IT Managers: How to Protect Your Users Against Ransomware

The best way to protect yourself, your users and your business against ransomware is by setting up a proactive defence. The ransomware statistics paint a frightening picture for anyone in charge of IT: In Q3 2016 alone, 18 million new malware samples were captured. Source: Panda Labs   What that means is that the criminals…

Cibecs Joins Silicon Valley Top 20

Cibecs Joins Silicon Valley Companies to be Listed on Top 20 Most Promising Storage Solution Providers Cibecs, a leading South African endpoint backup, protection and security solution, has been recognised as one of the 20 Most Promising Storage Solutions by CIO Review. The list, compiled by industry insiders, highlights leading global technology providers that offer effective…

4 Signs You Need a New Endpoint Data Backup Solution

With more workers depending on laptops it is more important than ever to ensure that the work protected and stored on those devices is backed up and protected. Forrester Research says that 45% of corporate executives don’t follow policies for data use and handling. Underlining how at risk almost half of a business’s data actually…

Cyber Security | Data Vulnerability

Data loss from internal threats, negligence and/or accidents was rated the “next big threat” in Cyber Security – how do enterprises address this issue?

Cyber Security Threats: Reduce risk with endpoint data backup

Cyber Security: Reducing risk with user data backup Introduction: Cyber security threats and endpoint backup The cyber threat landscape has matured significantly over the past 10 years, due in part to the proliferation of new technologies and an increasing reliance on the Internet for personal and business needs. Not only are Governments looking for ways…

Data Encryption: 8 Winning strategies for endpoint data continuity #8

An effective endpoint data continuity strategy includes a data backup solution with secure data encryption.

Compliance through Effective Data Protection

Gaining Corporate Governance Compliance through Effective Business Data Protection Having an endpoint solution that ensures GRC and compliance is increasingly important due to stringent regulations and the legal consequences that can result from negligence. An organization’s inability to comply often leads to reputational damage and can mean serious consequences if confidential data is lost and…

Reduce Storage Requirements: 8 Winning strategies for endpoint data continuity

Use smarter storage to ensure endpoint data protection in your enterprise.

Automated Backup, Reduced Support, Minimized Bandwidth Cost

Effective endpoint data continuity means reducing required end user support and minimizing bandwidth costs

Discover how easy endpoint data protection can be