Security Services & Risk Management



Who are you really?
October 2012, Technews Publishing
As internal fraud continues to escalate, companies need to look at the source of the problem in a proactive manner. The million-dollar question is whether employee screening and verification is the solution.

Read more...
POPI at last
October 2012
Unlike most pieces of legislation, POPI touches on almost every aspect of your business and do not think for one second that by having great IT security you are covered.

Read more...
The Zero Moment of Truth
October 2012
An independent security risk assessment is the Zero Moment Of Truth in the security industry of South Africa.

Read more...
Gun-free shopping malls
October 2012, Bidvest Protea Coin
Bidvest Magnum has played a key role in the plan to make shopping malls safer by enabling them to move cash in air tubes out of sight of shoppers.

Read more...
Cash circulation doubles since 2003
October 2012, Retail (Industry)
Richard Phillips, MD of cash management services provider Cash Connect, recently addressed delegates at the AMC International 4th Annual Cash Handling & Security Forum 2012, at the Radison Blu Hotel in Sandton, Johannesburg.

Read more...
Integrity, trust, then skills
October 2012, iFacts
“In looking for people to hire, you look for three qualities: integrity, intelligence and energy. If they do not have the first, the other two will kill you.”

Read more...
Keeping tabs through SIA database
October 2012
According to SIA’s Steve Conradie, if an applicant is found to be credible and is entered into the database, it will provide them with 'employment for life'.

Read more...
Not so safe
October 2012
We often think turning a lock keeps us safe, but not from those with a specific set of skills.

Read more...
Destruction as important as protection
October 2012
Following the recent approval of the Protection of Personal Information Bill (PoPI) by the Government’s Justice Committee, businesses which fail to implement effective information destruction practices could find themselves in hot water following the introduction of this long awaited information protection legislation.

Read more...
Social engineering: the art of intrusion
October 2012
Social engineering is about hacking the human mind, something that in many ways is significantly easier than finding a new software vulnerability and using it as a gateway into your enterprise.

Read more...
C3 Shared Services expands service offering
October 2012, C3 Shared Services
C3 has launched a Skilled Services division. This is not a guarding division, but an additional offering to its technical division that is made up of high-level security operators.

Read more...
Secure your business, not only your premises
September 2012, Industrial (Industry)
Exploring the role of security systems in supporting workflow automation.

Read more...
A new approach
September 2012
The need for a new approach in health, safety, processes and compliance in the industrial, petrochemical, manufacturing and mining industries.

Read more...
Independent security risk assessment
September 2012
Many people ask why they need to have a security risk assessment done. The answer is actually very straightforward; a security risk assessment is an information gathering investigation which exposes your possible problem areas and vulnerabilities so that you can do something about them.

Read more...
Intelligent parking from EOH
September 2012
EOH Intelligent Infrastructure has secured the exclusive rights to represent the global leader in intelligent parking, Germany’s Scheidt & Bachmann in South Africa.

Read more...
Next generation distribution: enhanced value add
September 2012
We have all heard distributors talk about and label themselves as Value Added Distributors. What exactly is a Value Added Distributor and why is it relevant to consultants, system integrators and end users?

Read more...
A comprehensive security risk assessment
August 2012
A security risk assessment is a realistic, thorough and intelligent approach to security as a preventative measure against crime. It gives a comprehensive mechanism that ultimately gives clients the compass of what they are up against in terms of security risk.

Read more...
It is inside and it is on top
August 2012
Another characteristic of insider fraud is the ability of the perpetrators to cover their tracks – they’re talented at concealing their deception. The Citigroup fraud apparently relied on the insider being able to make various false accounting entries that created an illusion of legitimacy around the transactions that eventually ended up in his own account.

Read more...
Chip and pin devices under attack
August 2012
Researchers from British IT security company, MWR InfoSecurity, have demonstrated at the conference that it is possible to attack chip and pin devices using a specially prepared chip based credit card.

Read more...
POPI and the cloud
August 2012
In my previous article I gave a short breakdown of the new proposed Protection of Personal Information Act (POPI) and highlighted some of the issues that entities might encounter in terms thereof, especially when outsourcing processes to third parties.

Read more...



<< First   < Previous   Page 64 of 91   Next >   Last >>