Protect your communications network and IP

Voice over Internet Protocol (VoIP) has become an integral aspect of modern day businesses around the globe, taking the productivity of your workforce to new heights by making yourself available to your clients from remote locations where before, this was not a...

Keep your ID safe in the cybersphere

Over the course of the past decade, the brick-and-mortar institutions of yesteryear have rapidly been replaced by online counterparts, with South Africans now turning to the Internet to perform banking transactions, book flights and even shop for groceries. While this...

Meet the next generation of cybersecurity

Millennials, the name given to the demographic cohort born between about 1980 and 2000, are members of what is now the largest living generation. As they mature into 20- and 30-something professionals, they are taking over the helm from their parents across all...

A zero-trust approach to cybersecurity

Today’s cybersecurity threats have matured well beyond viruses, and the stakes have grown too. While cyberattack on users’ identities and bank accounts continue to dominate headlines, it is no longer just data that’s at stake as the Internet of...

Two-factor authentication an underutilised measure

Whenever a business considers the security measures it can implement, three options always crop up: antivirus on endpoints and servers to detect and eliminate as many threats as possible; backups to ensure that any data lost in an incident such as a ransomware attack...

More about the DBE’s hacking incident

The Department of Basic Education’s website was recently hacked by the Islamic State, posting gory pictures and a message about the US Government. Following this incident, Bryan Hamman, territory manager for sub-Saharan Africa at Arbor Networks, has compiled a...