AVeS Cyber Security

Tel: +27 11 475 2407
Email: info@aves.co.za
www: aves.co.za
more information about AVeS Cyber Security

Digital means managing your risk
Issue 6 2020, Editor's Choice
Digital transformation in mining companies has become a business imperative to drive efficiencies, optimise competitiveness and reduce risks associated with human error.

Read more...
Next-generation security operations centre
Issue 4 2020, Cyber Security
Pay-as-you-use cybersecurity from AveS allows all businesses access to world-class expertise.

Read more...
Minding the gaps to protect industrial PLCs from cyber threats
November 2019, Cyber Security
PLCs, designed to control machinery and specific processes, were never built with cybersecurity threats in mind and protecting PLCs against these threats requires healthy isolation from the Internet.

Read more...
Access control is paramount for cloud security
Access & Identity Management Handbook 2020, Access Control & Identity Management
There is a misperception that if the cloud is secure, measures to control access to data are not necessary as the data is in a ‘safe place’.

Read more...
Don’t let your personal information become someone else’s business
October 2019
The ever-growing use of social media and mobile devices by everyone has opened easy gateways for cyber criminals to steal personal information, identities, and money.

Read more...
Integrated risk management essential
August 2019, IT infrastructure, Security Services & Risk Management, Industrial (Industry)
With manufacturing focused intensively on innovation, combined with a reliance on connected networks and products, it is highly vulnerable to cyberattacks.

Read more...
Integration is communication
February 2019, Cyber Security, Integrated Solutions
Communication is the missing link for integrating physical and IT security resources, says Charl Ueckermann, CEO at AVeS Cyber Security.

Read more...
The risks of social media
November 2018, Cyber Security
Employees, their social media profiles and the devices they use to access a company’s network and resources provide a plethora of gateways into the infrastructure for cyber criminals.

Read more...
Securing edge devices and the data they contain
October 2018, Editor's Choice, Cyber Security, IT infrastructure
Charl Ueckermann looks at some best practices to ensure edge devices are not your biggest risk devices in a hyper-connected, perimeter-less world.

Read more...
Cyber-securing physical security
March 2018, Editor's Choice, Cyber Security
You can’t kick a rock these days without hearing about cybersecurity and the Internet of Things (IoT). At the same time, you should not be talking, reading or hearing about one of these without the other.

Read more...

      Page 1 of 1