There is a common belief that meta data is rarely implemented in businesses.
Affordable high-speed Internet is accessible via a computer or cellphone.
Legacy systems can hinder security solutions in the deployment phase.
Solutions that scrutinise and stop malware in the cloud represent the next big step forward in the fight against malicious code.
Multifunction printers consolidate the functionality of a printer, copier, scanner and fax into one machine.
An effective solution can be achieved through applying proper systems and procedures on the devices at hand.
The distinction between the company and the call centre has become blurred.
By law, every business in SA now has to address BEE accreditation.
A coherent data loss prevention strategy will address vulnerabilities at the core of the network, its gateway and endpoints.
Processes and technology can be combined to effect change, and make this change flexible.
E-government requires a business-driven approach and an understanding of citizens' online behaviour.
Globalisation accelerates the opening up of new markets to international collaboration.