What’s the difference between disaster recovery and cyber recovery?

As ransomware attacks become increasingly common, businesses must understand the difference between traditional disaster recovery (DR) and cyber recovery strategies. By Hemant Harie, group chief technology officer at DMP SA  While DR centres on restoring IT operations...

Ransomware attack simulation training prepares for real attacks

Businesses today are forced to navigate an increasingly perilous landscape of cyber threats, characterised by the increasing frequency and sophistication of cyberattacks. By Graham Brown, country manager at Commvault The financial repercussions are staggering, with...

Veeam launches strategic framework to close resilience reality gap

In an era marked by escalating cyberattacks and costly IT outages, Veeam Software has unveiled its Data Resilience Maturity Model (DRMM). The new framework helps organisations to objectively assess their true resilience posture and take decisive, strategic action to...

Cyber security best practices for SMEs

As South Africa’s small and medium-sized enterprises (SMEs) increasingly embrace digital tools and platforms, they also face a growing threat: cybercrime. With limited resources compared to larger organisations, SMEs are often seen as soft targets by cybercriminals,...
How effective are employee phishing tests?

How effective are employee phishing tests?

Employee phishing tests have gained popularity as a way for organisations to gauge how vulnerable their employees are to phishing attacks and improve their awareness of cybersecurity. However, some have questioned whether it is appropriate to use fear, shame and...

What you need to know about data breaches, leaks

With over 34,5-million breached accounts recorded in South Africa in the first quarter of 2024 alone, cyber threats are escalating at an alarming rate. The country now ranks second in Africa for data breaches, with high-profile cases like the recent attack on Pam...