Home » IT Security

IT Security

The Zero Trust Security Framework Explained: What it Means to Your Organization

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

A Brief View of Data Protection Laws in Africa

Image sourced from Pixabay In Africa, various jurisdictions have data protection laws to secure the transfer of personal data between entities. These laws largely affect multinational companies that do international trade. Organizations with a global footprint require personal data transfer across countries, and these data protection laws must be complied with to transfer data across borders legally. Organizations around the world are increasingly investing in the African market. To lawfully carry out business operations in Africa, it is imperative for organizations to understand the data protection landscape in Africa. Data protection laws are proposed by governments not to hinder personal data transfer by organizations but to regularize how organizations handle personal data. These laws ...

3 Technologies that are Reshaping the Banking Industry in Africa

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

4 Network Security Challenges to Watch Out For

Sourced from Travellers The growing reliance on hybrid IT infrastructures that support cloud-based applications and a largely remote workforce is creating network security and performance challenges for many enterprises. According to research from a recent white paper by The Enterprise Strategy Group (ESG), 85 percent of organizations believe network security is more difficult today than it was two years ago. Entitled “Network Security Without Borders: A Common Technology Stack for Network Security and Operations,” the study cites several factors that contribute to the growing challenge of network security. Namely, here are 4 Network Security Challenges to Watch Out For: Increasingly Sophisticated Cyberthreat Tools Monitoring cyberthreats; correlating cyber threat intelligence with interna...

Vodacom Partners with Digital Parks Africa to Expand Data Centre Footprint

/* custom css */ .tdi_4_440.td-a-rec-img{ text-align: left; }.tdi_4_440.td-a-rec-img img{ margin: 0 auto 0 0; } For more than a decade, Vodacom Business has provided premium data centre facilities to businesses across the country for hosting and managing information technology (IT) services. Now, in partnership with Digital Parks Africa, a provider of wholesale data centres for large-scale data centre needs, Vodacom Business can further support clients’ off-premise data centre requirements while offering the highest IT standards and services. Today, organisations depend on the effective use of technology more than ever.  Not only to support ongoing business processes but also to drive new sources of competitive differentiation. Despite the rise of digital services, many organisations ...

IT Teams Facing Cyber Threats in 2020 – 5 Vital Insights

Image sourced from CIO. “Around the world, 2020 was an unprecedented year for IT teams,” said Chester Wisniewski, principal research scientist, Sophos. IT professionals played a vital role in helping organizations to keep going despite the restrictions and limitations necessitated by COVID-19. Among other things, they enabled education institutions to move learning online, retailers to switch to online transactions, healthcare organizations to deliver digital services and care under incredibly tough circumstances, and ensured public entities could continue to provide essential services. Much of this will have been done at high speed, with limited equipment and resources available and while facing a rising tide of cyberattacks against the network, endpoints and employees. To say things were...

How Using Cloud Can Increase Security for Remote Working During the Pandemic

Sourced from Tapscape The cloud can enable organisations to quickly scale out enhanced security to a suddenly remote workforce, as part of efforts to ensure business continuity and disaster recovery – this is according to Patrick Grillo, Senior Director and Solutions Marketing at Fortinet. The pandemic had created unique challenges for employers and employees across all sectors around the world, with Varun Kukreja, Senior Program Manager – IT Security MEA, IDC Middle East, Africa, & Turkey, saying securing the teleworker had become a top priority, with some 90% of organisations looking to provide staff with secure access to IT services and applications. The pandemic had also accelerated digital transformation, he says, with an IDC Meta survey interim results revealing that some 56% of ...

6 Simple Ways to Help the Elderly Safely Connect Online during Lockdown

For the last few weeks, much has changed in our lives. People have been urged to only leave home if it is absolutely necessary, such as to shop for essential items or to seek medical care. However, there are plenty of technologies available to help us maintain the usual rhythm of our daily lives. For instance, food delivery services on offer allow us to order grocery items without having to leave the house. Unfortunately, not everybody is able to take advantage. People who are at greatest risk and need these services most – the elderly – can often experience some difficulties in using modern tools that many of us otherwise take for granted. To stay in touch and buy the essentials, older generations are having to learn how technologies work and become more comfortable spending more time tha...