DRS
1:50
5 Sep

DRS obtains level 2 B-BBEE contributor status

Dynamic Recovery Services appointed Thrive Corporate Advisors to create a transformation strategy for the company.

4:00
May 28, 2018

Steps to take in the event of a security event

The best way to ensure you survive a data breach is to carefully plan your approach and response before an event takes place, says DRS.

3:00

Securing the enterprise cloud

The first step to securing the cloud is creating, defining and implementing solid, effective and fast security response procedures, says Robert Brown, CEO of DRS.

3:30
Apr 12, 2018

Remaining compliant in the cloud

Responsibility for security and compliance is shared, although the onus is ultimately on the organisation, not the cloud provider, says DRS.

4:10

Selling your privacy for 'free' services

All social media sites have similar terms of service, essentially giving them the right to use all the user's shared and posted content, with zero liability to the network, says Robert Brown, CEO of DRS, a Cognosec AB company.

3:20
Mar 5, 2018

Millennials and BYOD: keeping the organisation safe

Millennials pose a greater cyber-security risk than any other generation in the workplace, says DRS.

3:30
Oct 30, 2017

How safe is online shopping?

DRS has assembled a list of tips on how to stay safe and secure when shopping online.

3:30

Why hire people to breach your network?

Cyber criminals will always go for the low-hanging fruit, so businesses should strive to make themselves a less attractive target than the next business, says DRS.

3:40
Jul 12, 2017

Reducing your risk of identity theft

Identity theft is very hard to prevent because so much of our personal data resides outside of our control, says DRS.

1:50
Aug 12, 2016

DRS offers checkpoint technician qualification

A Check Point Master uses advanced commands to troubleshoot and configure Check Point security systems, and is able to do things like locate the source of encryption failures.

2:30
Jun 18, 2015

Breaking the 'cyber kill chain'

There are several phases to be disrupted in slowing down or stopping a cyber attack.

2:00
Oct 7, 2014

Internet of things poses risk

IOT has resulted in new security breach entry points that will affect the enterprise, says DRS.