What burglars look for before breaking into a home

The mid-year school break is here, and with it will come trips away with the family and holidays abroad, which means homes will be left empty at a greater rate. Before you pack up your suitcase to take your much-needed holiday, it’s important to make sure that...

World Cup squads briefed on cybersecurity

The FIFA World Cup in Russia has passed without much incident so far – indeed, the only controversial moments have involved the use of the video assistant referee (VAR) for the first time in World Cup history. The doom and gloom prophecies that accompany the...

SMBs need to be cyber secure

With headline-grabbing data breaches and high-stake hacks on the rise, earning and maintaining the trust of visitors to one’s website is a mounting challenge, especially for small and medium-sized businesses (SMBs). Without big budgets or teams of IT...

The difference between a data breach and ransomware

It is clear that South African organisations are at risk from the same cyber-attacks that affect major global economies. The cyber threat landscape is constantly evolving in order to get around existing defence mechanisms. Cybercriminals are now using hacking attacks...

Securing and regulating IoT

In the data centre, servers, storage and, more recently, networks are highly automated, and the processes are “industrialised”. However, in the case of IT security, point solutions and manual work still seem to prevail. Simon Bryden, consulting systems...

How to protect your kids online

Children know how to play online games, get updates on their favorite celebrities, find the latest music hits, chat with their equally tech-savvy peers, or ask the Internet for answers to their questions that they might be too embarrassed to ask others. However,...