Skip to main content

J2 Software provides affordable security against cyber threats

While burglar bars may secure your windows, and a Trellidor protects your front entrance, how do you go about protecting all your electronic data?

John McLoughlin founded J2 Software with just such an answer in mind, building a company that reduces risk, improves security and eliminates cyber threats.

Cyber challenges are evolving every day, with changing threats such as ransomware, insider threats and malware growing all the time.

John McLoughlin, J2 Software founder

Of course, this also presents a huge opportunity to a company like J2, which can provide security services and solutions from a team of experts for less money than employing a single cyber security resource.

John McLoughlin, J2 Software founder

We also have options which are viable for businesses of every size.

John McLoughlin, J2 Software founder

These options are what sets J2 apart, as it does not believe in delivering a one-size-fits-all solution.

Since every customer is different, with different issues and different information security maturity levels, solutions need to be different and tailored to individual businesses.

We definitely would like to develop the capacity to reach a larger audience, since people cannot buy what they cannot find. At the same time, we are looking for the right BEE partner to involve in our business to propel us to the next level.

John McLoughlin, J2 Software founder

Nonetheless, we are expanding already, with offices in every major city in SA, as well as extensive reach on the rest of the continent, including southern Africa, Kenya, Tanzania, Uganda and Zambia, with West Africa next on our list.

John McLoughlin, J2 Software founder

Listen to the full interview with John McLoughlin for more information about his business...

Written by 

{ BreezingForms : Contactus }

 

  • Hits: 1428

J2 Software launches J2 Cyber Security Centre

J2 Security CentrePowerful New Cyber Security Centre Offers Next Generation Security Solution Today

Johannesburg, Tuesday 7th February, 2017: Following months of rigorous testing J2 Software has announced the launch of its Cyber Security Centre (CSC) which is now commercially available to support businesses driving to improve information security and aid governance.

 

John Mc Loughlin, MD, J2 Software says the CSC was launched in response to growing calls for better security.  “It became apparent that the traditional way of doing things is simply no longer working. Breaches are increasing; losses are growing with no apparent end in sight. Cyber-criminal networks are innovating on a daily basis and traditional security is still playing by the same rules.”

Mc Loughlin highlights the number of businesses today affected by cyber-crime. “One cannot talk to a business today that has not been affected in one way or another by the scourge of cyber-crime.  This ranges from malicious or uninformed insiders through to meticulously planned external attacks targeting vital infrastructure and the growing number of ransomware variants seen each day,” he says.

Read more …J2 Software launches J2 Cyber Security Centre

  • Hits: 1798

King IV looks at your data

King IVResearch by information specialists, J2 Software, shows that employees pose one of the biggest threats to the security of corporate data – a threat that is largely unrecognised by South African boards. The launch of the King IV Report on Corporate Governance by the Institute of Directors in Southern Africa on 1 November, and the imminent announcement of the effective date in terms of the Protection of Personal Information (PoPI) Act by the newly appointed Regulator, provide a wake-up call for South African organisations, says John McLoughlin, MD of J2 Software.

“Data is now recognised as the most valuable asset a company owns, and it is the target of criminal syndicates. PoPI and similar legislation elsewhere in the world has been devised to force companies to take responsibility for protecting the sensitive personal data they store on their systems. Codes like the King Code have long identified that a company’s data is the fuel on which it runs, and have made boards responsible for ensuring it is protected,” he explains. “But, all too often the threat is conceptualised as external, and the solution as purely technological. What they fail to recognise and be accountable for is that their employees represent an equally serious security risk.”

Read more …King IV looks at your data

  • Hits: 1530

King IV™ sounds wake-up call on insider threat to data security

Research by information security specialists J2 Software shows that employees pose one of the biggest threats to the security of corporate data—a threat that is largely unrecognised by South African boards. The launch of the King IV Report on Corporate GovernanceTM by the Institute of Directors in Southern Africa on 1 November, and the imminent announcement of the effective date in terms of the Protection of Personal Information (PoPI) Act by the newly appointed Regulator, provide a wake-up call for South African organisations, says John Mc Loughlin, MD of J2 Software.

“Data is now recognised as the most valuable asset a company owns, and it is the target of criminal syndicates. PoPI and similar legislation elsewhere in the world has been devised to force companies to take responsibility for protecting the sensitive personal data they store on their systems. Codes like the King Code have long identified that a company’s data is the fuel on which it runs, and have made boards responsible for ensuring it is protected,” he explains. “But, all too often the threat is conceptualised as external, and the solution as purely technological. What they fail to recognise and be accountable for is that their employees represent an equally serious security risk.”

Read more …King IV™ sounds wake-up call on insider threat to data security

  • Hits: 2000