Prevent escalating business fraud with robust KYC

While legislation and the introduction of new regulations aim to combat fraud and corruption, South African businesses have the power to fight financial crimes by ensuring consistent Know Your Customer (KYC) procedures are in place. This is according to Sameer...

Tips for managing a breach or ‘dirty’ network

In December 2020, it became apparent that SolarWinds, a major US information technology firm, had been the subject of a cyber attack that spread to its clients. The attack went undetected for months and it has had a huge impact across the entire technology ecosystem...

Mitigate against new home working cyber threats

As distributed work continues to become an everyday norm for countries around the globe, it is important for organisations to consider the impact this new work scenario is having upon the cyber-security landscape. IT leaders are being encouraged to deploy relevant...

How to avoid a ransomware attack

Ransomware attacks have become a massive problem for almost every industry and every organisation size. By Renee Tarun, deputy chief information security officer and vice-president: information security at Fortinet During the last year, criminals have attacked...

A reactive approach could leave your data vulnerable

The Protection of Personal Information Act (PoPIA) is now in full effect, after a lengthy introduction phase. This, added to the pressure of ongoing lockdowns necessitating continued remote working, is putting a lot of pressure on organisations when it comes to data...

Cloud monocultures elevate risks of cyberattack, service outages

The mass adoption of cloud services and the pressure to consolidate vendors along with the tightening of budgets due to the ongoing COVID pandemic is creating the risk of security monocultures that could put organisations at greater risk. By Brian Pinnock,...