IT Managers: How to Protect Your Users Against Ransomware

The best way to protect yourself, your users and your business against ransomware is by setting up a proactive defence. The ransomware statistics paint a frightening picture for anyone in charge of IT: In Q3 2016 alone, 18 million new malware samples were captured. Source: Panda Labs   What that means is that the criminals…

Cibecs Joins Silicon Valley Top 20

Cibecs Joins Silicon Valley Companies to be Listed on Top 20 Most Promising Storage Solution Providers of 2016 Cibecs, a leading South African endpoint backup, protection and security solution, has been recognised as one of the 20 Most Promising Storage Solutions of 2016 by CIO Review. The list, compiled by industry insiders, highlights leading global…

4 Signs You Need a New Endpoint Data Backup Solution

With more workers depending on laptops it is more important than ever to ensure that the work protected and stored on those devices is backed up and protected. Forrester Research says that 45% of corporate executives don’t follow policies for data use and handling. Underlining how at risk almost half of a business’s data actually…

Latest Posts

How secure is your IT perimeter?

For a long time, protecting the IT perimeter meant throwing up a barrier on your network, preventing, or at least attempting to keep outsiders at bay. It was relatively simple, for the most part, it was one access point in one location to protect. Today’s IT Perimeter Today that IT perimeter has expanded, today that…

Announcing Cibecs Version 8

Cibecs endpoint backup, security and protection, announced its latest release, Version 8, featuring an all-new user interface (UI). The newest release of the software squarely place Cibecs as a forerunner in the endpoint data protection space. Inspired by simplicity, Cibecs designed the new UI to improve usability, centralise data protection and increase productivity. With Version…

4 Signs You Need a New Endpoint Data Backup Solution

With more workers depending on laptops it is more important than ever to ensure that the work protected and stored on those devices is backed up and protected. Forrester Research says that 45% of corporate executives don’t follow policies for data use and handling. Underlining how at risk almost half of a business’s data actually…

The true cost of a data migration project

Data migration projects are something that all IT departments are familiar with, however they are also some of the most time intensive tasks that IT has to deal with. Technology moves fast and most businesses try to keep up with it by having regular updates to both hardware and software every few years. Typically businesses these…

Computer security for data protection

Computer security is vital for businesses, without it valuable business information is vulnerable to attacks from hackers and even competitors.  To be effective computer security needs to be layered so that any vulnerabilities are protected. These are some layers of security that you can add to your business’s infrastructure. The principle of least privilege The…

Data protection act: what you need to know

The Data Protection Act 1998 is a British act enforced by the parliament of Great Britain and Northern Ireland.  It was developed to bring British law in line with the European Union’s data protection directive of 1995 which required member states to protect the individual’s fundamental rights and freedoms, explicitly the right to privacy regarding the…

Discover how easy endpoint data protection can be