Nedbank’s Approve-it reduces phishing
It is a year since the launch of its enhanced Internet banking security feature Approve-it, and Nedbank reported a reduction of 99% in phishing losses when compared to the same period in 2011. The bank also confirmed that over 16-million secure online transactions...
Managed services for endpoint security
Mobility has created a number of challenges for information security, most originating from the reality that sensitive information is accessible from just about anywhere on any number of devices. The traditional castle and moat model, where company data was housed on...
Sophos ensures secure Web surfing
Sophos has announced the latest version of its unified threat management (UTM) solution, UTM Connected. This release introduces expanded UTM managed endpoint protection with Web in Endpoint functionality, broader wireless coverage for large scale wireless deployments...
The dangers of BYOD implementation
According to a Forrester survey carried out in Q4 of 2012 75% of company employees across the globe want to use their personal mobile devices for work on a daily basis. This is a 3% increase from the figures in 2011. Most (76%) of this group is specifically interested...
Cyberoam strengthens security for SMEs
Extending its future-ready NG series UTM lineup for small and medium enterprises, Cyberoam, the leading global provider of network security appliances, today announced addition of two new unified threat management (UTM) models – CR200iNG and CR300iNG. Addressing the...
Users’ online password strength poor
With the increasing importance of the online world and its impact on users' daily lives, today people spend more and more time online, using Web-based services such as social networks like Twitter, Linkedin and Skype, and e-mail and online banking. However, generally,...
Strong social media passwords are key
Last week (23 April), the Twitter account of the Associated Press (AP) news agency was hacked and subsequently sent out a hoax tweet reporting that President Barack Obama had been injured in an explosion in the White House. Within seconds, Wall Street was in panic...
How to secure multiple devices
Today most company employees use multiple devices to access business critical information within and outside of the organisation, writes Fred Mitchell, Security business unit manager at Drive Control Corporation (DCC). Computers, laptops, tablets and smartphones have...
Capture signatures with VpadWiz Pro
VPSign’s VpadWiz Pro for Android-based tablets is a member of VPSign's product suite that excels in providing state of the art solutions for paper-replacing document handling and capturing of handwritten signatures on screen. Available locally from Brand New...
Supersizing security monitoring
As more and more CCTV cameras are deployed in safe city networks, at residential and business sites, in industrial complexes and in moving vehicles, taking advantage of new and smarter security technology is becoming vital, says Mark Chertkow, MD of Graphic Image...
TNPA protects critical data with Altonet
Transnet National Ports Authority (TNPA) is a division of Transnet Limited, tasked with controlling and managing all commercial ports on South Africa’s coastline. It is the largest port authority in southern Africa in terms of cargo volumes and is responsible for...
Check Point launches 1100 Appliances
Check Point Software Technologies, the worldwide leader in securing the Internet, has announced the launch of its new 1100 Appliances, providing enterprise-class security in a compact desktop package, perfect for branch and remote offices. The 1100 Appliances offers...