0 comments

Almost a third of users do nothing to protect online payments, rely on financial companies for protection

By Staff Writer 5 October 2015

A test conducted by Kaspersky Lab has shown that many users do not know (or know, but do not follow) basic security rules when making online payments or using online banking systems. FULL STORY >

0 comments

How to keep your contact centre protected in a time of cost-cutting

By Staff Writer 18 September 2015

With falling commodity prices and a declining currency, South Africa’s economy is under greater strain than ever before FULL STORY >

0 comments

How SMEs can protect themselves against the R1bn threat of ID fraud

By Staff Writer 18 September 2015

Small and medium enterprises (SMEs) in South Africa need to put robust processes and systems in place if they are to protect themselves against rising incidences of identity theft and other forms of fraud FULL STORY >

0 comments

Gemalto launches Cinterion Secure Element for advanced protection

By Staff Writer 16 September 2015

Gemalto the world leader in digital security, is introducing the Cinterion Secure Element, a tamper-resistant component embedded in industrial Internet of Things (IoT) solutions to enable advanced digital security and lifecycle... FULL STORY >

0 comments

WIN one of five Global Protection 2016 boxsets from Panda Security

By Staff Writer 2 September 2015

Valued at R700 each, Panda Security is giving five lucky TechSmart readers the chance to win one of its Global Protection 2016 Boxsets. FULL STORY >

0 comments

What is an employment contract and how does it protect your rights?

By Staff Writer 20 August 2015

When a company hires you, it should give you a fair and understandable employment contract that sets out the terms and conditions of your employment. FULL STORY >

0 comments

Data is the new oil - so how are we protecting it?

By Staff Writer 17 August 2015

What motivates the bad guys? Hackers are driven to our data for two, simultaneous reasons: they are after the “easy money”. FULL STORY >

0 comments

Fortinet brings high performance advanced protection to mid-market and enterprise organizations

By Staff Writer 6 August 2015

FortiGate 400D and FortiGate 900D Continue to Expand the FortiASIC-NP6-Based FortiGate Platform; Delivering Best-in-Class Cybersecurity to Mid-Market Organizations and Large Branch Offices FULL STORY >

0 comments

How to keep your data safe on your mobile device

By Staff Writer 31 July 2015

Smartphones these days are more expensive and powerful than ever, making them prime targets for theft. To that end, HTC has offered some tips to secure your device if lost or stolen. FULL STORY >

0 comments

Income Protection Policies – clarifying the consequences to the tax treatment

By Staff Writer 16 July 2015

As of the latest tax year (starting 1 March 2015), companies are still struggling to come to grips with the consequences of the changes to the rules in respect of premiums paid to income protection policies for... FULL STORY >

0 comments

Gabsten Technologies launches its Cloud Protect backup as a service solution

By Staff Writer 16 July 2015

Gabsten Technologies has launched their managed backup as a service offering CloudProtect to the South African market. CloudProtect provides businesses with access to a hosted backup solution that is powered by... FULL STORY >

0 comments

New Mimecast services extend spear-phishing protection

By Staff Writer 16 July 2015

New spear-phishing protections are designed to tackle threats from weaponized attachments and support employee security awareness. FULL STORY >

0 comments

Improving Control of Virtual Machines

By Staff Writer 8 June 2015

Sumash Singh at CommVault looks at ways to improve control of virtual machines. FULL STORY >

0 comments

Panda Security introduces Endpoint Protection with protection for Android

By Staff Writer 5 May 2015

In recent months Panda Security has undergone several changes regarding the company’s appearance and identity. FULL STORY >

0 comments

DDoS protection – what budget share should it get?

By Staff Writer 23 March 2015

When allocating budget to DDoS protection, consider the full cost to the organisation of critical applications going down, says Arbor Networks. FULL STORY >

(Page 5 of 7) 1 | 2 | 3 | 4 | 5 | 6 | 7 |

Read
Magazine Online
TechSmart.co.za is South Africa's leading magazine for tech product reviews, tech news, videos, tech specs and gadgets.
Start reading now >
Download latest issue

Have Your Say


What new tech or developments are you most anticipating this year?
New smartphone announcements (45 votes)
Technological breakthroughs (28 votes)
Launch of new consoles, or notebooks (14 votes)
Innovative Artificial Intelligence solutions (28 votes)
Biotechnology or medical advancements (21 votes)
Better business applications (132 votes)