Register
To leverage the BYOD trend and protect the business, corporates need mobile device management software: The Bring Your Own Device (BYOD) phenomenon, which sees individuals bring their own mobile devices into the
A+ A A-
Recordings: the contact centre security hole
The management and security of contact centre recordings tends to be sorely neglected, says Karl Reed, Chief Marketing & Solutions Officer at Elingo. Most contact centres record voice calls and interactions, but few manage and utilise the resulting data effectively.   In line with legislation, and to protect themselves in…
Read more...
To leverage the BYOD trend and protect the business, corporates need mobile device management software

To leverage the BYOD trend and protect the business, corporates need mobile device management software

The Bring Your Own Device (BYOD) phenomenon, which sees individuals bring their own mobile devices into the workplace, is part of a new business paradigm. It allows business to be conducted remotely, from anywhere, at any time. It drives productivity and competitiveness. But BYOD also poses a significant challenge to…
Read more...
Security trends: guarding the physical and the virtual environment

Security trends: guarding the physical and the virtual environment

Most businesses have physical premises to protect – warehouses, offices or stores that are vulnerable to crime – as well as virtual “assets” and information. Technology can play a crucial role in protecting both.
Read more...
10 things you can do this year to guarantee you lose your valuable data
The need to protect valuable business and personal data from hackers, viruses and theft is something that all users are aware of, as cybercrime has become a multi-million dollar industry. However, there are many other ways to lose your data, which people often do not even think about. These simple,…
Read more...
An end-to-end approach is critical to securing cloud computing

An end-to-end approach is critical to securing cloud computing

Cloud computing is predicted to be the future of the technology world, and analyst reports abound on the expected growth of the uptake of these solutions. However, security issues remain one of the dominant barriers with the adoption of cloud solutions. Many organisations are hesitant to migrate to the cloud…
Read more...
Security Predictions for 2013
As you round out your 2013 business and IT plans, cybercriminals are resolving to implement increasingly sophisticated threats targeting specific computer systems and organisations big and small.   Last year, businesses saw several serious hacks and breaches. As the arms race between attackers and businesses continues to evolve in 2013,…
Read more...
  • Start
  • Prev
  • 1
  • 2
  • Next
  • End

Advertise

Sections

Copyright © 2013 gdmc (Geoffrey Dean Marketing Corporation cc). All rights reserved. Material may not be published or reproduced in any form without prior written permission. Use of this site constitutes acceptance of our Terms & Conditions and Privacy Policy. External links are provided for reference purposes. SALeader.co.za is not responsible for the content of external Internet sites.

Login or Register

Register