Balance mobility risk with data availability
Mobile devices have become an integral component of the Always-On Enterprise. But what impact do they have on the modern data centre, especially when employees expect to have access to mission-critical data from wherever they are? Rick Vanover, senior product strategy...
Underestimate spear phishing at your peril
Too many businesses today underestimate the dangers of spear phishing, and fail to realise it is one of the top threats enterprises face today, and one that often results in devastating losses, both financial and in terms of reputation. "Businesses who want to protect...
Kaspersky Lab debuts Security Awareness Training
Kaspersky Lab has announced the availability of a computer-based Security Awareness Training product range, aimed at enhancing the overall security of businesses by building a cyber safety culture and giving employees the right motivation and essential knowledge to...
You are the weakest link …
A decade ago, an anti-virus solution, firewall and some DLP were thought to be more than enough to prevent threats from damaging your organisation. However, today's threats are far more sophisticated, and rely on your company's most valuable assets to succeed - your...
Ask your MSSP about better network security
Frost & Sullivan predicts that the market for Managed Security Service Providers (MSSP) will grow from $6,66-billion in 2011, to $15,63-billion by 2016. "We are seeing a steep increase in advanced threats and cyber attacks. More and more organisations across the...
Sophos debuts enterprise malware removal tool
Sophos has launched Sophos Clean, the latest addition to its Enduser protection portfolio of advanced malware detection, remediation and removal software. The signature-less technology uses progressive behaviour analytics, forensics and collective intelligence to...
Enhance security posture to fight ransomware
Petya ransomware is proving to be one of the top cybersecurity stories of 2016. Masquerading as a job application e-mail, Petya is an executable file that is sent within a dropbox link. Thinking that they are opening a job application, users run the file. And once the...
Cyber-crime in the digital era
Many researchers now estimate the scale of the global cybercrime business to be greater than that of drug trafficking. Kaspersky Labs' recent survey revealed that nine out of 10 companies have already been a target of cybercrime, in some shape or form, writes Rory...
Security for Africa’s growing mobile market
With mobile ownership in South Africa and Nigeria now as common as it is in the US, the continent is rapidly gaining ground as the new frontier for mobile. Its young population, ready to embrace the new mobile innovations and technologies, has attracted the attention...
Data security is at the heart of PoPI
As the implementation of the Protection of Personal Information Act (PoPI) gradually comes closer, South African organisations are wondering how best to prepare for it. The key is to understand that data security lies at the heart of PoPI compliance, argues Godfrey...
New technology shows full scope of an attack
Fujitsu Laboratories has developed new technology that, in response to targeted cyber-attacks on specific organisations, rapidly analyses damage status after an attack has been detected. In the event of malware attacks, it was previously necessary to analyse a range...
Why are security operation centres failing?
While definitions vary, generally speaking a security operation centre (SOC) is a central point from where all security issues are dealt with on an organisational and technical level. Typically, it will encompass all the enterprise's information systems - from web...