Minimise business exposure to ransomware, cyber extortion

Ransomware still holds the line on the cyber attack frontier. According to the 2022 Data Protection Trends Report, only 24% of companies were not attacked by ransomware. The report also found that the most common entry points are malicious links, insecure websites and...

How businesses can protect themselves from scammers

You are your own best defense against change of banking details scammers. In an increasingly digital world, it is somewhat ironic that “the best defense against change of banking detail scams is hardly digital, or very sophisticated, at all,” says Bilal Kajee, Head of...

Background screening checks a critical risk management tool

With South Africa’s struggling economy and high unemployment rates, background screening checks for employees are more important than ever – in this climate, companies are unwilling to take risks on new hires given the mismatch between skills needed and available...

The future of OT is about an integrated approach

Operational technology (OT) cyber security, while currently lagging behind IT security and facing growing risk, is now positioned to leapfrog directly into an advanced level of cyber security maturity. This is according to Matthew Taljaard, systems engineer:...

Threats and solutions around OT, 4IR and cybercrime

The convergency of OT (operational technology) and IT in industrial environments offers numerous and tangible benefits. Plus, when 4IR technologies are added to the mix, the sky becomes the proverbial limit. By Hennie Colyn, direct sales executive Process Automation...

Your data was stolen – now what?

How would you know if someone breached your organisation’s systems and stole data? Ideally, you’d catch the culprits in the act or (less ideally) they contact you demanding payment. But you might only discover the theft when your stolen data surfaces...