The rise of the digital vault

You only have to read these names to know that e-mail and Internet security are under threat: Edward Snowden, Ashley Madison and Sony. Thanks to advances in technology, many of the digital tools used to communicate are no longer secure and this can have far reaching...

Naivety no excuse for poor app security

The security war will never be won until all stakeholders – developers, service providers, consumers and everyone else in the value chain – start collaborating, sharing information and having open discussions about the threat landscape. This common sentiment emerged...

The dangers of identity theft

Scores of South Africans woke up to a disturbing reality this week when the British High Commission contacted them to say that their UK Visa Applications together with all supporting documentation were stolen, when the courier van that was transporting these documents...

OS migration security tips

Major events in the IT landscape, such as the availability of a new operating system (OS), cannot go by unnoticed, because they affect businesses of all shapes and sizes. Many will ask themselves “should we migrate to a new version and if yes – when?” Anyone who...

Balancing usability and security

There are several facts that any organisation wishing to secure itself against hackers needs to face. Firstly, if a threat actor really wants to access your system he will. There are too many layers – called the attack surface – each containing their own...

Unpacking security myths

One of the hurdles facing businesses who are attempting to secure themselves, and minimise cyber security risks, is a number of basic security myths that cause them to set inappropriate goals and allocate their resources ineffectively. Understanding what the real...