The motivation behind a cyber-attack
Being aware of who your enemy is, and what they are after, is the first step towards a successful cyber defence. "Understanding the tools the attacker is using is no longer good enough. Businesses need to understand the motivation behind the attacks,” says Jayson...
SMBs are easy targets for hackers
For the average small to medium sized enterprise, which faces the exact same IT security challenges as large enterprises, buying and maintaining countless point solutions to address security threats in what is really a reactive patchwork manner is an expensive...
Protecting critical infrastructures
Critical infrastructure systems are the backbone for controlling and managing essential services for industries including oil and gas, utilities, healthcare and public sector, says Craig Hockley, regional director for South Africa and sub-Saharan Africa, McAfee. Any...
The downside of free WiFi
As the public and private sector strive to deliver Internet access to all, WiFi hotspots present a viable solution to the challenge of cost-effectively delivering access to the many. Free WiFi was recently rolled out in parts of Cape Town, for example, with free or...
InfoProtect releases online security portal
InfoProtect has created a new online portal for customers to gain access to security solutions and technology advice on a monthly subscription basis. By removing the guesswork and intensive administration normally associated with these portals, InfoProtect is making...
Kaspersky patents new technology
Kaspersky Lab has announced that it has been granted a US patent on a system which helps to detect malware modified using packers or encryptors which have not previously been identified by researchers. The technology is already integrated into the company’s key...
DiskShred warns of PCI DSS rule changes
Data storage destruction specialist DiskShred has warned UK companies that process credit card transactions - which accounts for almost all SMEs and larger businesses - of plans to dramatically ramp up the security requirements under Version 3 of the PCI DSS rules due...
Telkom Business launches security offering
Telkom Business has introduced Consolidated Threat Management (CTM) to the market. CTM is a comprehensive security service offering for perimeter and branch office networks. “CTM is a leading-edge, all-inclusive offering that sets the benchmark in the South African IT...
Norton announces new security products
Norton has announced the release of the latest versions of the award-winning Norton core security products, which keep consumers safe from evolving threats in their daily online lives. The latest versions improve on the industry’s leading protection and performance,...
Kaspersky products win in Dennis testing
Kaspersky Labs is proud to announce that its products, Kaspersky Endpoint Security for Business and Kaspersky Small Office Security, have both earned first place in quarterly independent testing performed by Dennis Technology Labs in categories for corporate security...
How to diagnose a security breach
A popular maxim today is that there are only two kinds of companies – those who have been breached, and those who have been breached but don’t know about it. Given that recent research has revealed that the average advanced persistent threat lurks on a business...
Simple security with new Sophos Cloud
Sophos has announced a strategy to deliver cloud-managed security solutions that will appeal to organisations seeking a simpler approach to IT security. Sophos Cloud is an easy to use security service that provides essential protection for today’s advanced threats....