Security Terminology Demystified: Spam

Security Terminology Demystified: Spam

Is it a tin of unidentifiable meat that was once a staple of the 1970s diet or is it the security threat that everyone forgets? Spam, both the extremely concerning meat product in a tin and the email security threat, is the scourge of humans around the world. It’s the...

Cyber security: humility key to constant improvement

If we are to continue improving our response to cyber risk, we must accept that breaches will happen. When they do, we must detect, respond and – most importantly – learn from them, writes Michiel Jonker, director: IT advisory at BDO South Africa. While...

Bank cards still a secure, convenient payment option

Recently, there’s been a lot in the news about the supposed increase in card fraud attempts. While this has understandably made some people nervous about using their bank cards, Chris Wood, executive for card issuing and payments at Nedbank, remains positive...

DeepFakes: when seeing isn’t believing

Deepfake technology is rapidly becoming easier and quicker to create and it’s opening a door into a new form of cybercrime. Although it’s still mostly seen as relatively harmful or even humorous, this craze could take a more sinister turn in the future and...

The importance of XDR for cyber protection

With 35% of South African organisations expecting an imminent cyberattack and a further 31% bracing for it to happen within a year, according to local research conducted by Trend Micro, attention is turning to whether existing solutions are up to the challenge of...

Enhance cybersecurity practices

October is cybersecurity month and to promote cybersecurity awareness, Steven Cohen, MD of Triple S Solutions, a full-service information technology business, offers the following nine simple but important points to stay safe. * Companies sending invoices should make...