IT Managers: How to Protect Your Users Against Ransomware

The best way to protect yourself, your users and your business against ransomware is by setting up a proactive defence. The ransomware statistics paint a frightening picture for anyone in charge of IT: In Q3 2016 alone, 18 million new malware samples were captured. Source: Panda Labs   What that means is that the criminals…

Cibecs Joins Silicon Valley Top 20

Cibecs Joins Silicon Valley Companies to be Listed on Top 20 Most Promising Storage Solution Providers Cibecs, a leading South African endpoint backup, protection and security solution, has been recognised as one of the 20 Most Promising Storage Solutions by CIO Review. The list, compiled by industry insiders, highlights leading global technology providers that offer effective…

4 Signs You Need a New Endpoint Data Backup Solution

With more workers depending on laptops it is more important than ever to ensure that the work protected and stored on those devices is backed up and protected. Forrester Research says that 45% of corporate executives don’t follow policies for data use and handling. Underlining how at risk almost half of a business’s data actually…

Compliance & Risk

Outlook Email Backup / PST Backup with Cibecs

Outlook Email Backup with Cibecs Cibecs software is built to address business data backup requirements and provides IT with an effective tool for protecting Outlook email from loss and backing up large PSTs. Cibecs is optimised for easy Outlook email backup and PST backup, and makes recovering all emails and PSTs and an entire Outlook…

Corporate Governance Compliance Checklist – Data Protection

Data Protection & Corporate Governance Compliance Checklist for Business IT Compliance & Legalities around Data Protection for Businesses: A Corporate Governance Compliance checklist Corporate Governance Compliance and the requirements around Data Protection have become increasingly important to businesses globally due to the consequences of being non-compliant, as well as the often devastating results of data…

Data Protection: Big Changes in EU Data Protection Regulations

When it comes to cutting costs and, especially, IT resource spend – a measured, surgical approach that seeks to maximize output and streamline processes will stand any organization in far better stead than, say, cutting costs across the board just for the sake of it.

What SA Government IT needs for improved Auditor General reports

Most businesses, enterprises and organizations still experience a large variety of issues with user data backups. The main issue, of course, is that backups are not reliable, making data recovery a tedious task (if possible at all).

The Healthcare Cyber Security headache: Healthcare Record Theft

Healthcare Cyber Security: Healthcare CIOs and CSOs must improve The state of healthcare cyber security & data protection: According to Wikipedia “there were 380 major cyber security data breaches in the United States in 2011, involving 500 or more patients’ records listed on the website kept by the United States Department of Health and Human…

The cost of HIPAA Violation: Over $17 Million for Blue Cross Blue Shield

The recent penalty on BlueCross BlueShield to the federal government is a warning to the Healthcare & Insurance industries- ensure effective data protection

Discover how easy endpoint data protection can be