Results for encrypted data

News

Remediating a ransomware attack in SA costs billions - Sophos report
Remediating a ransomware attack in SA costs billions - Sophos reportArticle

The average cost of fixing a ransomware attack in South Africa costs R6.4bn, according IT security company Sophos...

30 Apr 2021

How to secure your remote workforce
How to secure your remote workforceArticle

For many organisations, the need to suddenly enable a remote workforce at scale has overtaken long-term plans they may have had to gradually extend remote work capacity...

Doros Hadjizenonos 20 Mar 2020

What can we do to stop ransomware attacks on governments?
What can we do to stop ransomware attacks on governments?Article

The City of Johannesburg recently became the latest victim of high-profile ransomware attacks specifically targeting government departments...

Simeon Tassev 12 Dec 2019

Ensuring the safety of your critical data
Ensuring the safety of your critical dataArticle

Ensuring that your data is safe at all times is one of the top priorities of nearly every company out there...

Nikola Baldikov 14 Oct 2019

Stop navel gazing at encryption
Stop navel gazing at encryptionArticle

We are so enthralled by our own brilliance in cryptography that we forget that most data at rest - tucked away inside databases - is unencrypted...

Lori MacVittie 2 Jul 2019

Less green through more data protection?
Less green through more data protection?Article

In IT, there are two goals that contradict each other at first glance...

Hayden Sadler 9 Apr 2019

The growing menace of cryptocurrency exchange hacks
The growing menace of cryptocurrency exchange hacksArticle

There are many reasons cryptocurrencies are inherently attractive to hackers. One of the biggest reasons is a lack of heavy regulation...

Simon McCollough 29 Mar 2019

Do not underestimate the challenge of securing SD-WAN
Do not underestimate the challenge of securing SD-WANArticle

Historically, the branch office of an organisation was the red-headed stepchild of the network, but digital transformation has changed all of that...

Doros Hadjizenonos 20 Feb 2019

New, intelligent storage strategies are vital
New, intelligent storage strategies are vitalArticle

Data protection is becoming a priority as governments roll out new data security regulations with eye-watering penalties for non-compliance...

Hayden Sadler 6 Feb 2019

What 2018 taught businesses about data protection
What 2018 taught businesses about data protectionArticle

Around this time last year, commentators across the industry predicted that 2018 was going to be the 'year of data protection', and it was...

Dan Shprung 21 Jan 2019

Steps to securing cloud data
Steps to securing cloud dataArticle

Leadership is essential when it comes to ensuring the security of data stored in the cloud...

Neil Cosser 31 Oct 2018

It's time to take note of quantum computing
It's time to take note of quantum computingArticle

A growing start-up quantum computing ecosystem is attracting hundreds of millions of investor dollars. Forrester believes it is time for IT leaders to pay attention...

17 Oct 2018

Future of real estate: Could we buy property with bitcoins?
Future of real estate: Could we buy property with bitcoins?Article

You can already use bitcoins to buy everything from pizza to a manicure, but could virtual currencies become a standard trading resource to purchase real estate...?

Chantalle Bell 18 Sep 2018

Boris Dzhingarov
How to prevent staff from compromising your data securityArticle

No matter what size your business is, if you have staff, they're sending emails to customers, clients, and other employees. This puts your data security at risk...

Boris Dzhingarov, Issued by Monetary Library 7 Aug 2017

Do you really WannaCry? A simple guide on how to get hacked
Do you really WannaCry? A simple guide on how to get hackedArticle

You've probably read endless articles about how to protect yourself online. And that's fine if you're a chicken, or you want to plaster your life with bubble wrap...

Melissa Viljoen 13 Jul 2017

Boris Dzhingarov
Secure the social media accounts of your businessArticle

Social media privacy is not a term that resonates only with personal internet profiles and should be taken seriously by companies that decide to take their marketing into the online world...

Boris Dzhingarov, Issued by Monetary Library 1 Dec 2016

(c) tuthelens -
Why point-of-sale breaches remain a lucrative endeavour for cybercriminalsArticle

Most of the customers in the queue for Wendy's, in Nebraska, only intended to grab a burger or a coffee. Luckily for the customers - they did manage to get their food and drinks. But unluckily, by the time they left the café, cybercriminals had also accessed the point-of-sale (POS) system and stolen thousands of card records...

7 Nov 2016

Crypto-ransomware approaches epidemic status
Crypto-ransomware approaches epidemic statusArticle

The number of users attacked with encryption ransomware is soaring, with 718,536 users hit between April 2015 and March 2016: an increase of 5.5 times...

24 Jun 2016

Drones sales reach for the sky
Drones sales reach for the skyArticle

Consumer drone sales will reach almost 4 million this year, rising to 16 million annually by 2020 but new research highlights consumers' privacy concerns...

11 Nov 2015

Cybercriminals stalk SA
Cybercriminals stalk SAArticle

Crafty cybercriminals are stalking South Africans online, studying their every move via their e-mail accounts - and stealing millions...

10 Nov 2015

Top 10 website threats you should know about
Top 10 website threats you should know aboutArticle

If you are building and running your own websites or have an online business, the cyber-world can be a dark and daunting place...

15 Sep 2015

Lack of cloud backups can be an expensive mistake
Lack of cloud backups can be an expensive mistakeArticle

The uptake of pure cloud backup by smaller businesses has surged over the past two years, as the idea of saving company data to the cloud...

31 Jul 2015

Carey van Vlaanderen
Criminals are targeting SMEs to file fraudulent tax returnsArticle

It is a well-known fact that attackers like to find low hanging fruit in order to get into an organisation's juiciest targets...

Carey van Vlaanderen 22 Jul 2015

No more data loss cover-ups for SA business
No more data loss cover-ups for SA businessArticle

South Africa has an historical culture of non-disclosure and cover-ups when it comes to data loss and data breaches, but the Protection of Personal Information (POPI) Act will force much greater transparency...

Jos Floor 29 Apr 2015

Aaron Thornton
Three security issues to consider when using public Wi-FiArticle

Public Wi-Fi is almost everywhere nowadays - and while it's convenient to use, there are hidden security risks you should know about...

Aaron Thornton 14 Apr 2015

Martin Doyle
Using customer data? Start with clean dataArticle

Office, the high street shoe retailer, has had something of a lucky escape when it comes to its data quality...

Martin Doyle 30 Jan 2015

Medical staff and patients demand Wi-Fi access in hospitals
Medical staff and patients demand Wi-Fi access in hospitalsArticle

Wi-Fi networks designed specifically for hospital use are catching on around the world, as both staff and patients see the multiple benefits of secure network access, said Networks Unlimited.

15 Oct 2014

EMC Digital Universe study results announced
EMC Digital Universe study results announcedArticle

EMC Corporation has announced results of the seventh EMC Digital Universe study, entitled "The Digital Universe of Opportunities: Rich Data and the Increasing Value of the Internet of Things".

15 Apr 2014

Canada shuts tax filing website over 'Heartbleed' bug
Canada shuts tax filing website over 'Heartbleed' bugArticle

OTTAWA, CANADA: Canada's tax agency shut its website on Wednesday (9 April) after warning that encrypted taxpayer data could be vulnerable to the "Heartbleed" bug.

10 Apr 2014

Small financial, health-care service providers are targets for cybercrime
Small financial, health-care service providers are targets for cybercrimeArticle

Millions of very small businesses with fewer than 20 employees, ranging from dentist's offices, financial advisors, independent legal counsellors, IT consulting firms, and other companies are focused on their core competency and win by that. At the same time many of them can neglect the security of their IT equipment and put their customers, and the future of their businesses, at risk.

19 Nov 2013

Gareth Tudor
Avoiding the consequences of data lossArticle

Protecting data has become of the utmost importance for organisations today, as information if the lifeblood of a business. There are many consequences should sensitive information fall into the wrong hands, however, as the workforce has become increasingly mobile, protecting all of an organisation's data has become more complex and challenging.

Gareth Tudor 29 Aug 2013

Laptop theft exposes Gap's data security gapArticle

USA - Anyone who's applied for employment at clothing retailer Gap may want to keep a close eye on their credit activity for a while. A laptop containing unencrypted personal information on 800,000 applicants has been stolen from a third-party vendor that manages some of the company's data. Gap has issued what's becoming a familiar response: apologies, help lines and a year of free credit monitoring.

Rachel Konrad 2 Oct 2007

Next >
Let's do Biz