Subscribe
  • Home
  • /
  • Contributors
  • /
  • Hedley Hurwitz

Hedley Hurwitz

Articles

3:00
TechForumNov 18, 2013

Closing the door to Web app vulnerabilities

Continuous scanning is essential to secure Web applications, says Hedley Hurwitz, MD of Magix Security.

3:00
TechForumNov 5, 2013

Open access points present mobile risks

The simple fact of being open to the public means these access points are not secure and are easy prey for criminals, says Hedley Hurwitz, MD of Magix Security.

2:30
Risk managementSept 25, 2013

Proactively managing risk

The only risk mitigation strategies that work are those that identify suspicious events and raise the alarm before any damage is done, says Hedley Hurwitz, MD of Magix Security.

4:30
TechForumMay 31, 2013

Mitigating money laundering risks

Proactive anti-money-laundering efforts save face, cut costs and minimise losses, says Hedley Hurwitz, MD of Magix Security.

2:40
TechForumApr 2, 2013

Home IT insecurity threatens corporate networks

The use of corporate laptops in the home environment, where security is secondary to convenience and fun, opens the network up to threats, says Hedley Hurwitz, MD of Magix Security.

2:30
Network securityFeb 18, 2013

Authentication critical in cyber security war

Proper identity authentication is simple to achieve through biometric technology, which is fast, reliable and almost impossible to crack, says Hedley Hurwitz, MD of Magix Security.

2:20
TechForumFeb 13, 2013

Careless oversight exposes sensitive information

File servers contain documents that are usually forgotten and left idle for years, available to any curious snoopers, says Hedley Hurwitz, MD of Magix Security.

2:50
Data protectionFeb 6, 2013

Who's watching your data?

Securing data effectively requires a multifaceted approach incorporating tools, knowledge and constant user activity monitoring, says Hedley Hurwitz, MD of Magix Integration.

2:40
TechForumDec 6, 2012

Infrastructure monitoring: it's all or nothing

Businesses that fail to monitor their ICT infrastructure as part of a risk assessment on a regular basis are likely to find their systems compromised, says Hedley Hurwitz, MD of Magix Security.

2:50
TechForumNov 20, 2012

Employee monitoring cuts insider fraud

Monitoring employees is not an invasion of privacy, but a simple business process that observes how they do the jobs they are paid for, says Hedley Hurwitz, MD of Magix Security.

2:30

Simplifying mobile app development

IT leaders should select application development platforms that incorporate automatic interface solutions, says Hedley Hurwitz, MD of Magix Integration.

2:10
SecurityJan 11, 2011

Empower mobile workforce securely

A USB memory stick and a virtualisation solution can provide remote access from any machine, says Hedley Hurwitz, MD of Magix Integration.