SMEs vulnerable to VoIP fraud
Voice over Internet Protocol (VoIP) voice and data communications technology is often touted as a major cost saver for small and medium-sized enterprises (SMEs) under pressure to reign in non-core expenditure. "A typical SME with ten or less employees can save up to...
Managing identity is at the heart of protecting data
Centrify's recent State of the Corporate Perimeter survey of more than 400 US and UK IT decision makers (ITDMs) shows that, corporations are vulnerable to attack but protecting identity is at the heart of protecting data. While major breaches at iconic brands like...
Sophos brings synchronised security to endpoints and networks
Sophos has introduced synchronised security protection against today's sophisticated threats with the Sophos Security Heartbeat capability of the Sophos XG series firewalls and UTMs. This new technology directly links next-generation firewalls and UTMs with...
Identity theft: how to avoid an identity crisis
There's nothing like that sinking feeling you get when you realise you've lost your wallet. Usually this isn't even related to any money that's in it, but rather the inconvenience of having to cancel all your bank cards and sort out items such as your driver's licence...
Understanding ‘bad’ user behaviour
A common maxim today is that a determined enough hacker will eventually get in, usually within minutes. Even more frightening, most of today's advanced threats remain undetected for weeks or even months. This is presenting huge challenges for the security industry....
Don’t be a victim of ATM theft this festive season
Many South Africans will be taking it easy during their well-deserved end-of-year holiday, but one portion of the population that will be working as hard as ever- financial scammers. The festive season is traditionally big business for fraudsters and thieves, because...
New ways to combat BYOD security threats
Employees in many companies are doing more of their work and executing an increasing number of transactions on mobile devices, while making less use of their desktops and notebooks. That trend means that hackers and malware authors are increasingly focusing their...
Trend Micro adds cloud security
As local companies join the multitudes looking to virtualisation and the cloud for cost savings and improved agility, concerns about security are rising. According to Trend Micro, the best way to maintain security and optimise performance is with a single security...
Nexmo debuts Verify SDK
Nexmo, the global cloud communications platform leader, has announced global availability of Verify SDK for iOS, Android and JavaScript operating systems and programming languages. Now developers will be able to easily add phone verification with a single line of code...
Commvault defines new challenges
Commvault has identified a series of emerging customer needs facing CIOs and technology and business leaders as they face the challenges of rapidly changing technology, tightening resource requirements, and ever-expanding volumes of data. The company has also outlined...
Samsung offers affordable video surveillance
As the sole distributor of Samsung telecommunication and PABX equipment in Sub-Saharan Africa, MIA Telecoms has launched a range of Samsung security solutions to the local market. Samsung Techwin's video surveillance products are based upon cutting edge technologies...
What you need to know about cyber-security innovation
As cyber attackers increase their ability to innovate, so they are able to enhance their capacity to outpace state-of-the-art security technology, writes Paolo Campoli, head of global service provider sales: Middle East & Africa at Cisco. Keeping up with the...