Can you hack-proof the cloud?
For someone not working in cybersecurity, the most high-profile case of cloud hacking is, arguably, "celebgate" - or the 2014 breach of several device-storage accounts that saw hundreds of personal photos of celebrities stolen and published online. For cybersecurity...
Ransomware? Hack? Plan, don’t pay
It's impossible to read the news without seeing at least one headline blaring about a breach, hack or attack. In the USA, the Colonial Pipeline experienced a Darkside ransomware attack that affected more than 10 000 gas stations. Virgin Active was hit by a hack early...
UK’s Prudential Regulation Authority adds technology escrow as a resiliency option
The UK's Prudential Regulation Authority (PRA) has included software and technology escrow as resiliency options for firms to consider when undertaking business continuity and exit planning. This is the first time an escrow agreement has been included on the PRA's...
An alarming number of SA enterprises have a resiliency gap
Covid-19 and the subsequent need for remote working has resulted in more companies pursuing multi-cloud strategies and moving more of their data, workloads and applications into the cloud quickly. However, many companies, particularly small businesses, weren't ready...
Protect against evolving ransomware attack trends
Ransomware attack trends continue to evolve, and the current iterations are no exception. By Derek Manky, chief: security insights and global threat alliances at Fortinet's FortiGuard Labs During the last year, malicious actors have attacked healthcare organisations,...
CIOs can embed resilience in their business
The Covid-19 pandemic presented a moment of truth for companies, many of which were not as streamlined and resilient as they once thought. By Robin Fisher, senior area vice-president of Salesforce Emerging Markets While some companies may previously have seen digital...
Screen-scraping can leave you vulnerable to fraud
Businesses are often unaware that by giving a third-party or software programmes access to their financial information, they are potentially being exposed to the risk of screen scrapping. Screen-scrapping is part of a process when purchasing online and are prompted to...
Passwords are 60: time for them to go
It's been 60 years since passwords were first used at MIT and, if the number of breaches in the news are anything to go by, we are no more adept at managing our passwords than we were in 1961. But, while passwords are being phased out, IT leaders can fortunately rely...
Risk management a vital aspect of enterprise development
Supplier and enterprise development is a vital issue, ensuring that large enterprises 'pay it forward', by helping to grow the skills and abilities of those smaller suppliers in the supply chain that may otherwise never have had such opportunities for improvement and...
Your data may be ready, but are your people?
With the staggering pace of innovation in enterprise technology, it's all too easy to overlook the role of employees whose job is to process, interpret and action the data emanating from these systems. Dr Anne Hsu is a behavioural psychologist and computer science...
Ransomware spike drives backup-as-a-service
With an ever-growing number of people working from home, primarily due to the global Covid-19 pandemic, cybersecurity attacks are on the rise, meaning that dealing with security risks is an ongoing journey for enterprises. By Kate Mollett, regional director of...
How companies can deal with the threat of cybercrime
Organisations should harden security, educate their workforce and shore up their last line of defence, writes Ian Engelbrecht, Africa lead and systems engineer at Veeam. Cybercrime is on the rise and South African C-suites would do well to ensure that they have...