Compliance does not equal security
Compliance does not equal security. Many organisations blur the distinction between compliance and security, and because the two concepts share common ground, many businesses believe that achieving compliance with industry regulations is the only measure needed to...
Boards need to manage cyber risk
South African business owners need to understand that cybersecurity is not just a technical consideration, but an enterprise-wide risk that needs to be addressed at board level. This according to Brian Browne, principal in Mazars' Cybersecurity Practice in the US, who...
Cybersecurity starts with training employees
The Petya ransomware attack that hit computers around the world recently, the second in two months, is yet another reminder that computers play key roles in most enterprises, and that it does not take much to disable those computers. Irrespective of how robust your...
Reduce your risk of identity theft
More than 15-million people are victims of identity theft annually, many of whom fall into the less tech savvy 50 and over age group. Moreover, identity theft is very hard to prevent because so much of our personal data resides outside of our control. Robert Brown,...
Digital trust: what’s it really worth?
Digital trust may appear to be a fairly meaningless buzzword, but in fact digital trust may prove to be the currency of the future, and failing to safeguard it could be a costly mistake, writes Paul Williams, country manager: southern Africa at Fortinet. Digital...
Anatomy of a ransomware attack
Ransomware is a type of malware that, as the name suggests, takes a user's data hostage and then holds it for ransom. If users do not pay the ransom, hackers threaten to delete their information. This type of malicious software is by no means a new phenomenon, writes...
Work Area Recovery vital to business continuity
With ever increasing climate challenges seen recently with the Western Cape Storms and the devastating Knysna fires, Work Area Recovery (WAR) facilities can become vital to ensure business continuity. Often organisations do not have the capabilities to insource all...
How safe is safe enough?
Senior engineer at F5 Networks, Martin Walshaw, provides tips for end users to avoid falling victim to phishing attacks. Did you know that 56% of all data breaches in 2016 began with a user clicking on a phishing email, giving hackers access to a corporate network?...
Testing drives business continuity, cyber resilience
Most organisations fail to appreciate the importance - and benefits - of testing when it comes to business continuity ... and cyber resilience. At ContinuitySA, client service manager Wayde Anderson says: "We live and breathe testing because we know that the only way...
Does co-location have a bigger part to play in cyber resilience?
Today's digitalised organisations are building resilience into ICT systems as a top priority. However, most organisations still see co-location as part of a disaster recovery plan. With cyber resilience becoming so critical co-location could have a greater role to...
Mimecast, PhishMe collaborate on cyber-resilience
Mimecast has collaborated with PhishMe to integrate its expansive security educational content to help organizations improve employee awareness of common email-borne attacks. Mimecast and PhishMe together provides customers with enhanced cyber resilience against the...
Successful cyber-resilience relies on executive sponsorship
Business is now almost entirely dependent on digital platforms, and cannot function if their ICT systems are impacted or attacked. So, in order to build a resilient business, cyber resilience needs special attention especially from executives. "If the lead does not...