Aug 23, 2017
Should a password get hacked, it could expose the user to viruses, malware and data breaches on their mobile phones and other devices. Clever cyber crooks have the skills and the tools to easily crack passwords and steal personal information. The default for all user...
Aug 21, 2017
The so-called ostrich syndrome is a term used to describe people who prefer to “stick their heads in the sand”, much as an ostrich does, rather than accept some uncomfortable facts. However, when it comes to indisputable threats like Distributed Denial of...
Aug 16, 2017
Many businesses and individuals have been affected by the various cyber-attacks perpetrated in the past six months. Ransomware seems to have taken over the headlines this year, and it’s not going away anytime soon. Ransomware is most likely be a topic that will remain...
Aug 15, 2017
South African operational Industrial Control System (ICS) /SCADA systems are becoming increasingly intelligent and connected, and therefore increasingly at risk of attack. “While a major breach has not yet been reported in South Africa, it is only a matter of time...
Aug 15, 2017
The constant evolution of the global security threat landscape is playing a part in the rise of cyber ‘security as a service’ offerings. In addition, the evergreen discussion around cost modelling, namely the “capex versus opex?” issue, is also a factor in the...
Aug 11, 2017
With so many moving parts, industrial and manufacturing concerns have a broader risk profile, writes Neil Cameron, Johnson Controls area GM: building efficiency – Africa. This means their security solutions need to work harder–the safety of people and...