Mobile security: there’s a missing puzzle piece

With mobile malware and ransomware proliferating at a rapid rate, companies are recognizing the need for security technologies to protect network resources accessed by employees with their devices. But, they’re missing an important piece of the puzzle. “A...

Companies must became cyber-resilient

This year, we have seen some of the most high-profile victims of cybercrime across the world, including the NHS in the UK, and the attack of Equifax that impacted of millions of people in several countries. The damage has not only cost companies’ money, it has...

Securing the cloud in a complex threat environment

Although cloud computing can be counted as one of the biggest trends of the moment, it is presenting data and security challenges, particularly in the complex threat landscape we live in today. Cloud brings a new consumption and delivery model that enables businesses...

Protect your home from digital attacks

Modern connected homes come with risks — unprotected home WiFi can be hacked into, with some dangerous consequences. It becomes especially dangerous if the home is equipped with many connected IoT (Internet of Things) devices. Hacking into one would allow...

Save yourself from hacker headaches

“Open” WiFi is available almost everywhere, but different cities have their own implementation strategies — and its important to make smart security choices, writes Brendan McAravey, country manager at Citrix South Africa. While cities like Cape Town...

Why Africans need to understand phishing

Phishing is the term used when a cybercriminal sends some sort of electronic message to trick one into doing something doubtful. The “fishing” metaphor refers to the impression of getting one on the hook and then reeling one in, writes Harrish Chib,...