Minimise business exposure to ransomware, cyber extortion
Ransomware still holds the line on the cyber attack frontier. According to the 2022 Data Protection Trends Report, only 24% of companies were not attacked by ransomware. The report also found that the most common entry points are malicious links, insecure websites and...
How businesses can protect themselves from scammers
You are your own best defense against change of banking details scammers. In an increasingly digital world, it is somewhat ironic that “the best defense against change of banking detail scams is hardly digital, or very sophisticated, at all,” says Bilal Kajee, Head of...
Background screening checks a critical risk management tool
With South Africa’s struggling economy and high unemployment rates, background screening checks for employees are more important than ever – in this climate, companies are unwilling to take risks on new hires given the mismatch between skills needed and available...
The future of OT is about an integrated approach
Operational technology (OT) cyber security, while currently lagging behind IT security and facing growing risk, is now positioned to leapfrog directly into an advanced level of cyber security maturity. This is according to Matthew Taljaard, systems engineer:...
Threats and solutions around OT, 4IR and cybercrime
The convergency of OT (operational technology) and IT in industrial environments offers numerous and tangible benefits. Plus, when 4IR technologies are added to the mix, the sky becomes the proverbial limit. By Hennie Colyn, direct sales executive Process Automation...
Your data was stolen – now what?
How would you know if someone breached your organisation's systems and stole data? Ideally, you'd catch the culprits in the act or (less ideally) they contact you demanding payment. But you might only discover the theft when your stolen data surfaces publicly. Even...
Stay safe from SIM swap fraud
The last few years have seen a sharp rise in SIM swap fraud, placing the mobile and digital sectors at risk of disrepute. This can result in great implications for all the participants in the value chain, including mobile users, mobile operators, digital services, and...
Serious consequences for companies that invoice via email
Law firm ENSafrica was recently ordered to pay a cybercrime victim R5,5-million after a syndicate successfully hacked into a client's email during a property transaction. The hackers altered the bank account number in a PDF invoice sent by the law firm, resulting in...
Ecosystem thinking: fraud and risk approach protects from every angle
Financial services firms face a global threat environment that is constantly evolving as new technologies, adversaries, and criminal techniques emerge weekly. Todd Schoeman, BT client business director in South Africa, explains how ecosystem thinking can help...
How much protection does cyber insurance give businesses?
As the industry adjusts to increasing levels of cybercrime, insurers are increasing premiums and becoming more strict about whom they will insure. By Dave Russell, vice-president: enterprise strategy at Veeam However, if organisations don't meet even the minimum...
Transforming into a cyber resilient organisation
The premise behind Zero Trust is well-documented. Corporate networks should never blindly trust any device or user. By Ralph Berndt, sales and marketing director at Syrex Instead, the focus is on verifying and authenticating each interaction and communication before...
Active threat hunting a non-negotiable for the modern business
With South Africa being a favoured target for cyber attackers globally, and with the threats growing in both volume and sophistication, local organisations must do more to mitigate against these attacks. By Richard Frost, product head: cybersecurity at Armata In...