Integration capabilities key for security
Crime is a reality of doing business in South Africa, and as such, security solutions are essential for any commercial environment, says Mark Chertkow, MD of Graphic Image Technologies. The aim of such solutions is multi-fold – they act as a deterrent to petty...
Are you ready for the cyber-attack battle?
Over the last 20 years endpoint security has altered fundamentally in many ways mirroring the evolution of the wider information security market, says Gregory Anderson, country manager at Trend Micro South Africa. From the basic anti-malware scanners of the ‘90s to...
Palo Alto, VMware expand partnership
Palo Alto Networks and VMware has announced an expansion of their strategic partnership to address mobile security needs. Mobile computing is transforming the ways organisations do business. Users no longer stop working once they leave the office, and they need secure...
Truteq adds to home alarm system
Wireless specialist TruTeq Devices – which boasts clients such as Eskom and Telkom – has added a number of hardware and software features to its next-generation home alarm system in a move to “South Africanise” it - and make it more appealing to lower income groups...
The ransom demand you can ignore
Cybercrime is age-old trickery with a lethal digital revamp. Nowhere is this more evident than with ransomware. As the name suggests, ransomware describes malicious software that takes your data and holds it for ransom. In SA the most common form (or flavour) of this...
Securely delivering the Internet of Things
Network perimeters are collapsing, and IT now has to contend with a huge number of devices and applications that may well be beyond the traditional network perimeter, says Gary Newe, director for Field Systems Engineering for the UK, Ireland and sub-Sahara Africa at F5 Networks. The Internet of Things – objects and appliances with embedded sensors and chips capable of communicating online – will result in 50-billion devices being connected to the Internet by 2020, according to Gartner.
Preventing the scourge of spyware
In addition to virus attacks, malicious code and phishing attempts, adware and spyware are becoming more of a threat. Aside from the amount of resources needed to process and transmit data, Lutz Blaeser, MD of Intact Software Distribution, describes spyware as...
Protect your e-wallet from online fraud
Kaspersky Lab has created a new interactive project, One Dollar Lesson, that guides users through common online banking threats and shows them how to protect their money in each instance. Online financial fraud is a growing threat. In fact, according to a survey...
New PCI DSS Version 3.0 mandated
On January 2015, version 3.0 of the Payment Card Industry Data Security Standard (PCI DSS) came into effect, says Simeon Tassev, MD and QSA at Galix. The changes are progressive and the guidance reflects the changing business environment, increasing protection against emerging new threats. Among the new areas of focus are: mandated data flow mapping, additional guidance on mobile security, and the introduction of security controls for companies trading online.
Commercial vehicles under siege
According to Cartrack, the incidence of hijacking across commercial and private vehicles has risen sharply in the last year. South Africa’s official crime statistics show a 12,3% increase in carjacking to 11 221 reported cases in the last year while truck hijackings...
Mobile malware requires better monitoring
South African smartphone users must be savvier about the sites they visit, what they download, and the apps they use on their devices. Mobile malware is becoming more prevalent. So says Richard Broeke from IT security services vendor, Securicom. “Designed to perform...
Built-in intelligence for NGFW
Firewalls are the first line of any organisation’s defences. They are the "sentinels" of the network, standing guard and controlling traffic entering and leaving the network, blocking potentially dangerous or unknown traffic that may threaten the organisation....