E-signatures gain traction in SA
Successful companies have a long history of leveraging technology to replace slow, complicated, manual processes to drive efficiency, reduce costs, and improve customer satisfaction. Liz De Freitas, account manager at AdvanceNet says, in spite of this drive, many...
How to minimise the security threat
Very few people escape the unpleasant experience of being defrauded at least once in their lifetime, but how you react to it can minimise the damage it causes to your psyche and your wallet. There are many different ways fraudsters can dip into your pockets, and with...
Intel Security presents new strategy
Intel Security has unveiled its new corporate strategy aimed at enabling businesses around the globe to more aggressively and effectively defend against data breaches and targeted attacks. Through a more integrated and more open security system that unifies the key...
Consumers warned of computer takeover scam
Computer and banking fraud is not just prevalent in emerging markets: Financial Fraud Action UK (FFAUK) is warning consumers of a new telephone scam whereby perpetrators impersonate major companies and organisations to take over computers to steal money from online...
Parents can help their children explore online safely
ESET has announced the global availability of its ESET Parental Control for Android app, which helps parents to protect their children when exploring the online world. Having a tool to manage what their children do with their tablets and smartphones is important for...
Global spam and phishing trends in Q3
Kaspersky Lab's latest report, "Spam and Phishing in Q3 2015", reveals the latest spam and phishing trends across the globe. The report shows that although the percentage of spam in email traffic has decreased since Q2, spam is using an increasing variety of tactics...
SMEs vulnerable to VoIP fraud
Voice over Internet Protocol (VoIP) voice and data communications technology is often touted as a major cost saver for small and medium-sized enterprises (SMEs) under pressure to reign in non-core expenditure. "A typical SME with ten or less employees can save up to...
Managing identity is at the heart of protecting data
Centrify's recent State of the Corporate Perimeter survey of more than 400 US and UK IT decision makers (ITDMs) shows that, corporations are vulnerable to attack but protecting identity is at the heart of protecting data. While major breaches at iconic brands like...
Sophos brings synchronised security to endpoints and networks
Sophos has introduced synchronised security protection against today's sophisticated threats with the Sophos Security Heartbeat capability of the Sophos XG series firewalls and UTMs. This new technology directly links next-generation firewalls and UTMs with...
Identity theft: how to avoid an identity crisis
There's nothing like that sinking feeling you get when you realise you've lost your wallet. Usually this isn't even related to any money that's in it, but rather the inconvenience of having to cancel all your bank cards and sort out items such as your driver's licence...
Understanding ‘bad’ user behaviour
A common maxim today is that a determined enough hacker will eventually get in, usually within minutes. Even more frightening, most of today's advanced threats remain undetected for weeks or even months. This is presenting huge challenges for the security industry....
Don’t be a victim of ATM theft this festive season
Many South Africans will be taking it easy during their well-deserved end-of-year holiday, but one portion of the population that will be working as hard as ever- financial scammers. The festive season is traditionally big business for fraudsters and thieves, because...