Safeguard your data in the online world

In a world ruled by data, it is frightening to think how few people take protecting their information seriously. While it has become easy to share everything from your email address and mobile number to more sensitive things such as your ID number and other personal...

Essential security skills for all employees

Cybercrime is a problem that affects everyone. It doesn’t matter how big or small the company may be, it is at risk of breach, fraud, hack, and theft. The statistics around the costs of cybercrime are plentiful, as are those that highlight the percentage growth...

Best-practice in the event of a data breach

We’ve all heard the famous prophecy that states: if we fail to prepare then we must prepare to fail. This statement is never more relevant than in the event of a data breach. By Steve Benton, BT deputy chief security officer, GM of cyber and physical security...

Beware these ‘harmless’ online habits

Everyone nowadays is connected to the Internet and has by now probably settled into some online routines: we all have such habits as checking our e-mails and social media pages first thing in the morning and consider these rituals healthy and harmless. However, some...
Security Terminology Demystified: Spam

Security Terminology Demystified: Spam

Is it a tin of unidentifiable meat that was once a staple of the 1970s diet or is it the security threat that everyone forgets? Spam, both the extremely concerning meat product in a tin and the email security threat, is the scourge of humans around the world. It’s the...

Cyber security: humility key to constant improvement

If we are to continue improving our response to cyber risk, we must accept that breaches will happen. When they do, we must detect, respond and – most importantly – learn from them, writes Michiel Jonker, director: IT advisory at BDO South Africa. While...