Protecting the mobile workforce

Not too long ago, many organisations were dismissing the bring your own device (BYOD) phenomenon as being of no consequence. However, nowadays they realise that BYOD can have serious implications for the business, and are putting policies in place and implementing...

Protecting yourself from cloud service leaks

Anonymous hackers (or perhaps a single person) who somehow obtained explicit photos of various Hollywood celebrities, including many A-listers, like Jennifer Lawrence, and then publicised this material on the Internet, made many recent headlines. Kaspersky Lab says...
New WASPA code of conduct

New WASPA code of conduct

South Africa’s Wireless Application Service Providers’ Association (WASPA) has marked the occasion of the 10th anniversary of its founding by unveiling a vastly simplified code of conduct to better protect the mobile consumer.

Protecting portable devices from knocks

The mobile workforce has firmly entrenched itself globally and locally, the variety of devices has grown, it has also become increasingly common for the same user to have multiple devices, says Heinrich Pretorius, Targus product specialist at DCC. Most commonly, these...

Why passwords still fail to protect

The problem of passwords won’t go away. Weak or default passwords contributed to a third of the data compromises Trustwave investigated in 2013. IT administrators might try to elicit better password choices by enforcing password requirements, but users still find ways...