The dangers of identity theft

Scores of South Africans woke up to a disturbing reality this week when the British High Commission contacted them to say that their UK Visa Applications together with all supporting documentation were stolen, when the courier van that was transporting these documents...

OS migration security tips

Major events in the IT landscape, such as the availability of a new operating system (OS), cannot go by unnoticed, because they affect businesses of all shapes and sizes. Many will ask themselves “should we migrate to a new version and if yes – when?” Anyone who...

Balancing usability and security

There are several facts that any organisation wishing to secure itself against hackers needs to face. Firstly, if a threat actor really wants to access your system he will. There are too many layers – called the attack surface – each containing their own...

Unpacking security myths

One of the hurdles facing businesses who are attempting to secure themselves, and minimise cyber security risks, is a number of basic security myths that cause them to set inappropriate goals and allocate their resources ineffectively. Understanding what the real...

Protecting your children online

Hundreds of thousands of children surf the Web every day. While the Net can be a good influence, and assist with learning and education, it also poses enormous dangers. It is because of these threats and risks to children, that parents need to step in and help protect...

Lessons from the Ashley Madison hack

The traditional approach to security is no longer acceptable and many companies are not shifting their policies and protection quickly enough to deal with the fast-evolving security threats, says Martin Walshaw, senior engineer at F5 Networks. The Ashley Madison hack this week has proven to be yet another example of businesses being unprepared for cyber security attacks.