Is your business getting its priorities right?

If 77% of cyberattacks happen through apps, why do companies spend 90% of their security budget securing the perimeter of their systems? F5 Networks revealed this statistic back in 2016, and yet businesses don’t seem to have changed their spending priorities. By...

A cybersecurity checklist for African SMEs

Email is still an organisation’s weakest point, with 91% of attacks starting with email-based phishing attacks. And they’re not going away. In fact, 90% of global organisations have seen an increase in the volume of phishing attacks in the last year. By...

Safer Internet Day: better together

Yesterday was Safer Internet Day – a call for collaboration that comes at a time when corporate privacy scandals, global ransomware epidemics, nation-state attacks and the regrettably fast-expanding cybercriminal world all threaten to tear the internet apart....

A continuous approach to privileged access management

When we think of insider threats, the image that comes to mind is often that of a disgruntled employees looking to cause damage to an organisation. However, these threats are caused by honest mistakes more often than not, says Byron Davel, product manager at Credence...

Old IoT vulnerabilities — a botnet gift that keeps on giving

The first thing anyone purchasing any device that connects to the Internet should do upon switching it on for the first time, is immediately update it. If you don’t, you risk having it hijacked by a botnet. So says Bryan Hamman, territory manager for sub-Saharan...

Security implications for 5G and IoT

The advent of 5G networks is about much more than just incredibly fast speeds and more reliable connections, writes Doros Hadjizenonos, regional sales director for Fortinet in South Africa. When combined with today’s powerful edge devices — whether...