Endpoint security must not be forgotten
A centrally-managed endpoint security system is key for businesses who want to protect against vulnerabilities.
Cybercrime takes aim at major media events
We live in a world of ever increasing connectivity, where everything is already part of the Internet and where the variety of media, increased forms of access to information, and the explosion of social networking and mobility have revolutionised our lives. The...
SA IT must advance to combat threats
In the next round of the cyber war game, multi-layered targeted offences are being mounted against selected victims, and few enterprises have the security in place to withstand these attacks, says Networks Unlimited. Anton Jacobsz, MD of Fortinet distributor, Networks...
Sophos announces Mobile Control 4.0
Sophos has announced Sophos Mobile Control (SMC) 4.0, which includes individual file encryption, integrated AV and Web filtering. Available on premise or as-a-service, SMC provides a simple and differentiated approach for small and mid-market organisations to manage...
Businesses look to next generation firewalls
The increasing frequency and sophistication of today’s threats, and our growing dependence on Web applications and virtualisation, are driving a demand for next generation firewalls (NGFWs). Jayson O’Reilly, director of Sales and Innovation at DRS, says typically, a...
Trend Micro protects World Cup fans
Trend Micro is actively working to help defend against cyberthreats related to the 2014 FIFA World Cup in Brazil. Since its kick off on June 12, global attention has been and will now be focused on Brazil and the pageantry and spectacle of one of the most popular...
Kaspersky Lab detects mobile Trojan Svpeng
Although the Gameover Zeus botnet and Cryptolocker ransomware have been disrupted, it is still too early for a victory celebration. First, the deadline has expired and secondly, stories of the Gameover Zeus and Cryptolocker campaign have already spawned a number of...
PUPs wreak havoc
In the last few years, the spectre of potentially unwanted programs (PUPs) has reared its head. Myriad complaints litter tech forums, asking about this hazard, and complaining that they’ve been hacked, or infected, yet the vast majority of these ‘infections’ can be...
Effective IT security key for business
IT security spend is too often seen as a grudge purchase by business management. But the fact is – effectively securing enterprise networks is a business imperative, says Networks Unlimited. Anton Jacobsz, MD of Arbor Networks distributor Networks Unlimited, points...
Android devices come under malware attack
ESET has recently discovered the first confirmed case of ransomware that encrypts files held by Android devices. A Trojan, named Simplelocker, scans the SD care for certain file types, encrypts them, and demands a ransom in order to decrypt the files. Types of files...
Phishing service for the public sector
Global information security firm MWR InfoSecurity has become the first provider of phishing assessment services to be listed on G-Cloud, the UK Government’s approved online marketplace for the public sector. phish’d, by MWR, is a fully managed phishing assessment...
Successful SIEM boosts security
Headlines about major security breaches litter the headlines on a daily basis. Even more concerning are the thousands of unreported thefts of company data that happen every hour. Jayson O'Reilly, director of sales and innovation at DRS says losses can be enormous, not...