Should your organisation be using EDR?

How secure are the devices that access your company networks? Can you rest easy, knowing that something is monitoring threats that exploit people’s laptops and smartphones? Most organisations are not as secure as they believe. Phishing in particular diminished...

Threat actors add .zip domains to their phishing arsenals

Phishing has been a digital thorn in the side of cybersecurity for over a decade. These unsolicited, cleverly masked requests are the wolf in sheep’s clothing of the digital world. They are always looming, waiting for some unsuspecting employee to click on a...

Next-generation data protection is critical

The value of data has increased exponentially, to the point where becoming a victim of cybercrime is no longer an if, but a when. By Kate Mollett, senior director at Commvault Africa The reality is that your environment will be breached at some point because...

Employee mistakes still the biggest cybersecurity threat

With almost 88% of data breaches being caused by an employee mistake, a strong human risk management programme with regular employee training and cybersecurity awareness is critical, writes Carey van Vlaanderen, CEO of ESET Southern Africa. Ask any cybersecurity...

How to strengthen data security for Office 365

Amid an alarming rise in ransomware attempts and cloud data security breaches globally, it’s important for businesses to reassess their data protection strategies for Microsoft Office 365. Despite Microsoft’s robust and secure infrastructure, businesses...

Individual digital identity holds potential

The way we perceive business flourishing is undergoing a paradigm shift as digital identity and consumer consent redefine the dynamics of transactions. Shanaaz Trethewey, chief operating officer of Comcorp South Africa, emphasises the pivotal role of...