Demystifying cyberattacks on critical infrastructure

The notion of cyber-attacks seems distant from our daily lives, as we go about our work, social and family lives. By Carlo Bolzonello, country lead at Trellix Cyber-attacks feel like they happen to big businesses who can quickly bounce back from them after the issue...

Cybersecurity must-haves when it comes to defending business systems

Earlier this year, TransUnion was the target of a hacker group who obtained access to one of its servers containing the personal records of a significant number of South Africans. By Chris Norton, regional director for Africa at Veeam The group demanded a $15-million...

The mind-boggling puzzle of cybersecurity

Keeping pace with all the tools and technologies that provide protection from the cybersecurity onslaught can be overwhelming, but not impossible, writes Colin Thornton, chief commercial officer at Turrito Networks. There are a lot of statistics when it comes to...

Post-Covid fraud trends to be aware of

The effects of Covid-19 may have done wonders for digital commerce and remittances, but the mass move to digital channels also opened doors for scammers to take advantage of unwary consumers. By Mark Mwongela Ngungi, sales development director: Africa at PayPal Most...

More cybercrooks are impersonating the CEO

Over the past month, there has been an increase in an evolved method in change in bank details or payment fraud. This trend involves an internal change of bank details, mostly for the CEO. By John Mc Loughlin, CEO of J2 Traditional payment fraud has been rife for some...

The high walls of data security

Privacy, data security, digital identity – walled security gardens are becoming increasingly important tools for organisations looking to embed robust security, writes Aaron Thornton, chief service officer of Turrito Networks. Gartner has long discussed the...