Migration

Mimecast Wins Two Midmarket Technology Awards

Cyber-criminals don’t discriminate by size when it comes to selecting an organization as a target of attack. In fact, recent high-profile data breaches have taught us that mid- or smaller-sized businesses are often a target of those trying to attack …

Read More
Continuity

Working Through the Outages (Not Around Them)

With the threat of more power outages looming in South Africa’s future, businesses are scrambling to find ways to keep working. The topic of ‘generators’, ‘invertors’ and even Tesla’s new wonder battery seems to be on the lips of every COO, and the c…

Read More
Security

Avoid 'Unforced Errors' by Upgrading Your Spear-Phishing Technology

In tennis, you never want to commit an unforced error. These are the worst kind of point-costing blunders a player can commit – the completely avoidable, self-inflicted ones that have nothing to do with the skill of the opponent or the excellence of …

Read More
Security

Lessons Learned from RSA 2015: Safeguarding Data with Control

A few weeks ago, I made a trip across the pond to one of the biggest U.S. security events of the year, the RSA Conference. The 400+ exhibitors pulled out all the stops, unveiling new products, displaying elaborate booth décor and giving away all sort…

Read More