Kevin Halkerd

Digital Transformation’s growing attack surface

0
Traditional business models need to be reimagined as digital transformation continues to enable businesses to innovate and find new ways to not only leverage...
Dana Eitzen from Canon

Why the office of the future will demand stronger security measures

0
In today's age of innovation, enterprises are understandably concerned with how new technologies will impact the way jobs are performed in the next few...
Simon Colman from Digital Distribution at SHA

What to Know Before Giving Into Ransom Demands

0
Despite small and medium enterprises (SMEs) becoming increasingly popular targets for cybercriminals, many remain completely unprotected in this regard. As a result, when faced...
AES by LAWTrust

Advanced Electronic Signatures – A Technology whose time has come

0
Part 2 - In my previous article on the subject (available here), I dealt with the arguments against using Advanced Electronic Signatures (Aes), and the...
AES by LAWTrust

Advanced Electronic Signatures – A Technology whose time has come

0
Since its inclusion in the Electronic Communications and Transactions Act (ECT Act), some 16 years ago, the Advanced Electronic Signature has been treated a...
Liberty data breach overview by Redstor

Security breach puts Liberty at risk

0
While established insurance firm Liberty continues to throw everything it has at an investigation into the recent major data breach, the incident is a...
John Mc Loughlin of J2 Software

Top 5 tips for Preventing Invoice Fraud

0
Invoice fraud is becoming more common in South Africa, perhaps in response to worsening economic conditions. Detecting and successfully prosecuting this type of crime...

Email governance and compliance simplified with MailTrack

0
In the past, lawyers concerned with retaining the privacy and confidentiality of client information restricted the use of email for conducting business. It is...