Old IoT vulnerabilities — a botnet gift that keeps on giving

The first thing anyone purchasing any device that connects to the Internet should do upon switching it on for the first time, is immediately update it. If you don’t, you risk having it hijacked by a botnet. So says Bryan Hamman, territory manager for sub-Saharan...

Security implications for 5G and IoT

The advent of 5G networks is about much more than just incredibly fast speeds and more reliable connections, writes Doros Hadjizenonos, regional sales director for Fortinet in South Africa. When combined with today’s powerful edge devices — whether...

Cyber threats to escalate in 2019

South Africa is no stranger to data breaches, with databases of blue-chip companies such as Ster-Kinekor, ViewFines and Masters Deeds having been targeted in the recent past – often with staggering consequences for the companies and their clients. Doug Clare,...

Email security does not end with your password

Email is a crucial part of most people’s daily lives, but few people consider how it’s secured, apart from entering a password to access our accounts. What options are available or even advisable to use for securing email, asks Carey van Vlaanderen, CEO at...

Cybercrime trends and financial services

The same concept holds true for cybercrime and the Financial Services industry. At the end of the day, regardless of who the ultimate victim of a cyberattack is, the end goal of most cyber events continues to be financial gain. By Doros Hadjizenonos, regional sales...

Create a cybersecurity culture

‘Cybersecurity’ is still a relatively new word, making its first appearance to reference “protecting a computer or computer system” in 1989. Since then, the term has evolved to incorporate every aspect of IT, information and cyber security. By...