IT Managers: How to Protect Your Users Against Ransomware

The best way to protect yourself, your users and your business against ransomware is by setting up a proactive defence. The ransomware statistics paint a frightening picture for anyone in charge of IT: In Q3 2016 alone, 18 million new malware samples were captured. Source: Panda Labs   What that means is that the criminals…

Cibecs Joins Silicon Valley Top 20

Cibecs Joins Silicon Valley Companies to be Listed on Top 20 Most Promising Storage Solution Providers Cibecs, a leading South African endpoint backup, protection and security solution, has been recognised as one of the 20 Most Promising Storage Solutions by CIO Review. The list, compiled by industry insiders, highlights leading global technology providers that offer effective…

4 Signs You Need a New Endpoint Data Backup Solution

With more workers depending on laptops it is more important than ever to ensure that the work protected and stored on those devices is backed up and protected. Forrester Research says that 45% of corporate executives don’t follow policies for data use and handling. Underlining how at risk almost half of a business’s data actually…

Compliance & Risk

Brexit & Data Privacy Outside of the EU

With Brexit, businesses both inside and outside of the UK will have to navigate a new path when it comes to moving data to and from Britain to countries in the EU. The  European Union (EU) General Data Protection Regulation (GDPR) is  arguably one of the most significant pieces of privacy law yet enacted, creating…

HIPAA security rule – What you need to know for compliance

The Health Insurance Portability and Accountability Act (HIPAA) contains regulation and requirements associated with the protection of health-related data. There are four rules that organisations need to meet to be compliant in accordance with the act. In this article, we will be looking at the HIPAA Security rule.   The HIPAA security rule necessitates suitable…

Data protection act: what you need to know

The Data Protection Act 1998 is a British act enforced by the parliament of Great Britain and Northern Ireland.  It was developed to bring British law in line with the European Union’s data protection directive of 1995 which required member states to protect the individual’s fundamental rights and freedoms, explicitly the right to privacy regarding the…

Corporate Governance Compliance and Data Protection Acts

  Compliance & Legalities around business Data Protection in South Africa Protecting data correctly and effectively is a paramount business continuity imperative. Not only do organizations with ineffective data protection strategies face the immediate costs and productivity interruption of data loss, they leave themselves vulnerable to data theft, unauthorised access to confidential files and are…

Are you prepared for December data loss risks?

Addressing the increased data loss risks of the December Holidays. December has been identified as one of the highest-risk months of the year when it comes to data loss. With the majority of business users utilising laptops as their primary device, and certainly the C-level execs all having a large amount of mobile data –…

State of SA Business Data Protection

Survey Results: Only 26% of South African Companies are Preparing For POPI Bill Our recent survey of over 300 South African companies revealed that only 26% are actively looking for technologies and adjusting processes to ensure they comply with the Protection of Personal Information Bill, which is expected to be promulgated in 2013.

Discover how easy endpoint data protection can be