A call for robust DDoS defence strategies

A call for robust DDoS defence strategies

Within the constantly-fluid cybersecurity arena, Distributed Denial of Service (DDoS) attacks present a formidable challenge. The staggering frequency and impacts of these attacks are often underestimated, yet they are a relentless threat, disrupting the very fabric...

Tips to improve your backups

Backups are crucial. Whether you are worried about a ransomware attack or some other disaster taking out the information that keeps your business running, backups are the best way to mitigate data loss risks. Yet, organisations are often unsatisfied with the value...

Anatomy of a phishing attack

Phishing attacks are among the most widespread and effective tactics used by cybercriminals against business. These schemes aim to deceive employees into disclosing sensitive information, such as login credentials or financial data, by posing as legitimate sources....

Are printers included in your business cyber security strategy?

With cybercrime rates in South Africa skyrocketing, businesses are increasingly conscious of the need to protect their in-office and remote IT set ups from ill-intentioned hackers. Yudheer Harbhajun, business print sales manager for Epson South Africa, says that while...
AI’s double-edged sword requires a human security approach

AI’s double-edged sword requires a human security approach

Artificial intelligence (AI) has ushered in both promise and peril for organisations needing to combat cyber threat actors. As ESET Southern Africa chief technology officer Adrian Stanford notes: “AI is reshaping the battlefield between cyber attackers and...

Current trends in cyber-attacks

Cybersecurity experts are sounding the alarm as the pace of cyber-attacks speeds up, with threat actors moving swiftly from infiltration to exploitation, seeking rapid financial gains. Ransomware-as-a-Service (RaaS) has made coordinated attacks easier, as specialised...