The future of OT is about an integrated approach
Operational technology (OT) cyber security, while currently lagging behind IT security and facing growing risk, is now positioned to leapfrog directly into an advanced level of cyber security maturity. This is according to Matthew Taljaard, systems engineer:...
Threats and solutions around OT, 4IR and cybercrime
The convergency of OT (operational technology) and IT in industrial environments offers numerous and tangible benefits. Plus, when 4IR technologies are added to the mix, the sky becomes the proverbial limit. By Hennie Colyn, direct sales executive Process Automation...
Your data was stolen – now what?
How would you know if someone breached your organisation's systems and stole data? Ideally, you'd catch the culprits in the act or (less ideally) they contact you demanding payment. But you might only discover the theft when your stolen data surfaces publicly. Even...
Stay safe from SIM swap fraud
The last few years have seen a sharp rise in SIM swap fraud, placing the mobile and digital sectors at risk of disrepute. This can result in great implications for all the participants in the value chain, including mobile users, mobile operators, digital services, and...
Serious consequences for companies that invoice via email
Law firm ENSafrica was recently ordered to pay a cybercrime victim R5,5-million after a syndicate successfully hacked into a client's email during a property transaction. The hackers altered the bank account number in a PDF invoice sent by the law firm, resulting in...
Ecosystem thinking: fraud and risk approach protects from every angle
Financial services firms face a global threat environment that is constantly evolving as new technologies, adversaries, and criminal techniques emerge weekly. Todd Schoeman, BT client business director in South Africa, explains how ecosystem thinking can help...
How much protection does cyber insurance give businesses?
As the industry adjusts to increasing levels of cybercrime, insurers are increasing premiums and becoming more strict about whom they will insure. By Dave Russell, vice-president: enterprise strategy at Veeam However, if organisations don't meet even the minimum...
Transforming into a cyber resilient organisation
The premise behind Zero Trust is well-documented. Corporate networks should never blindly trust any device or user. By Ralph Berndt, sales and marketing director at Syrex Instead, the focus is on verifying and authenticating each interaction and communication before...
Active threat hunting a non-negotiable for the modern business
With South Africa being a favoured target for cyber attackers globally, and with the threats growing in both volume and sophistication, local organisations must do more to mitigate against these attacks. By Richard Frost, product head: cybersecurity at Armata In...
How to ensure data in the cloud is stored safely
Passwords have been the last line of defence for digital accounts and applications for some time, but recent password manager breaches indicate that even this long-trusted method of securing accounts is vulnerable. With user credentials selling at a premium on the...
Data privacy and protection priorities in 2023
World Privacy Day, observed annually on 28 January, serves as a reminder of the importance of protecting personal data in today's digital age. By Kate Mollett, regional director of Commvault Africa Data privacy also provides individuals with control over how their...
Fraud trends every CFO should know
PwC's Global Economic Crime and Fraud Survey 2022 revealed that 46% of organisations have experienced fraud, corruption, or other economic crimes in the last 24 months. Ryan Mer, CEO of eftsure Africa, gives a rundown of what to look out for. Fraud protection is no...