths about DDoS attacks
Bryan Hamman, Arbor Network's territory manager for sub-Saharan Africa, examines whether these "myths" are fact or fiction. For anyone in 'denial' about the power of Distributed Denial of Service (DDoS) attacks in South Africa - attempts to exhaust the resources...
Mobile users are in denial …
Leo Meyer, MD of Black Castle Technologies, gets under the covers with the mobile security denial syndrome. A myriad of polls over the last year have confirmed what we would expect; consumers don't want their mobile devices to fall victim to security onslaughts....
GIT debuts FLIR’s PTZ auto-tracking
Graphic Image Technologies (GIT) has announced the local availability of FLIR's PTZ (Pan/Tilt/Zoom) auto-tracking solution for Quasar CP-4221-301 PTZ cameras. This auto-tracking solution makes it possible to use a surveillance camera to automatically follow a moving...
The rise of biometrics in business
Biometrics may at the outset seem like a space-age, technology driven discipline, but using unique physical characteristics as identifying features is nothing new, writes Davina Myburgh, director of core credit for TransUnion Africa. Artefacts discovered in ancient...
Stronger banking security is needed
The financial services industry is under increased threat from cybercriminals who use ingenious methods to attack institutions and consumers. Cybercriminals are employing ever more sophisticated means to intercept online transactions and commit fraud. Banks, financial...
Kaspersky launches Free IoT device scanner
Kaspersky Lab has released a beta version of its solution for the "smart" home and the Internet of Things -- Kaspersky IoT Scanner. This free application for the Android platform scans the home Wi-Fi network, informing the user about the devices connected to it and...
Who is behind industrial cyberattacks?
Over the past four months, more than 4 000 organisations globally have been targeted by cyberattacks which aim to infect their networks, steal data and commit fraud. Many of these companies are leading international names in industries such as oil and gas,...
How effective is two-factor authentication?
Should a password get hacked, it could expose the user to viruses, malware and data breaches on their mobile phones and other devices. Clever cyber crooks have the skills and the tools to easily crack passwords and steal personal information. The default for all user...