Protect less tech savvy elderly from online fraudsters

0
Protect less tech savvy elderly from online fraudsters Estimates suggest that the elderly worldwide lose more than USD$3 billion (around R48 billion) each year to online fraudsters....

As SA’s healthcare security costs soar, physical security should be part...

0
According to Gauteng's Health MEC, security-related expenditure in Gauteng's public hospitals has increased from R655 million in 2022 to a massive R2.54 billion in...

Westcon-Comstor ushers in a new age of secure operations centre

0
Westcon-Comstor Heralds Era of Next-Gen SOC with Local Availability of Palo Alto Networks Cortex XSIAM Johannesburg, South Africa, 26 October 2022: Westcon-Comstor Sub-Saharan Africa, a...

Is your perimeter security the weakest link?

0
Why security really starts at the perimeter of your property Perimeter security as part of a business security system or home security solution is an...

Backdoors and open windows: The need for “baked-in” cybersecurity

0
Backdoors and open windows: The need for “baked-in” cybersecurityBy Deshni Harricharan - Head of Enterprise Sales at SEACOMAs South Africa and the continent continue...

SLVA Cybersecurity and ContraForce partner to offer cutting-edge Security Operations technology...

0
SLVA Cybersecurity and ContraForce partner to offer cutting-edge Security Operations technology for SMEs SLVA Cybersecurity, in collaboration with ContraForce are bringing enterprise-scale cyber security to...

IT Security at the core of Smart Cities

0
IT Security at the core of Smart CitiesBy, Wandile Gumede, Sales Manager - Public Sector at SEACOMSouth Africa is currently in the process of...

SEVEN SUSPECTS ARRESTED AND FOUR FIREARMS RECOVERED SOON AFTER A JEWELLERY...

0
SEVEN SUSPECTS ARRESTED AND FOUR FIREARMS RECOVERED SOON AFTER A JEWELLERY SHOP WAS ROBBED IN CLEARWATER MALL Wahl Bartmann, CEO of Fidelity Services Group has...

 Xperien advocates ethical governance in the refurbished IT industry

0
Xperien advocates ethical governance in the refurbished IT industry Xperien, a leading IT Asset Disposal (ITAD) company, is taking a bold stance on ethical governance...

SCP SECURITY: 5 WAYS TO ESTABLISH IF HOME SERVICE PROVIDER IS...

0
SCP SECURITY: 5 WAYS TO ESTABLISH IF HOME SERVICE PROVIDER IS LEGITIMATE SCP Security, a highly efficient 24/7 Security business providing Armed Response, Alarm Monitoring...

Building a culture of cyber awareness should start at the top

0
Why building a culture of cyber awareness should start at the top No one is immune to the possibility of a cyberattack on their personal...

Protect and secure your data dynamically

0
Protect and secure your data dynamically SLVA CyberSecurity and Active Cypher's data protection and control solution works across all systems, protecting data at rest, in...

Securing the hybrid cloud is a balancing act for SA businesses

0
To protect data and other digital assets in hybrid cloud environments, businesses need to adopt a modernised, flexible and scalable cybersecurity approach. While small...

The human element: Why employee mistakes are the biggest cybersecurity threat...

0
With almost 88% of data breaches being caused by an employee mistake, a strong human risk management programme with regular employee training and cybersecurity...

Leveraging SASE to deliver better security for a hybrid workforce

0
Leveraging SASE to deliver better security for a hybrid workforce Brendan Maccarron, Palo Alto Networks Channel Manager at Westcon-Comstor Sub-Saharan Africa With more than 40% of...

Hayo Joins the GLF to Drive Global Digital Infrastructure Innovation

0
Hayo Joins the GLF to Collaborate with International Connectivity Leaders and Drive Global Digital Infrastructure Innovation Hayo will share insights and collaborate with GLF experts...