IT Managers: How to Protect Your Users Against Ransomware

The best way to protect yourself, your users and your business against ransomware is by setting up a proactive defence. The ransomware statistics paint a frightening picture for anyone in charge of IT: In Q3 2016 alone, 18 million new malware samples were captured. Source: Panda Labs   What that means is that the criminals…

Cibecs Joins Silicon Valley Top 20

Cibecs Joins Silicon Valley Companies to be Listed on Top 20 Most Promising Storage Solution Providers Cibecs, a leading South African endpoint backup, protection and security solution, has been recognised as one of the 20 Most Promising Storage Solutions by CIO Review. The list, compiled by industry insiders, highlights leading global technology providers that offer effective…

4 Signs You Need a New Endpoint Data Backup Solution

With more workers depending on laptops it is more important than ever to ensure that the work protected and stored on those devices is backed up and protected. Forrester Research says that 45% of corporate executives don’t follow policies for data use and handling. Underlining how at risk almost half of a business’s data actually…

Business & Opinion

Cibecs Joins Silicon Valley Top 20

Cibecs Joins Silicon Valley Companies to be Listed on Top 20 Most Promising Storage Solution Providers Cibecs, a leading South African endpoint backup, protection and security solution, has been recognised as one of the 20 Most Promising Storage Solutions by CIO Review. The list, compiled by industry insiders, highlights leading global technology providers that offer effective…

The Malvertising Threat to Data Security

  A global malvertising ring that used sophisticated techniques has been shut down. The threat went unnoticed for months and exploited millions of computers. Malvertsing is the use of online advertising to spread malware, by injecting malicious or malware-laden advertisements into legitimate online advertising networks and web pages. This latest large-scale attack has been made…

Brexit & Data Privacy Outside of the EU

With Brexit, businesses both inside and outside of the UK will have to navigate a new path when it comes to moving data to and from Britain to countries in the EU. The  European Union (EU) General Data Protection Regulation (GDPR) is  arguably one of the most significant pieces of privacy law yet enacted, creating…

Data Protection: Big Changes in EU Data Protection Regulations

When it comes to cutting costs and, especially, IT resource spend – a measured, surgical approach that seeks to maximize output and streamline processes will stand any organization in far better stead than, say, cutting costs across the board just for the sake of it.

IT Support Costs: How your business can reduce IT support spend

When it comes to cutting costs and, especially, IT resource spend – a measured, surgical approach that seeks to maximize output and streamline processes will stand any organization in far better stead than, say, cutting costs across the board just for the sake of it.

Does BYOD bring Y.M.C.A into business data security?

The cost and threat of BYOD to business data security. You’d be forgiven for thinking that the Bring-your -own-device (BYOD) movement is rivalled only by the spirit of 60s-style free love, the “Arab Spring” uprisings and the sheer hedonism of a Cape Town summer –so feverishly the beating of its drum from supporters the world…

Discover how easy endpoint data protection can be