Another day in IT – another crisis … Some ransomware, data breach, insider threat or new TLA (three letter acronym) that poses a risk to your corporate information systems and assets. So the question becomes: WHO’S RESPONSIBLE? Principle 12 of the King IV report states that: “the Governing Body (of an organisation)
We are privileged to be working with T-Systems, the technology arm of Deutsche Telekom, having established a strategic alliance that will focus primarily in the African healthcare space. Our SCP solution ( www.pfortner.co.za/scp ) ensures that patient information is shared between doctors, suppliers and hospitals without compromising the privacy or integrity of the data.
If you haven’t invested in the Cybersecurity space yet – you WANNACRY After the breakout of this ransomware attack, CYBER is the flavour of the year. My mother’s neighbour is asking about malware and worms and not the usual type that affected her prize winning roses… Previously, IT Security guys were not well
We have seen a steady increase in the number of threats coming through, yet existing algorithms like BGP don’t seem to have evolved to mitigate them. In recent years we’ve seen algorithms like SSL die out for this reason. Another problem is that on the Layer 3 level, we’ve basically relied on the other layers
Role of the Chief Customer Officer As the first CCO in the history of Pfortner, I am charting a bold new and exciting course…both in my career and in the way Pfortner operates; I aim to drive more client focused centricity that leads to innovative business solutions which ultimately unlocks measurable value for our
Linux how do I love thee? Let me count the ways. I love the way I have control in root, To make a do as I please and should How RPMs have become so much more To change and adapt, this is never a bore The lightweight kernel that controls and guides
If this is what you are thinking after the recent announcements of security concerns in the WhatsApp platform, you are not alone. Many of the companies that we meet use WhatsApp for internal team communication. And after this security announcement, Information Security and Risk Officers must have some concerns. It’s understandable how we got here