Five questions to ask before clicking a link
In today’s world of advancing cybercrime, URLs can lead to password and data theft as well as drive-by-download malware attacks, says Carey van Vlaanderen, CEO, ESET Southern Africa. Before you click on a link, as yourself these five questions: Do you trust the person...
Boost awareness through intelligent video
High crime rates have been a major concern for South Africans for many years now, and the police seem to be fighting a losing battle. Technology is one area that can really help to combat crime, and improving safety by increasing situational awareness is the first...
Industrial control system myths
Despite growing awareness of cyber-based attacks on industrial control systems, many IT security models continue to adhere to the outdated belief that physically isolating systems and ‘security by obscurity’ is enough. It’s not, says Andrey Nikishin, head of Future...
BYOD security still lacking
Most companies today have implemented bring your own device (BYOD) strategies, that allow their staff to use their personal devices, whether tablets or smartphones, at work. However, a recent BitDefender survey has revealed that BYOD policies, aimed at securing...
Securing the home office
As increasing numbers of employees work from home, organisations often overlook the security needs of remote workers, says Perry Hutton, Fortinet Africa regional director. Telework predates the BYOD phenomenon by decades. Despite Yahoo!’s move to the contrary, many...
What makes a firewall next-gen?
Fortinet, the global leader in high-performance cyber security solutions and a Networks Unlimited reseller partner, has released a white paper titled “5 1/2 things that make a firewall ‘Next Gen’”. “Network protection can be a difficult balancing act for security...
Winning the security war
Negligence is cited in almost half of cyber-attacks – are you protecting yourself from giving out the wrong information? According to a recent report released by IBM and the Ponemon Institute, carelessness was the primary root cause of data breaches in 2014. A...
Sophos offers one-click server lockdown
Sophos has announced the availability of a new advanced server protection product that combines whitelisting and anti-malware technologies in a single, simple to use product. Sophos Cloud Server Protection Advanced integrates server application whitelisting with...
Taking cybercrime seriously
According to a cybercrime report compiled by global Internet security firm, Norton, South Africa lost R3,7-billion in 2012 as a result of cybercrime. This number is sure continue to rise in parallel to the continued rapid expansion of the Internet – the technological...
Sophos acquires Reflexion Networks
Sophos has announced that it has acquired Reflexion Networks Inc., a leader in cloud-based e-mail security, archiving, e-mail encryption and business continuity services. The acquisition will enable Sophos to add cloud-based e-mail security to Sophos Cloud, the...
A cyber-security survival guide for SMBS
Perhaps the most important single thing that small businesses need to know about cyber threats right now is that cybercriminals are actively targeting smaller firms, says Carey van Vlaanderen, CEO, ESET. This can be hard to imagine or accept. After all, the security...
4K myths debunked
Ultra high definition (UHD) or 4K technology is the next major evolution in the video space, offering four times the resolution of High Definition (HD) which delivers dramatically enhanced viewing quality, says Laurence Smith, executive at Graphic Image Technologies....