BT delivers security services for icare
BT has signed a contract to deploy a cloud-based SIEM service for icare, a regional provider of insurance and care services to the businesses, people and communities of New South Wales, Australia. By selecting BT, icare will benefit from market-leading cyber security...
Users still the weakest link in the IT security strategy
Cyber security threats are constantly evolving but one remains the same - users. When asked whether users really are still the weakest link in companies' cyber security defence strategy, Michael Morton, Solutions Architect at Securicom, says: "Yes, yes and yes." He...
Datacentrix attains ISO certification
Datacentrix has been awarded the ISO 27001 certification of its information security management system (ISMS). The certification is a framework of policies and procedures that includes all legal, physical and technical controls involved in an organisation's...
How can companies protect themselves from future ransomware attacks?
The recent ransomware attack on Johannesburg power utility City Power shows how easy it is for organisations to fall victim to cybercriminals, who often carry out attacks that are financially motivated. By Lukas van der Merwe, specialist sales executive: security at...

Security Terminology Demystified: The Botnet
You are now part of a collective, controlled by an unseen presence and forced to do their bidding ... In our comprehensive guide to all the security threats that are out on the market today we listed some of the most virulent and one of these is the botnet. A botnet...
Data security in the age of the cloud
With IT spending in South Africa on the increase and organisations increasingly turning to the cloud to host their data, cybersecurity must remain a strategic priority. And so it has become less about the technical capabilities of protection and more about...
Kaspersky Security Cloud strengthens privacy control
Kaspersky has updated Kaspersky Security Cloud - its account-based service with access to the company's best consumer technologies and tools - with new ways to protect user privacy across multiple devices. Kaspersky Security Cloud now reduces the risk of users'...
Seacom, Sophos secure SMEs
Seacom has joined forces with Sophos to provide a next generation security solution called On-Premise Security to cost-conscious small and medium enterprises (SMEs) across South Africa. Seacom's On-Premise Security is a full-suite solution that uses Sophos' XG...
Access control is paramount for data security in the cloud
Companies are increasingly shifting IT services and applications to the cloud to be readily available to employees, empowering their productivity from wherever they are and from any device. Moving critical business information to the cloud does come with security...
Steps to successful biometric implementation
Biometrics can provide the organisation an intelligent balance of security and convenience if implemented and managed correctly. By Marius Coetzee, CEO of Ideco Biometrics has often been considered a risky and unreliable investment for many organisations. Its rocky...
Cyber security requires a new approach
From digital transformation through to the arrival of the Fourth Industrial Revolution (4IR), decision-makers are changing their views on how technology can benefit the organisation. But while much attention is placed on things like data analysis, the cloud, and...
Are SA firms flipping a coin on their cybersecurity?
Would you gamble flipping a coin for the effectiveness of your cybersecurity plan? Heads: you're able to prevent - or recover from - a cyberattack. Tails: you fall victim to a cybercriminal, lose critical business data, suffer immense business productivity and...