Cybersecurity Tips for Employees: Secure Website Browsing. Part 6 of 7.
The Top Browser Threats When end users venture out onto the Internet, it’s easy to get tangled up in the vast web of threats lurking
The Top Browser Threats When end users venture out onto the Internet, it’s easy to get tangled up in the vast web of threats lurking
Mobile Threats Jeopardizing Company Data Mobile security is increasingly becoming a big concern as more and more companies adopt Bring Your Own Device (BYOD) environments,
Low Security Account Credentials Although it should be common sense, employees need to avoid the use of passwords that are easy for hackers to guess.
Email Threats Social Engineering Inboxes and VoiceMail Social engineering is non-technical, malicious activity that exploits human interactions to obtain information about internal processes, configuration and
Chapter 1: Physical Security Precautions Keep a Clean Desk It makes sense and sounds so simple, but keeping a clean desk is often overlooked when
A complete endpoint security solution for your business’ needs. Backed by a US$1m ransomware warranty. Is your business looking for threat protection, remediation, incident response
The Complete Guide to Secure Behavior Online and in the Office. The Need to Educate Employees on Cybersecurity. When developing cybersecurity strategies, businesses typically focus
5 Tips for a More Secure Office When thinking about securing your business from cyber threats, the mind quickly turns to phishing, hacks and viruses,
City Power confirmed on Twitter this morning that it has been hit by a ransomware attack which compromised its web server, databases, applications, and network.
Why Your GRC Framework is Going Nowhere Slowly by Khululekile Sixaba Lexi is a no-nonsense compliance officer that has never had a problem embracing
Your business depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it’s probably impossible
Going through an audit is rarely an enjoyable business experience. Whether it comes from inside or outside the company, an audit can feel as though
1. Implement Automation Where It Makes Sense Not every business process is a good fit for automation, so each business must decide which processes are
While the actual date of when the Protection of Personal Information Act will finally come into effect is still a mystery, the act, also known as the PoPI Act, is becoming more prominent in conversations and business meetings. So, what is this Act all about and is it good or bad for businesses?
Electronic Filing Made Simple. Not all document management solutions blend electronic filing ease of use with powerful functionality as brilliantly as M-Files. After all,…
Is your organization looking to improve its document and information management practices, and is considering an Enterprise Content Management (ECM) system? Implementing an ECM system can be an efficient solution to content problems. However, it can only reach its full potential of increased efficiency if the organization has effectively done…
Digital workplace solutions such as Office 365 and G Suite have focused, first and foremost, on easier (remote) access of content and easier sharing of content. And collaboration with these tools is efficient, but there’s a catch… The tools are fantastic if all the data resides in the same cloud repository within these systems, but this is rarely the case.
This website uses cookies to ensure you get the best experience on our website. By using our website you agree to our Privacy Policy.
Recent Comments