• April
    12

    In this technology-driven world, anything is possible. With the advancement in technologies, there is an increase in the threat of cybercrimes such as hacking, identity theft, data breaching, social engineering, etc. When we hear the term cybercrime, we associate it with large organizations and business houses. But the truth is cybercrime does not discriminate between…

  • January
    29

    Picture this. It’s Sunday morning and you’re hanging out at your nearby café utilizing the free Wi-Fi to ramp up with a couple of assignments you couldn’t exactly get to during your bustling week. Sound commonplace? This is an average situation for a large number of us, however, did you realize you may be uninformed…

  • October
    21

    In order to keep data secure and malicious agents at bay, it is important to practise this five-steps guide that will secure your perimeter from being devastated. With new roles being attributed to employees and changes in leadership, data security is very much palpable. New security end-points including employee information, customer payment information or business…

  • October
    17

    It has been seen on many occasions that when an organization says that their Data Security is very secure with no data leaks, it is proved otherwise. Massive volumes of data are compromised every month suggesting the opposite. This goes to show that businesses are slow to react to the upcoming cyber crime threats and…

  • August
    22

    It’s time for you to install a cybersecurity solution well before you’ve noticed the warning signs that your computer is behaving oddly or you have become privy to some unknown files residing on your computer. It is also far too late to take action, once you hear that your competitor is a party to information…

  • August
    20

    Data Management Strategy is not without its share of challenges; below we highlight seven that you may encounter during the development of your data management strategy. Challenge #1: Insufficient Comprehension and Acknowledgment of Big Data In many cases, organisations neglect to know even the pure basics of what big data is, its advantages, the foundations…

  • April
    09

    First published by Mark Jow, Commvault, 27 March 2019 Mark Jow shares some points that organizations should consider when analysing whether data protection processes and strategies are sufficient to meet the differing requirements of disaster recovery and data security. In today’s digital economy, simply capturing and storing data is no longer enough. In order to…