Two ways technology is bad for your employees

Using technology to make a business more efficient and effective is vital to the growth and sustainability of the organisation. However, while it can make a business more efficient, it’s essential to remember that technology can also create an unfriendly workplace and even prevent users from getting work done. Speed of Work Technology helps to…

4 Signs You Need a New Endpoint Data Backup Solution

With more workers depending on laptops it is more important than ever to ensure that the work protected and stored on those devices is backed up and protected. Forrester Research says that 45% of corporate executives don’t follow policies for data use and handling. Underlining how at risk almost half of a business’s data actually…

CIO and compliance

The Chief Information Officer (CIO) plays a crucial part in assisting with compliance within organisations. The IT department provides technology resources and skills that are needed by corporate compliance officers when conducting projects that assist in keeping their company in line with laws and regulations. The problem is that compliance officers often have to rely on other departments…

Data Security

4 Signs You Need a New Endpoint Data Backup Solution

With more workers depending on laptops it is more important than ever to ensure that the work protected and stored on those devices is backed up and protected. Forrester Research says that 45% of corporate executives don’t follow policies for data use and handling. Underlining how at risk almost half of a business’s data actually…

3 ways IT fails at data security

Data security is an ever-moving goal post for IT professionals, with technology, mobility and threats evolving quickly, sometimes important aspects of data protection fall to the wayside. Tighten the reigns on the data security in your business by identifying if you have missed these three important aspects. 1 Not knowing where data is hosted The US Senate…

Computer security for data protection

Computer security is vital for businesses, without it valuable business information is vulnerable to attacks from hackers and even competitors.  To be effective computer security needs to be layered so that any vulnerabilities are protected. These are some layers of security that you can add to your business’s infrastructure. The principle of least privilege The…

Data protection act: what you need to know

The Data Protection Act 1998 is a British act enforced by the parliament of Great Britain and Northern Ireland.  It was developed to bring British law in line with the European Union’s data protection directive of 1995 which required member states to protect the individual’s fundamental rights and freedoms, explicitly the right to privacy regarding the…

Beware data hijacking from ransomware

Ransomware has grown by 58% in the second quarter of 2015 according to Intel’s 2015 McAfee Labs report. Ransomware is a Trojan malware that gets installed on a device when a user opens an attached zip file. The most prolific of these viruses is CryptoLocker, which has been bombarding South African business and holding their…

Corporate Governance Compliance and Data Protection Acts

  Compliance & Legalities around business Data Protection in South Africa Protecting data correctly and effectively is a paramount business continuity imperative. Not only do organizations with ineffective data protection strategies face the immediate costs and productivity interruption of data loss, they leave themselves vulnerable to data theft, unauthorised access to confidential files and are…

Discover how easy endpoint data protection can be