IT Managers: How to Protect Your Users Against Ransomware

The best way to protect yourself, your users and your business against ransomware is by setting up a proactive defence. The ransomware statistics paint a frightening picture for anyone in charge of IT: In Q3 2016 alone, 18 million new malware samples were captured. Source: Panda Labs   What that means is that the criminals…

Cibecs Joins Silicon Valley Top 20

Cibecs Joins Silicon Valley Companies to be Listed on Top 20 Most Promising Storage Solution Providers of 2016 Cibecs, a leading South African endpoint backup, protection and security solution, has been recognised as one of the 20 Most Promising Storage Solutions of 2016 by CIO Review. The list, compiled by industry insiders, highlights leading global…

4 Signs You Need a New Endpoint Data Backup Solution

With more workers depending on laptops it is more important than ever to ensure that the work protected and stored on those devices is backed up and protected. Forrester Research says that 45% of corporate executives don’t follow policies for data use and handling. Underlining how at risk almost half of a business’s data actually…

Data Security

Keeping data safe with remote wipe

Businesses of any size need to be prepared to handle worst-case scenario when it comes to protecting company data. The loss or theft of laptops and desktop are real threats, an employee could have left a laptop with confidential work information at a coffee shop, or have it stolen on a business trip. Another very…

Warning: Job applications distribute ransomware

The latest ransomware to plague German companies is, a malware program called, Petya which overwrites the master boot record (MBR) of infected computers, leaving the operating systems in an un-bootable state. Typically the master boot record code is stored in the first sectors of a hard disk drive. This code contains information about the disk’s…

The gaping hole in your IT security

IT security and data breaches have been getting more attention in the IT security media lately, highlighting the importance of strong password security measures and the need for complete data protection. Despite this employees are not putting security first when it comes to their work or passwords.   A survey conducted by Vanson Bourne showed…

How secure is your IT perimeter?

For a long time, protecting the IT perimeter meant throwing up a barrier on your network, preventing, or at least attempting to keep outsiders at bay. It was relatively simple, for the most part, it was one access point in one location to protect. Today’s IT Perimeter Today that IT perimeter has expanded, today that…

4 Signs You Need a New Endpoint Data Backup Solution

With more workers depending on laptops it is more important than ever to ensure that the work protected and stored on those devices is backed up and protected. Forrester Research says that 45% of corporate executives don’t follow policies for data use and handling. Underlining how at risk almost half of a business’s data actually…

Computer security for data protection

Computer security is vital for businesses, without it valuable business information is vulnerable to attacks from hackers and even competitors.  To be effective computer security needs to be layered so that any vulnerabilities are protected. These are some layers of security that you can add to your business’s infrastructure. The principle of least privilege The…

Discover how easy endpoint data protection can be