19 C
Johannesburg
Monday, September 24, 2018
Advertisement

The importance of a data breach plan

South Africans have read about, and many have unfortunately experienced, significant data breaches this year already. Even the Presidency’s website was targeted in July 2018.

Time to take the cyber threat environment seriously!

On a recent visit to BDO in Norway, it struck me that many South African-based businesses and organisations are increasingly exposed to cyber threats and vulnerabilities of which they are blissfully unaware.

NEW | Samsung Pay comes to South Africa

Samsung Electronics has introduced its mobile payment service, Samsung Pay, to South Africa. Samsung Pay is now available in 24 markets worldwide, the local launch underscores Samsung’s commitment to delivering a secure and convenient mobile wallet experience to consumers worldwide.

REVIEW | Samsung Galaxy Note 9

Big, Bold, and powerful, sums up the new Samsung Galaxy Note 9. Samsung has pushed the technological envelope as far as it can to make this the best Samsung Mobile device currently available.

NEW | South Africa’s first LEGO Certified Store now open

Lego has long appealed to its fans both young and old and finally, the Great Yellow Brick Co has opened the first LEGO® Certified Store in South Africa.

The Digital Revolution – unplannable, unstoppable and inescapable?

The 4th Industrial Revolution; a wave of exponential and converging technological progress that is washing over every facet of our world. It is demolishing our received wisdoms about how the world works and should be structured. It is leaving the less agile to be tossed aside as disrupted detritus while the bold, the prescient and the innovative create and capture new opportunities.

Cyber fingerprint – shifting security strategy

The cybersecurity industry's approach to protecting our data simply isn't working anymore. It was built for the past. It was about outside threats, hackers finding their way inside, building bigger and more audacious security walls to befuddle the bad guys and protect us from threats. Such an approach was created for a different time, a different, more tightly held IT environment, and a different threat landscape.

To NAS or not to NAS?

Cloud storage has traditionally been focused on by the enterprise market. Big budgets and large IT departments have the skill sets and infrastructure as well as the expertise, to use these technologies.

REVIEW | NETOGY Wi-Fi Cordless IP Telephone

The Netogy WIT300 is a Wi-Fi cordless IP phone that easily connects to your existing Wi-Fi network and enables VoIP calls over SIP.

Deploying AI for cyber defence in depth?

As any business grows, data sharing increases in both volume and frequency. Every one of these digital relationships presents an expanding set of cyber risks. Cyber security has become a major priority for every organisation. The right controls and procedures must be put in place to detect potential attacks and protect against them. However, with the ever increasing risk of a cyber-attack businesses are finding it increasingly difficult to keep up with the rapidly evolving cyber threats?
- Advertisement -

LATEST NEWS

MUST READ

X

Forgot Password?

Join Us

Password Reset
Please enter your e-mail address. You will receive a new password via e-mail.