How to become a threat-resilient organisation

With the continent’s rapid digital transformation, African businesses are being exposed to increasingly complex cyber threats. As their digital footprint grows, so too does the potential for cyberattacks, writes Vinay Hiralall, chief commercial officer of Liquid C2....

What’s the difference between disaster recovery and cyber recovery?

As ransomware attacks become increasingly common, businesses must understand the difference between traditional disaster recovery (DR) and cyber recovery strategies. By Hemant Harie, group chief technology officer at DMP SA  While DR centres on restoring IT operations...

Ransomware attack simulation training prepares for real attacks

Businesses today are forced to navigate an increasingly perilous landscape of cyber threats, characterised by the increasing frequency and sophistication of cyberattacks. By Graham Brown, country manager at Commvault The financial repercussions are staggering, with...

Veeam launches strategic framework to close resilience reality gap

In an era marked by escalating cyberattacks and costly IT outages, Veeam Software has unveiled its Data Resilience Maturity Model (DRMM). The new framework helps organisations to objectively assess their true resilience posture and take decisive, strategic action to...

Cyber security best practices for SMEs

As South Africa’s small and medium-sized enterprises (SMEs) increasingly embrace digital tools and platforms, they also face a growing threat: cybercrime. With limited resources compared to larger organisations, SMEs are often seen as soft targets by cybercriminals,...
How effective are employee phishing tests?

How effective are employee phishing tests?

Employee phishing tests have gained popularity as a way for organisations to gauge how vulnerable their employees are to phishing attacks and improve their awareness of cybersecurity. However, some have questioned whether it is appropriate to use fear, shame and...