How effective is two-factor authentication?

Should a password get hacked, it could expose the user to viruses, malware and data breaches on their mobile phones and other devices. Clever cyber crooks have the skills and the tools to easily crack passwords and steal personal information. The default for all user...

DDoS and the ostrich syndrome

The so-called ostrich syndrome is a term used to describe people who prefer to “stick their heads in the sand”, much as an ostrich does, rather than accept some uncomfortable facts. However, when it comes to indisputable threats like Distributed Denial of...

The future of ransomware

Many businesses and individuals have been affected by the various cyber-attacks perpetrated in the past six months. Ransomware seems to have taken over the headlines this year, and it’s not going away anytime soon. Ransomware is most likely be a topic that will remain...

SA operational technologies open to attack

South African operational Industrial Control System (ICS) /SCADA systems are becoming increasingly intelligent and connected, and therefore increasingly at risk of attack. “While a major breach has not yet been reported in South Africa, it is only a matter of time...

The rise of security as a service

The constant evolution of the global security threat landscape is playing a part in the rise of cyber ‘security as a service’ offerings. In addition, the evergreen discussion around cost modelling, namely the “capex versus opex?” issue, is also a factor in the...

Can industrial security drive ops, productivity and profitability?

With so many moving parts, industrial and manufacturing concerns have a broader risk profile, writes Neil Cameron, Johnson Controls area GM: building efficiency – Africa. This means their security solutions need to work harder–the safety of people and...