35 years on, is ransomware still effective?

Ransomware has been around for 35 years, with the first known case involving the AIDS Trojan. This malware was spread using physical disks, pretending to be software to assess people’s risk of developing AIDS. Since then, ransomware has become a major cyber threat,...

Top cyber security controls for SMEs

There are a multitude of cyber security controls that businesses can implement and leverage to protect against cyber threats, but we’ve selected five of the best that are ideal specifically for SMEs. In today’s digital, data-driven economy, cyber security is the...

Make multi-factor authentication your personal cybersafety resolution

With South Africa’s Information Regulator on record as saying the country suffered at least 150 data breaches a month in 2024, South Africans must make Multi-factor Authentication (MFA) the non-negotiable centrepiece of their personal cybersecurity new year’s...

What is fake hacking and how can we protect ourselves?

In the high-stakes world of cybersecurity, the term “hacking” often conjures up images of sophisticated cyber threats and data breaches orchestrated by skilled attackers. However, a lesser-known but equally dangerous phenomenon is the rise of “fake hacking” –...

Adopting human-centric security

As businesses adopt new technologies and adapt their ways of working to take advantage of the latest digitalisation trends, the unfortunate truth is that they are increasing their cyber risk. By John Penn, security propositions architect at BT Attacks like phishing,...

Protect you kids in the digital playground

As online gaming grows in popularity, children are increasingly spending time on apps that often encourage in-app purchases, especially during school holidays. While these purchases can enhance the gaming experience, they aren’t without risk says Carey van Vlaanderen,...