Cyberattacks: what to do when they happen to you

It’s the call that IT teams dread: an employee is reporting that their PC screen is flashing red, with a message telling them that their files are encrypted and that they need to pay a ransom to get them unscrambled. What should they do next? By Peter Alexander, chief...

Cloud offers security, efficiency, regulatory compliance

Data breaches that result in confidential data being compromised, whether it is just released to the general public or used for more malicious purposes, have become almost a daily occurrence, making cybersecurity a non-negotiable for organisations. This includes both...

Steps to a successful IAMG project

It is becoming increasingly important that organisations constantly manage and control employee access to information and systems within the organisation. Philip Yazbek, industrial psychologist from consulting firm Bizmod, says that the responsibility of governing and...

Think you’ve got Tracker on your phone?

If you’re reading this article, it’s likely that you’re hoping for quick tips on what to do if you suspect there’s spyware or a tracker on your phone. If that is the case, you’re likely to be disappointed; there are no quick lists of...

Bad IoT security can bolster the network

IoT security is becoming more urgent. In October, 2017 warnings cropped up of a brewing Internet of Things (IoT) botnet building for an unknown attack at some time in the future, writes Tallen Harmsen, head of IndigoCube Cyber Security. More than one million...

Boost security by detecting active compromises

A huge surge in large-scale ransomware attacks, such as the recent WannaCry, Petya and variations thereof, coupled with massive data breaches such as Verizon, Deloitte and closer to home, Hetzner, is highlighting in no uncertain terms how crucial security solutions...