Beware of domain hijacking

Domain names can be stolen, held hostage and used to wreak havoc for a business website owner. Domain hijacking, as it is called, entails cyber criminals unlawfully gaining access to a website's unique domain in order to impersonate the business for other illegal...

How to avoid being the next data breach headline

Arcserve Southern Africa cautions local businesses to take a proactive approach to business continuity and data recovery (BCDR) or risk becoming the next data breach headline. "In today's digital world, the issues of data privacy and data security are sources of...

Digital identity question takes centre stage

"On the Internet, nobody knows you're a dog." If you've been around long enough, you've probably run into this famous comic on the net, which sums up the question of digital identity perfectly, writes Lee Naik a tech expert and CEO of TransUnion Africa. Sure, there...

The right information protects from supplier harm

Vetting in the supply chain function enables business to review their suppliers and vendors with the intention of mitigating risk before entering into business relationships. It is an important step in the supply chain, as businesses are vulnerable to a host of...