Robinson Distribution, spend the last 15 Years helping customers to be compliant through archiving. With a large customer base in Government and Corporate we had the privilege of working with some of the best managers and Partners in the industry. The feedback we received from them were critical to our solutions success in the African market. With the POPI compliance on our doorstep it became evident we need to expect much more from our archiving solution.
Most companies in South Africa already received the message on POPI (Protection Of Personal Information) Act, to be implemented this year.
The POPI Act was signed into law in April 2013, but the South African Information Regulator, the body responsible for implementing the Act and monitoring its implementation, has indicated that the Act will only be in full effect in early 2018.
If you were the unlucky once to have received an email from UPS, FedEx, etc explaining your parcel arrived or having problems delivering your parcel, you could have been part of this Scam.
SEP Backup and Disaster Recovery announces Snapshot Backup for
Red Hat Virtualization 4
- SEP provides advanced data protection and native backup API support for Red Hat Virtualization 4
- Compliant backups, fulfillment of SLA’s and support for any guest operating system
- SEP to provide a unified data protection solution for Red Hat Virtualization
After the latest IOS release on September 19, 2017. IPhone users have complained that they are unable to connect to their respective networks when they have a company enforced authentication method in place. Continue reading and see how you as an administrator can resolve this issue!
On October 16, 2017, a statement from the International Consortium for Advancement of Cybersecurity on the Internet (ICASI) was released alerting the industry to a series of vulnerabilities for WPA and WPA2. These vulnerabilities affect a large number of wireless infrastructure devices and wireless clients, across many vendors. This security flaw means
that, for vulnerable clients and access points, WPA and WPA2-encrypted Wi-Fi traffic is no longer secure until certain steps are taken to remediate the issue. The Wi-Fi data stream,including passwords and personal data, can be intercepted, decrypted, and modified without a user’s knowledge.
After receiving so many requests to explain the difference between a UTM (Unified Threat Management) and NGFW (Next Generation Firewall), I came across a great video that explains it in detail and decided we should shed some light on it and help customers and partner to better understand the difference.
You get a couple email types but in short they fall into 2 categories, Those you want and those you do not want, Mails you do not want could be either someone trying to get your attention, selling something or someone would like to cause you some sort of damage. But this is still mails you do not want. To stop receiving these mails you need to add some sort of spam protection.