IT Managers: How to Protect Your Users Against Ransomware

The best way to protect yourself, your users and your business against ransomware is by setting up a proactive defence. The ransomware statistics paint a frightening picture for anyone in charge of IT: In Q3 2016 alone, 18 million new malware samples were captured. Source: Panda Labs   What that means is that the criminals…

Cibecs Joins Silicon Valley Top 20

Cibecs Joins Silicon Valley Companies to be Listed on Top 20 Most Promising Storage Solution Providers Cibecs, a leading South African endpoint backup, protection and security solution, has been recognised as one of the 20 Most Promising Storage Solutions by CIO Review. The list, compiled by industry insiders, highlights leading global technology providers that offer effective…

4 Signs You Need a New Endpoint Data Backup Solution

With more workers depending on laptops it is more important than ever to ensure that the work protected and stored on those devices is backed up and protected. Forrester Research says that 45% of corporate executives don’t follow policies for data use and handling. Underlining how at risk almost half of a business’s data actually…

Latest Posts

Prevent Employee Data Leaks

Employees represent one of the biggest risks to the security of company data. Whether the risk comes from unintentional data leakage or through  malicious theft of data, companies need to endure that when it comes to data security employees are well informed on how to handle and store data, as well as the repercussions for…

Keeping data safe with remote wipe

Businesses of any size need to be prepared to handle worst-case scenario when it comes to protecting company data. The loss or theft of laptops and desktop are real threats, an employee could have left a laptop with confidential work information at a coffee shop, or have it stolen on a business trip. Another very…

Warning: Job applications distribute ransomware

The latest ransomware to plague German companies is, a malware program called, Petya which overwrites the master boot record (MBR) of infected computers, leaving the operating systems in an un-bootable state. Typically the master boot record code is stored in the first sectors of a hard disk drive. This code contains information about the disk’s…

HIPAA security rule – What you need to know for compliance

The Health Insurance Portability and Accountability Act (HIPAA) contains regulation and requirements associated with the protection of health-related data. There are four rules that organisations need to meet to be compliant in accordance with the act. In this article, we will be looking at the HIPAA Security rule.   The HIPAA security rule necessitates suitable…

The gaping hole in your IT security

IT security and data breaches have been getting more attention in the IT security media lately, highlighting the importance of strong password security measures and the need for complete data protection. Despite this employees are not putting security first when it comes to their work or passwords.   A survey conducted by Vanson Bourne showed…

How secure is your IT perimeter?

For a long time, protecting the IT perimeter meant throwing up a barrier on your network, preventing, or at least attempting to keep outsiders at bay. It was relatively simple, for the most part, it was one access point in one location to protect. Today’s IT Perimeter Today that IT perimeter has expanded, today that…

Discover how easy endpoint data protection can be