Criminal focus is on apps March 2013 The growth in cybercrime generally is well reported, but South African businesses are still not taking it seriously enough – particularly when it comes to application security. According to research firm Gartner, 75% of attacks are directed at the application layer and 75% of successful attacks target vulnerabilities that were already known.
Cyber security in 2013 January 2013 “We have built our future upon a capability that we have not learned how to protect. We have ignored the need to build trust into our systems. Simply hoping that someday we can add the needed security before it is too late is not a strategy.”
Secure backups for SMEs 1 January 2013 Vox Telecom has announced a suite of products to bring the security, cost and reliability of corporate-grade hosted services to small and medium-sized businesses. Moreover, they are so confident of success they are offering to pay up to R100 000 to any business that cannot restore its audited data from Vox backups.
Information security, governance and compliance 1 January 2013, Ideco Biometrics The approach to fixing the mega-problem of credential abuse has traditionally been to apply more of the same. In an attempt to prevent abuse, passwords and PINs have become longer and more complex. Many organisations require them to be changed on a regular basis.
How serious is Internet-related crime in South Africa? 1 January 2013, Financial (Industry) Crime prevention and safety is a high priority of the SA government, and Statistics SA has begun with the Victims of Crime Survey (VOCS) 2012 and will produce a VOCS series annually.
88% of companies do not protect their databases 1 January 2013 GreenSQL revealed that 88% of all companies participating in its December survey do not protect their databases from both external and internal threats, and almost one fifth do nothing to protect their databases at all.
Rising attacks focus on browsers and social media networks 1 January 2013 IBM’s X-Force 2012 Trend and Risk Report, which shows a sharp increase in browser-related exploits, renewed concerns around social media password security, and continued disparity in mobile devices and corporate bring your own device (BYOD) programs.
Application security November 2012, Technews Publishing The latest South African Cyber Threat Barometer for 2012/13 estimates that R2,65 billion was lost to cyber crime in the period from January 2011 to August 2012, with just over R660 million that was not recovered.
Non-invasive threat-monitoring service 1 November 2012 Magix Security has announced a new monitoring service that simplifies monitoring and managing the threats presented by corporate insiders, delivering real-time protection against malicious activity and highlighting vulnerabilities that could compromise security.
The lowdown on data storage 1 November 2012 Current protection approaches to businesses storing and protecting critical data are increasingly falling short due to network, security and usability constraints. Business managers are realising that effective data protection is crucial to the integrity of stored information.
Cisco's data centre security tools 1 November 2012 Cisco has introduced a set of security solutions designed to protect data centres in South Africa against the threats they face in moving toward more consolidated and virtualised environments.
Millions of Android users still at risk October 2012 MWR InfoSecurity, an international IT security company, has won the US$30 000 prize at the Mobile Pwn2Own competition held at the EuSecWest Conference in Amsterdam in September.
Protect your IT infrastructure from physical threats October 2012 IT infrastructure is the heart of any modern enterprise, and any downtime or disruption can have a detrimental effect on business operations. Dust, heat, humidity and even people can all cause damage to sensitive equipment, potentially shutting down organisations.
Back to school Access & Identity Management Handbook 2013, Access Control & Identity Management, Infrastructure, Education (Industry) Somerset College selected Impronet and Morpho biometrics to control access to facilities.
Disconnecting video surveillance September 2012, Duxbury Networking One of the most significant technology advancements in the video surveillance industry is the increasing adoption of wireless technology to link cameras to the surveillance network, spurred by the convergence of legacy analogue and new-generation digital technologies.
Resolving the security threat September 2012 The advent of wireless networking and the wireless transmission of data have brought the benefits of convenience, flexibility and significantly lower installation costs to the video surveillance industry.
Fraud prevention in a bad economy September 2012, iFacts This increased focus on reputation has stimulated a renewed interest in integrity. Integrity is defined as a strict adherence to a moral code of ethics. Whether we realise it or not, we all have a code of ethics we live by; unfortunately, many have no strong moral foundation.