Incorporating security into facility design
Security within facilities – CCTV, access controls, alarms, fire detection and suppression and so on - is today increasingly integrated and digital, yet it is often an afterthought when a new building is designed, says Kobus Le Roux, national sales and marketing...
Avoiding the consequences of data loss
Protecting data has become of the utmost importance for organisations today, as information if the lifeblood of a business, says Gareth Tudor, CEO of Altonet. There are many consequences should sensitive information fall into the wrong hands, however, as the workforce...
Trend Micro verifies cloud security
As global companies continue to transition to the public cloud, cyber security remains paramount. To address this challenge, Trend Micro’s “Trend Ready for Cloud Service Providers” programme was established in 2012 as a testing ground to verify compatibility of the...
BYOD: securing the mobile business
Mobile threats are growing exponentially, as a flood of mobile devices is hitting the enterprise. If the past is anything to go by, 2013 will see an unprecedented number of threats hitting the mobile enterprise. Over and above lost and stolen devices, there are...
eScan wins AV-Comparatives certification
eScan, one of the leading antivirus and content security solution providers, has been recognised for its world-class protection by bagging yet another prestigious award from AV-Comparatives during the months of March to June 2013. The test illustrates the overall...
Meet the dark side of social media
Over the past few months, hundreds of South Africa’s approximately 6,19-million registered Facebook users have become the victims of cloning. This practice, which is also known as deep mining, is when cybercriminals lift a user’s name and profile picture from their...
Should criminals fear biometric security?
Although many biometric-based security solutions fall short of the mark when it comes to overall protection and serving as a credible source of evidence in law enforcement, there are characteristics that typify comprehensive offerings that should have the would-be...
Kaspersky blocks zero-day attacks
Kaspersky Internet Security 2013 for home users delivered a 100% success rate in blocking zero-day threats during a two-month security test. The Kaspersky Lab product took part in AV-Test’s May-June 2013 independent test, and scored 16.5 points out of 18 for its...
JD Consumer Finance deploys Jasco solution
Jasco Security has recently completed the installation and implementation of a turnkey, fully integrated video surveillance and security solution for JD Consumer Finance, a division of the JD Group as part of the construction of their new premises in Randburg,...
Trustwave, TNS protect payment card data
Trustwave and Transaction Network Services (TNS) have joined forces to offer an open and vendor agnostic point-to-point encryption service designed to help merchants protect their customers’ payment card information. According to the 2013 Trustwave Global Security...
Protect company data from insider theft
Despite news of hacking, industrial espionage, corporate data theft, data leaks and other breaches and assaults on enterprise information coming to the fore and grabbing headlines almost daily, a shocking amount of businesses – especially smaller ones – are still...
Sophos announces Server Protection
Sophos has announced Sophos Server Protection, an easy to use and flexible server antivirus solution that protects data without sacrificing performance. It is the latest entry in Sophos’ solution set that provides complete security for servers, the network and...