How to improve surveillance device and network security

    As evidenced by the seemingly endless string of cyberattacks in the news, cyberthreats have become an unfortunate way of life thanks to the ever-evolving connected world we live in. Needless to say, given the potentially disastrous ramifications from a breach, protecting networks and systems has become a top priority for organizations of all sizes. It […]

      4 key tips to protect small businesses from cyberattacks

      Cyberattacks are frequently making headline news: to ensure network security, we must understand the challenges and think in practical terms. In 2020 there will be 24 billion devices connected to the Internet: these – routers, firewalls, servers, smoke detectors, cameras – definable as “sensors”, will communicate with each other, producing data; many of these devices […]

        Cybersecurity is a shared responsibility

        Everyone agrees that cybersecurity is important. However, it is also an ongoing process. Nothing man-made is ever 100% secure – intentional backdoors are bad design and show a significant lack of understanding around the basics of a cyber secure world and programming mistakes cannot be avoided completely. Cybersecurity is a shared responsibility, none of the […]

          Surveying the South African cybersecurity landscape

          The business landscape is being reshaped by the process of digital transformation, which affects every sector, industry and organisations of all sizes. While this process is enabling companies to strategically employ technology to capitalise on new business opportunities, become more efficient, and empower their staff to be more productive, it is also creating new threats […]

            Detailing security provisions within a performance specification

            The demand for connected IoT devices is increasing. Buoyed by the productivity, security and efficiency benefits, firms worldwide have been flocking to install the latest IP technologies on their IT networks. However, this has often been done with little thought to the security ramifications. That is perhaps why new vulnerabilities are being reported all too […]