AVeS Cyber Security
AVeS launches cybersecurity awareness campaign
Issue 3 2021, News & Events
Amidst rising cybercrime, ongoing lockdowns and the Protection of Personal Information Act (PoPIA) deadline in South Africa, organisations and their employees are facing a staggering increase in cyber risks.
Read more...
Cybersecurity in the physical security world
Issue 4 2021, Technews Publishing, Milestone Systems, Axis Communications SA, Guardian Eye, Editor's Choice, Information Security, Integrated Solutions, Infrastructure
Hi-Tech Security Solutions, in partnership with Milestone Systems, hosted a round table discussion to find out about the trends and realities and the importance of cybersecurity in the physical security and IoT world.
Read more...
Change management for project ROI and reduced risk
Issue 1 2021, Security Services & Risk Management
Companies that prioritise their employees’ change journeys during digital transformation projects, such as the remote working initiatives seen in 2020, are less exposed to risk and more likely to realise the return on their investments.
Read more...
Digital means managing your risk
Issue 6 2020, Editor's Choice
Digital transformation in mining companies has become a business imperative to drive efficiencies, optimise competitiveness and reduce risks associated with human error.
Read more...
Integrated risk management essential
August 2019, Infrastructure, Security Services & Risk Management, Industrial (Industry)
With manufacturing focused intensively on innovation, combined with a reliance on connected networks and products, it is highly vulnerable to cyberattacks.
Read more...
Integration is communication
February 2019, Information Security, Integrated Solutions
Communication is the missing link for integrating physical and IT security resources, says Charl Ueckermann, CEO at AVeS Cyber Security.
Read more...
The risks of social media
November 2018, Information Security
Employees, their social media profiles and the devices they use to access a company’s network and resources provide a plethora of gateways into the infrastructure for cyber criminals.
Read more...