Social engineering exploits business vulnerabilities
With the growing number of online transactions taking place each day comes a marked rise in cyber-attacks and security events. According to Ryan Mer, MD of eftsure Africa, fraudsters are constantly finding new ways to exploit vulnerabilities and attack corporate...
Ensure sensitive data is totally destroyed before discarding IT assets
End-of-life IT assets present critical challenges to all businesses that handle sensitive data. Factory resets and hard drive formatting leave valuable data behind, so any method that fails to verify complete data destruction risks leaving data accessible. By...
Be mindful with it comes to security
October is Cybersecurity Awareness Month, this comes at a time when cybersecurity awareness should be on everyone's mind. The risk of attack has soared, according to Atlas VPN - 45% of organisations globally were impacted by recurring cyberattacks, malware up by 358%,...
Cellphone snatching on the rise
Opportunistic crime is on the rise and so is the trend of cellphone snatching. Brazen criminals are willing to risk life and limb to snatch a R20 000 smart phone and make off with it - phones left on tables right next to you in restaurants, in vehicles hooked up to...
Why investors should care about cybersecurity
Investors need to consider cyber preparedness in their investment decisions, writes Kondi Nkosi, country head of Schroders South Africa. Today, 100% of companies rely on the internet to operate, compared to the one-in-four 10 years ago, according to a study from...
Immediate response helps to prevent banking fraud
If you are like any normal South Africa, you approach intersections labelled high crime or high smash and grab zone with an overabundance of caution and the same applies to any intersection where there are a lot of people loitering around your vehicle. The last thing...
Securing business systems goes beyond the technology
While companies invest a great deal of time and effort in securing their systems, remote and hybrid working has forced businesses and their staff to acknowledge that security goes beyond IT. For all the best technology, a human lapse could result in a catastrophic...
POPIA drives multi-factor authentication to secure customer data
South African companies have responded admirably to the challenges of doing business in a pandemic with many accelerating their digital strategies and opening new channels for consumer engagement. Unfortunately, bad actors have also adapted exceedingly well, taking...
Communications key to protecting assets
The recent unrest which cost businesses tens of millions across KwaZulu Natal and Gauteng recently brought home a number of key lessons: the unexpected can happen - quickly - and physical security barriers are not always enough to protect lives and assets. This is...
When ransomware strikes, can you recover fast enough?
Ransomware attacks have become increasingly common, and they are even available on the dark Web to purchase as a service. By Kate Mollett, regional director at Commvault Africa There have been many incidents in the news, where major companies have been left with...
Cyber recovery strategy key when ransomware strikes
South Africa is an attractive target for cybercriminals for a number of reasons, and the last few years have seen a sharp rise in high-profile ransomware attacks. By Lourens Sanders, solution architect at Infinidat One of the key motivations driving this volume of...
Prevent escalating business fraud with robust KYC
While legislation and the introduction of new regulations aim to combat fraud and corruption, South African businesses have the power to fight financial crimes by ensuring consistent Know Your Customer (KYC) procedures are in place. This is according to Sameer...