Why you should use a pseudonym at Starbucks

Innocently providing your name at your local coffee shop is just an example of how easy it can be for miscreants to cut through the ‘privacy’ of social media accounts, says Carey van Vlaanderen, CEO at ESET South Africa. When Starbucks introduced...

Communication missing in physical and IT security integration

Better communication is the key to integrating physical and IT security in enterprises today. This is according to Charl Ueckermann, CEO at AVeS Cyber Security, who says physical and IT security resources have traditionally been treated as separate disciplines. As...

Security predictions for 2019

NetScout Arbor, which specialises in advanced distributed denial of service (DDoS) protection solutions, has released its security predictions for this year, against a background which saw the largest ever DDoS attacks being unleashed in 2018. Bryan Hamman, territory...

Is your business getting its priorities right?

If 77% of cyberattacks happen through apps, why do companies spend 90% of their security budget securing the perimeter of their systems? F5 Networks revealed this statistic back in 2016, and yet businesses don’t seem to have changed their spending priorities. By...

A cybersecurity checklist for African SMEs

Email is still an organisation’s weakest point, with 91% of attacks starting with email-based phishing attacks. And they’re not going away. In fact, 90% of global organisations have seen an increase in the volume of phishing attacks in the last year. By...

Safer Internet Day: better together

Yesterday was Safer Internet Day – a call for collaboration that comes at a time when corporate privacy scandals, global ransomware epidemics, nation-state attacks and the regrettably fast-expanding cybercriminal world all threaten to tear the internet apart....