0861 IRON MTN (0861 476 668)

Records Security

Data Breach – A Scenario Worth Avoiding

Data Breach – A Scenario Worth Avoiding - Docufile

A data breach can do untold damage to organisations of any size. Learn about one scenario that can easily be avoided. After many years, the ABC Shipping Company* had accumulated several thousand hards drives worth of data. These hard drives of course were now getting rather old. Since hard drives do not last for ever,…

Read More

Cyber-crime – Small Business Equals Big Target

Cyber-crime - Small Business Equals Big Target - Docufile

Cyber-crime is not new and it is increasing rapidly. When cyber-crime makes the headlines it is always the big brands who have been targeted that we hear about. The truth, however, is that small businesses are targeted far more often than big brands. This is because they tend to be less aware of cyber-crime and…

Read More

Protecting Your Organisation from Phishing Attacks

Protecting Your Organisation from Phishing Attacks

How to keep your company one step ahead of cyber-criminals. Phishing attacks are among the most common forms of cyber-attack. They come in many varied forms and unfortunately, the numbers of attacks increase each year. In order to reduce the risk, phishing attacks pose we have put together these useful tips to avoid becoming the…

Read More

Social Engineering – A Growing Threat to Your Data Security

Social Engineering – A Growing Threat to Your Data Security

As corporate data breaches continue to make headlines we look at one method hackers increasingly use to gain unauthorised access. Social engineering is a common technique employed by hackers and cyber-con artists to profit from illegal activities. Social engineering also describes psychological manipulation by organisations, governments or individuals. However, we will be looking at social engineering…

Read More

Managing Data Privacy in your Organisation – Where to Start

Managing Data Privacy in your Organisation - Where to Start

As more data breaches make headlines, data privacy comes under the spotlight. How do organisations better manage data privacy? South Africa has had its fair share of data breaches. Additionally, the upcoming implementation of the Protection of Personal Information Act, or PoPI Act for short, will soon have a large impact on how you manage…

Read More

How to Reduce Your Cyber-Attack Risk and Protect Your Business Part 2

How to Reduce Your Cyber-Attack Risk and Protect Your Business

Follow these tactical actions to reduce your organisations’ cyber-attack risk. Having introduced you to some smart strategic actions you can take to reduce cyber-attack risk in our previous article, ‘How to Reduce Your Cyber-Attack Risk and Protect Your Business Part 1’, it’s time to take a look at some tactical measures you can take. Where…

Read More

Key Steps to Handling a Data Breach

Key Steps to Handling a Data Breach

Hackers, cybercriminals, disgruntled employees, and industrial espionage are unfortunately part and parcel of running a business these days. Data breaches can affect organisations, large and small. Of course, one only hears about data breaches when large corporations and their clients are the victims. Today, no matter the size of your organisation, it is important that…

Read More

Cyber-Attacks – The Why and How

Cyber-Attacks – The Why and How

While the technology brings a host of benefits to organisations, it also comes with some inherent risks. Many people tend to associate cyber-attacks with large corporate organisations when the truth is they affect both organisations large and small. While the payday for hackers may be somewhat larger when they attack large corporates, the fact is hackers…

Read More

5 Serious Record Management Security Mistakes

How to avoid and correct mistakes that could cost your company more than just money. 1. Failing to protect your digital documents with passwords Here is one of the easiest records management security mistakes to remedy. Never underestimate the risk of data theft by unhappy employees, competitors or any other unauthorised person who might gain…

Read More