• February
    06

    An information rupture, or information spill, is a security criterion in which protected information is hacked into or stolen by unapproved watchers. An information rupture is not quite the same as data loss which is when information can never again be retrieved on account of hardware failure, deletion or any other reason. On the other…

  • December
    11

    Cyber Security has taken on very portending undertones with fraudsters hacking their way into the backend system and sneaking data and vital company statistics that prove perilous in the long run. Latest data has it that 60 % of small businesses that have been victimized by cyber threats have folded up within six months of…

  • November
    16

    Cyber Security has come from relative obscurity into the limelight with repeat incidents of nefarious cyber attacks that have left the economy reeling under its impact. There are certain obnoxious elements that teach people to mount ransomware attacks and phishing attacks on the web too. The individual hackers have come to understand the flourishing evils…

  • August
    27

    Many companies are extending the reach of their networks to incorporate wireless products into their repertoire of devices. This makes the network quite vulnerable to external intruders and also complicates matters regarding the protection of the network from unauthorised access. Typically network managers implement counter-security measures to enhance security. Having said that, the question of…

  • August
    22

    Data lake and data warehouse are two types of repository for storing big data. However, this is where the similarity ends, since in general, a data lake has a flat architecture and is best suited to unstructured data, whereas data in a data warehouse is structured, and has data stored in files or folders. The…

  • August
    22

    It’s time for you to install a cybersecurity solution well before you’ve noticed the warning signs that your computer is behaving oddly or you have become privy to some unknown files residing on your computer. It is also far too late to take action, once you hear that your competitor is a party to information…

  • August
    20

    Data Management Strategy is not without its share of challenges; below we highlight seven that you may encounter during the development of your data management strategy. Challenge #1: Insufficient Comprehension and Acknowledgment of Big Data In many cases, organisations neglect to know even the pure basics of what big data is, its advantages, the foundations…

  • August
    06

    Data has to be current and relevant and should take your business from zero to infinity.

  • July
    11

    Published by CIO Staff/IDG, 9 July 2019. Tech execs discuss how they’re making better use of and protecting their data in a hybrid cloud world. Data is the lifeblood of any modern digital business. Without it, organisations can’t do the analysis they need to inform their thinking about new products and services that will provide…

Categories