Go phish …

Phishing is one of the oldest cons on the books, and still one of the more popular tools of cyber criminals. Cyber criminals want access to your details and the easiest way to get hold of them is by convincing you that they are someone else – like your bank or a...

Who’s responsible for data security in the cloud?

When moving data into the cloud, organisations should be aware that it is the responsibility of the information owner to ensure that holistic protection and clear visibility is in place, to avoid security breaches. Says Riaan Badenhorst, GM of Kaspersky Lab Africa:...

Human error the main cause of data breaches

With news headlines regularly announcing a new data breach, one wonders whether hackers are becoming more skilled and bolder, or whether organisations are not taking the security of the information they process seriously. Unfortunately, what businesses may not realise...

Is IoT risky business?

Where there is technology at play, you can be pretty sure there will be associated risks and the Internet of Things (IoT) has not been immune to these. The initial risk the IoT industry faced was that they would move too fast and technology adoption would outpace...

Lack of confidence can cost you more than you think

The European Union’s General Data Protection Regulation (GDPR) came into effect almost two months ago. Leading the way to a new era of data protection, the long-awaited GDPR has emphasized the importance of data security more than ever before. Besides tarnishing...

Cyber-crime attacks on SMEs on the increase

Cyber-crime is a real and present danger and attacks are becoming increasingly common and more sophisticated, especially among small to medium-sized businesses (SMEs). It is estimated that 32% of South African businesses have experienced cyber-attacks according to the...