Nov 2, 2018

Medical devices a potential target for hackers

Patients must be protected to avoid hackers administering a lethal dose of insulin, or stopping a pacemaker, says Andrew Sjoberg, CTO at DRS.

Oct 23, 2018

Getting a grip on cyber risk

Companies must define ways to deal with risk, identify who is responsible for dealing with risk, and what actions can be taken to mitigate risk, says Nastassja Finnegan, enterprise sales director at DRS.

Sep 5, 2018

DRS obtains level 2 B-BBEE contributor status

Dynamic Recovery Services appointed Thrive Corporate Advisors to create a transformation strategy for the company.

May 28, 2018

Steps to take in the event of a security event

The best way to ensure you survive a data breach is to carefully plan your approach and response before an event takes place, says DRS.


Securing the enterprise cloud

The first step to securing the cloud is creating, defining and implementing solid, effective and fast security response procedures, says Robert Brown, CEO of DRS.

Apr 12, 2018

Remaining compliant in the cloud

Responsibility for security and compliance is shared, although the onus is ultimately on the organisation, not the cloud provider, says DRS.


Selling your privacy for 'free' services

All social media sites have similar terms of service, essentially giving them the right to use all the user's shared and posted content, with zero liability to the network, says Robert Brown, CEO of DRS, a Cognosec AB company.

Mar 5, 2018

Millennials and BYOD: keeping the organisation safe

Millennials pose a greater cyber-security risk than any other generation in the workplace, says DRS.

Oct 30, 2017

How safe is online shopping?

DRS has assembled a list of tips on how to stay safe and secure when shopping online.


Why hire people to breach your network?

Cyber criminals will always go for the low-hanging fruit, so businesses should strive to make themselves a less attractive target than the next business, says DRS.

Jul 12, 2017

Reducing your risk of identity theft

Identity theft is very hard to prevent because so much of our personal data resides outside of our control, says DRS.

Aug 12, 2016

DRS offers checkpoint technician qualification

A Check Point Master uses advanced commands to troubleshoot and configure Check Point security systems, and is able to do things like locate the source of encryption failures.

Related topics