Jan 30, 2024
What is the most dangerous trait of a cyberattack? Some use complex social manipulation to spear phish individuals. Others deploy weaponised artificial intelligence (AI) and sophisticated malware programmes to gain access and create chaos. By Hans-Peter Bauer, senior...
Jan 23, 2024
Email interception fraud is on the rise and takes the form of criminals stealing information such as email usernames and passwords. It enables the fraudster to gain access to your business email accounts allowing them to impersonate you and the business. It provides...
Jan 17, 2024
Customers only engage with insurance companies during the claims process when something has been damaged – whether a home, a vehicle, or a business. And that’s where weather intelligence can improve and enhance the customer experience, while saving...
Jan 5, 2024
At least 70% of employees admit to doing activities that are not work-related on their company computer. Although some employers may ignore your browsing habits, it is important to reconsider your activities on your work PC or laptop, particularly in light of...
Jan 4, 2024
Data management has become increasingly crucial in Africa, with the volume and significance of data growing at an unprecedented rate. By Kate Mollett, regional director at Commvault Africa As a result, the cost of handling and protecting this enormous volume of data...
Dec 29, 2023
Keeping information from unauthorised eyes is a practice as old as recording information. Regents would add their seal into wax to stop snoops from reading orders. Warring nations spend great expense and effort to break the codes of their opponents. And in the modern...