Cybersecurity is a shared responsibility

    Everyone agrees that cybersecurity is important. However, it is also an ongoing process. Nothing man-made is ever 100% secure – intentional backdoors are bad design and show a significant lack of understanding around the basics of a cyber secure world and programming mistakes cannot be avoided completely. Cybersecurity is a shared responsibility, none of the […]

      Cybersecurity for financial institutions

      Few businesses are as aware of the critical need to be fully prepared for potential attacks from cybercriminals as banks. And it’s not surprising, when research shows that banks have to fend off, on average, 85 cyber attacks every year, a third of which are successful. And as much as any financial loss that might […]

        Surveying the South African cybersecurity landscape

        The business landscape is being reshaped by the process of digital transformation, which affects every sector, industry and organisations of all sizes. While this process is enabling companies to strategically employ technology to capitalise on new business opportunities, become more efficient, and empower their staff to be more productive, it is also creating new threats […]

          Detailing security provisions within a performance specification

          The demand for connected IoT devices is increasing. Buoyed by the productivity, security and efficiency benefits, firms worldwide have been flocking to install the latest IP technologies on their IT networks. However, this has often been done with little thought to the security ramifications. That is perhaps why new vulnerabilities are being reported all too […]

            Preventing intruder access at the front door; halting hacker access at the back

            The rapid evolution of access control technology, specifically its shift from a closed, proprietary system to an open, IP based architecture, has unlocked a new set of possibilities for end users. Modern access systems offer open communications architecture, designed to allow access controllers to be deployed as IoT devices. The benefits are obvious; Access control […]

              How to maintain cybersecurity across all your devices

              Network administrators are under significant and increasing pressure to make sure their networks are designed and operated securely. So it is important that they have the right knowledge and tools to manage cybersecurity throughout the life cycle of the system. In this post, we will explore the cybersecurity best practices specific to managing their network […]