Move fast to combat the complex cyber-attack chain

Cybercriminals are transitioning from a “smash ‘n grab” approach to a stealthier strategy. They now spend more time comprehending victim environments, extracting a greater amount of data, and aiming to maximise their profits per attack. This shift...

Why your boss cares if your Insta profile is hacked

Social media may seem to be far removed from the workplace, but it’s become a major vulnerability for corporate networks. Cyber criminals are using company and staff social media accounts as a source of valuable information and easy access. This is the word from...

Does your data hygiene pass the cleanliness test?

In today’s data-driven world where every click, swipe and tap generates a trail of data, the safeguarding of information is paramount. It’s no longer a case of paying a ransom, but rather defending against attacks by maintaining the hygiene of data, akin...

A guide to surveillance technology

Protecting a business from criminals is a necessity in South Africa, where business owners experience unique security challenges that require robust solutions. Having a comprehensive surveillance system can help to deter offenders and safeguard business assets,...
Cyberattacks push security professionals to breaking point

Cyberattacks push security professionals to breaking point

Research shows that attacks on businesses are growing in sophistication, putting immense pressure on the security professionals tasked with keeping work – and employees – protected. By Heino Gevers , senior director: customer support at Mimecast Based on...

Safety in cyberspace under the spotlight

Cybersecurity Awareness Month in October is always an opportune time for children and their parents or guardians to collaborate on making homes safer for children online. Now, recent unsettling world events have reinforced the message that the Internet is no place for...