Awareness training vital for e-mail security
Awareness training should be actively deployed to complement organisations' efforts to secure their e-mail systems. François van Hirtum, chief technology officer of Obscure Technologies, says this is because hackers are increasingly targeting people as security...
Anomaly detection the first layer in data management and protection
Cybercrime incidents have surged in the last year, as malicious actors take advantage of the current global situation, including the work from home (WFH) trend. By Kate Mollett, regional director at Commvault Africa As IT has evolved, so too has ransomware, and...
An enterprise guide to not being phished
Phishing mitigation is everything. It's the end point, the touchpoint, the ultimate moment at which you're training and security strategies have prevented an employee from making that terrible mistake of clicking on that link, of exposing the business to attack. Anna...
How to embrace digital transformation, securely
Most organisations in business today understand the importance of digital transformation. The events of the past year or so in particular have accelerated it as an imperative, as organisations were forced to adapt to new, digital-first ways of doing things. By...
We are still building walls to defend against nuclear attacks
While the growing number of data breaches and cyber attacks on companies shows that organisations are often not adequately equipped to protect themselves against such threats, privacy regulations being rolled out in many countries, such as GDPR in Europe and PoPIA in...
Can you hack-proof the cloud?
For someone not working in cybersecurity, the most high-profile case of cloud hacking is, arguably, "celebgate" - or the 2014 breach of several device-storage accounts that saw hundreds of personal photos of celebrities stolen and published online. For cybersecurity...
Ransomware? Hack? Plan, don’t pay
It's impossible to read the news without seeing at least one headline blaring about a breach, hack or attack. In the USA, the Colonial Pipeline experienced a Darkside ransomware attack that affected more than 10 000 gas stations. Virgin Active was hit by a hack early...
UK’s Prudential Regulation Authority adds technology escrow as a resiliency option
The UK's Prudential Regulation Authority (PRA) has included software and technology escrow as resiliency options for firms to consider when undertaking business continuity and exit planning. This is the first time an escrow agreement has been included on the PRA's...
An alarming number of SA enterprises have a resiliency gap
Covid-19 and the subsequent need for remote working has resulted in more companies pursuing multi-cloud strategies and moving more of their data, workloads and applications into the cloud quickly. However, many companies, particularly small businesses, weren't ready...
Protect against evolving ransomware attack trends
Ransomware attack trends continue to evolve, and the current iterations are no exception. By Derek Manky, chief: security insights and global threat alliances at Fortinet's FortiGuard Labs During the last year, malicious actors have attacked healthcare organisations,...
CIOs can embed resilience in their business
The Covid-19 pandemic presented a moment of truth for companies, many of which were not as streamlined and resilient as they once thought. By Robin Fisher, senior area vice-president of Salesforce Emerging Markets While some companies may previously have seen digital...
Screen-scraping can leave you vulnerable to fraud
Businesses are often unaware that by giving a third-party or software programmes access to their financial information, they are potentially being exposed to the risk of screen scrapping. Screen-scrapping is part of a process when purchasing online and are prompted to...