Security Services & Risk Management



A real security solution
January 2013
Security providers and suppliers are mandated to perform any and all assessments to reflect their service or product as the best option for you and restricts them from being able to do effective and objective security risk assessments.

Read more...
Fast and effective DNA analysis
1 January 2013, Products & Solutions
Bytes Systems Integration offers the first fully automated sample-to-answer system for STR-based human identification, the RapidHIT 200 System.

Read more...
Keeping data safe and accessible
November 2012, Technews Publishing
Best practices for backups and archiving of paper and electronic data. One cannot rely on a weekly backup to a USB or tape. It is not a case of if this system will fail or break, but when.

Read more...
Tender fraud prevention service in South Africa
November 2012, News & Events
South Africa’s fight against tender fraud is gaining ground thanks to the launch of a new service from Experian.

Read more...
The concept of security risk assessment
November 2012
The security risk assessment is the new way of handling security, although people do not understand the concept and process of an assessment. Alwinco answers some important questions.

Read more...
Getting the crime statistics right
November 2012, iFacts
SA needs a fully inclusive public-private adjudicator to analyse the numbers. It is long past time for an independent body, comprising both public and private security, to take responsibility for our crime statistics.

Read more...
Preparing your data for disaster
November 2012
We are in the information age and information has become a critical enabler in corporations and SMEs alike. The effect of any information loss is at best cumbersome and time consuming, and at worst disastrous.

Read more...
New certified ECM courses
1 November 2012
Managing enterprise content such as documents, records, scanned images, e-mail and Web content can be a daunting task. Among other responsibilities, employees responsible for this information must understand which data must be kept, how long to keep it and the various Acts and regulations affecting the management of their information assets.

Read more...
Who are you really?
October 2012, Technews Publishing
As internal fraud continues to escalate, companies need to look at the source of the problem in a proactive manner. The million-dollar question is whether employee screening and verification is the solution.

Read more...
POPI at last
October 2012
Unlike most pieces of legislation, POPI touches on almost every aspect of your business and do not think for one second that by having great IT security you are covered.

Read more...
The Zero Moment of Truth
October 2012
An independent security risk assessment is the Zero Moment Of Truth in the security industry of South Africa.

Read more...
Gun-free shopping malls
October 2012, Bidvest Protea Coin
Bidvest Magnum has played a key role in the plan to make shopping malls safer by enabling them to move cash in air tubes out of sight of shoppers.

Read more...
Cash circulation doubles since 2003
October 2012, Retail (Industry)
Richard Phillips, MD of cash management services provider Cash Connect, recently addressed delegates at the AMC International 4th Annual Cash Handling & Security Forum 2012, at the Radison Blu Hotel in Sandton, Johannesburg.

Read more...
Integrity, trust, then skills
October 2012, iFacts
“In looking for people to hire, you look for three qualities: integrity, intelligence and energy. If they do not have the first, the other two will kill you.”

Read more...
Keeping tabs through SIA database
October 2012
According to SIA’s Steve Conradie, if an applicant is found to be credible and is entered into the database, it will provide them with 'employment for life'.

Read more...
Not so safe
October 2012
We often think turning a lock keeps us safe, but not from those with a specific set of skills.

Read more...
Destruction as important as protection
October 2012
Following the recent approval of the Protection of Personal Information Bill (PoPI) by the Government’s Justice Committee, businesses which fail to implement effective information destruction practices could find themselves in hot water following the introduction of this long awaited information protection legislation.

Read more...
Social engineering: the art of intrusion
October 2012
Social engineering is about hacking the human mind, something that in many ways is significantly easier than finding a new software vulnerability and using it as a gateway into your enterprise.

Read more...
C3 Shared Services expands service offering
October 2012, C3 Shared Services
C3 has launched a Skilled Services division. This is not a guarding division, but an additional offering to its technical division that is made up of high-level security operators.

Read more...
Secure your business, not only your premises
September 2012, Industrial (Industry)
Exploring the role of security systems in supporting workflow automation.

Read more...



<< First   < Previous   Page 67 of 95   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.