Hearts of Hope uses Accysys for security
When its existing access control and security system was disabled after being struck by lightning, Hearts of Hope, a Section 21 not-for-profit organisation focused on the welfare of vulnerable children, looked to Accsys for help. A replacement system was needed to...
Security is no longer a catch-up game
Up until now, security has been mostly a catch-up game. A vulnerability is discovered, a patch is issued and applied, and so on and so forth. However, as with all catch-up games, it will inevitably fail. By the time a new threat has taken hold, or the vulnerability...
Samsung, Microsoft partner on security
Samsung Electronics South Africa has announced that Samsung Knox will now support Microsoft’s Workplace, Join to Active Directory and the Windows Intune cloud-based mobile device management solution. This is in addition to the Cloud Printing solution which uses both...
10 steps to mitigate a DDoS attack
The threat posed by DDoS attacks is ever-growing and is something that continues to be a topic which interests and concerns businesses in equal measure. As the lines between the professional and social use of technology fade, it is even more important for us to...
CA Technologies releases Identity Suite
CA Southern Africa has announced the availability of CA Technologies CA Identity Suite, a new, one-stop identity management and governance solution that transforms data into business information and simplifies identity management and access governance across the...
Panda offers new Cloud Fusion
Panda Security has announced the availability of its new cloud offering, Panda Cloud Fusion, which combines comprehensive security, management and support in one solution. The new Panda Cloud Fusion offers significant benefits for organisations needing to manage and...
Two-factor authentication is a must
The repercussions of an online attack could be detrimental to a business, with both financial as well as reputation loss at stake, says Carey van Vlaanderen, CEO of ESET. With BYOD, mobility and cloud software becoming a standard for many companies, security should be...
Trend Micro launches attack info hub
Cybercriminals are becoming more aggressive and are diving deeper into victims’ networks to steal sensitive information. As targeted attacks continue to gain momentum, permeate the Internet and strike without warning, Trend Micro Incorporated, a global developer of...
McAfee announces Mobile Security update
McAfee, part of Intel Security, has announced the latest version of McAfee Mobile Security that now enables consumers to instantly run free privacy and security scans. These scans allow users to identify apps that are over sharing personal information. It also scans...
Oblivious users under threat of attack
Mobile devices and tablets are no longer used solely for communication, with social media and the development of applications that can do almost anything you can think of, these devices are being used for work, play and everything in between, says Gregory Anderson,...
Identifying cyber enemies
It is no longer enough to understand how you are being attacked; you need to understand who is attacking you and why. It is only though this understanding that a successful defence can be undertaken, says Jayson O'Reilly, director of Sales and Innovation at DRS. "If...
Trend Micro protects Facebook users
In an effort to provide Facebook users with a more secure online experience, Trend Micro has announced it has expanded its partnership with Facebook to incorporate Trend Micro HouseCall, a royalty-free security solution which will help detect malware and keep devices...