Tips for managing a breach or ‘dirty’ network
In December 2020, it became apparent that SolarWinds, a major US information technology firm, had been the subject of a cyber attack that spread to its clients. The attack went undetected for months and it has had a huge impact across the entire technology ecosystem...
Mitigate against new home working cyber threats
As distributed work continues to become an everyday norm for countries around the globe, it is important for organisations to consider the impact this new work scenario is having upon the cyber-security landscape. IT leaders are being encouraged to deploy relevant...
How to avoid a ransomware attack
Ransomware attacks have become a massive problem for almost every industry and every organisation size. By Renee Tarun, deputy chief information security officer and vice-president: information security at Fortinet During the last year, criminals have attacked...
A reactive approach could leave your data vulnerable
The Protection of Personal Information Act (PoPIA) is now in full effect, after a lengthy introduction phase. This, added to the pressure of ongoing lockdowns necessitating continued remote working, is putting a lot of pressure on organisations when it comes to data...
Cloud monocultures elevate risks of cyberattack, service outages
The mass adoption of cloud services and the pressure to consolidate vendors along with the tightening of budgets due to the ongoing COVID pandemic is creating the risk of security monocultures that could put organisations at greater risk. By Brian Pinnock,...
Internal payments fraud on the rise and costing SA businesses
South African businesses, already under severe economic strain, are now counting the costs of rapidly increasing internal payments fraud. According to Ryan Mer, MD of eftsure Africa, the number of recent high-profile cases before the courts only partly reflects the...
POPIA shines spotlight on cybersecurity
With the Protection of Personal Information Act (POPIA) coming into effect from 1 July 2021, it is critical for organisations that have access to their clients' sensitive information to ensure measures are taken to protect them. This is especially true for accountants...
Awareness training vital for e-mail security
Awareness training should be actively deployed to complement organisations' efforts to secure their e-mail systems. François van Hirtum, chief technology officer of Obscure Technologies, says this is because hackers are increasingly targeting people as security...
Anomaly detection the first layer in data management and protection
Cybercrime incidents have surged in the last year, as malicious actors take advantage of the current global situation, including the work from home (WFH) trend. By Kate Mollett, regional director at Commvault Africa As IT has evolved, so too has ransomware, and...
An enterprise guide to not being phished
Phishing mitigation is everything. It's the end point, the touchpoint, the ultimate moment at which you're training and security strategies have prevented an employee from making that terrible mistake of clicking on that link, of exposing the business to attack. Anna...
How to embrace digital transformation, securely
Most organisations in business today understand the importance of digital transformation. The events of the past year or so in particular have accelerated it as an imperative, as organisations were forced to adapt to new, digital-first ways of doing things. By...
We are still building walls to defend against nuclear attacks
While the growing number of data breaches and cyber attacks on companies shows that organisations are often not adequately equipped to protect themselves against such threats, privacy regulations being rolled out in many countries, such as GDPR in Europe and PoPIA in...