A reactive approach could leave your data vulnerable
The Protection of Personal Information Act (PoPIA) is now in full effect, after a lengthy introduction phase. This, added to the pressure of ongoing lockdowns necessitating continued remote working, is putting a lot of pressure on organisations when it comes to data...
Cloud monocultures elevate risks of cyberattack, service outages
The mass adoption of cloud services and the pressure to consolidate vendors along with the tightening of budgets due to the ongoing COVID pandemic is creating the risk of security monocultures that could put organisations at greater risk. By Brian Pinnock,...
Internal payments fraud on the rise and costing SA businesses
South African businesses, already under severe economic strain, are now counting the costs of rapidly increasing internal payments fraud. According to Ryan Mer, MD of eftsure Africa, the number of recent high-profile cases before the courts only partly reflects the...
POPIA shines spotlight on cybersecurity
With the Protection of Personal Information Act (POPIA) coming into effect from 1 July 2021, it is critical for organisations that have access to their clients' sensitive information to ensure measures are taken to protect them. This is especially true for accountants...
Awareness training vital for e-mail security
Awareness training should be actively deployed to complement organisations' efforts to secure their e-mail systems. François van Hirtum, chief technology officer of Obscure Technologies, says this is because hackers are increasingly targeting people as security...
Anomaly detection the first layer in data management and protection
Cybercrime incidents have surged in the last year, as malicious actors take advantage of the current global situation, including the work from home (WFH) trend. By Kate Mollett, regional director at Commvault Africa As IT has evolved, so too has ransomware, and...
An enterprise guide to not being phished
Phishing mitigation is everything. It's the end point, the touchpoint, the ultimate moment at which you're training and security strategies have prevented an employee from making that terrible mistake of clicking on that link, of exposing the business to attack. Anna...
How to embrace digital transformation, securely
Most organisations in business today understand the importance of digital transformation. The events of the past year or so in particular have accelerated it as an imperative, as organisations were forced to adapt to new, digital-first ways of doing things. By...
We are still building walls to defend against nuclear attacks
While the growing number of data breaches and cyber attacks on companies shows that organisations are often not adequately equipped to protect themselves against such threats, privacy regulations being rolled out in many countries, such as GDPR in Europe and PoPIA in...
Can you hack-proof the cloud?
For someone not working in cybersecurity, the most high-profile case of cloud hacking is, arguably, "celebgate" - or the 2014 breach of several device-storage accounts that saw hundreds of personal photos of celebrities stolen and published online. For cybersecurity...
Ransomware? Hack? Plan, don’t pay
It's impossible to read the news without seeing at least one headline blaring about a breach, hack or attack. In the USA, the Colonial Pipeline experienced a Darkside ransomware attack that affected more than 10 000 gas stations. Virgin Active was hit by a hack early...
UK’s Prudential Regulation Authority adds technology escrow as a resiliency option
The UK's Prudential Regulation Authority (PRA) has included software and technology escrow as resiliency options for firms to consider when undertaking business continuity and exit planning. This is the first time an escrow agreement has been included on the PRA's...