How SMEs can set their defences against today’s cyber threats
What is the most dangerous trait of a cyberattack? Some use complex social manipulation to spear phish individuals. Others deploy weaponised artificial intelligence (AI) and sophisticated malware programmes to gain access and create chaos. By Hans-Peter Bauer, senior...
Are you covered for Email interception fraud?
Email interception fraud is on the rise and takes the form of criminals stealing information such as email usernames and passwords. It enables the fraudster to gain access to your business email accounts allowing them to impersonate you and the business. It provides...
Insurance companies weather the storm with threat alerts
Customers only engage with insurance companies during the claims process when something has been damaged - whether a home, a vehicle, or a business. And that's where weather intelligence can improve and enhance the customer experience, while saving insurance companies...
Never do these things on your company computer
At least 70% of employees admit to doing activities that are not work-related on their company computer. Although some employers may ignore your browsing habits, it is important to reconsider your activities on your work PC or laptop, particularly in light of...
Automation key to efficiency, risk mitigation, cost reduction in data management
Data management has become increasingly crucial in Africa, with the volume and significance of data growing at an unprecedented rate. By Kate Mollett, regional director at Commvault Africa As a result, the cost of handling and protecting this enormous volume of data...
What is data encryption?
Keeping information from unauthorised eyes is a practice as old as recording information. Regents would add their seal into wax to stop snoops from reading orders. Warring nations spend great expense and effort to break the codes of their opponents. And in the modern...
Cyber insurance won’t get your stolen data back
With the rampant rise in ransomware incidents, the likelihood of an organisation being successfully breached is now extremely high. As a result, many businesses have explored the option of cyber insurance in an effort to mitigate the risk. By Simeon Tassev, MD and QSA...
Ensure ERP software is secure in the wake of sophisticated cyberattacks
There's no question about technology's role in driving business evolution and revolution, but it also creates new layers of cyber-threats to organisations. By Marius Wessels, manager: professional services at Syspro Africa New technologies are driving up cybercrimes,...
Zero Trust Data Resilience model launched
Veeam Software has introduced Zero Trust Data Resilience (ZTDR), a model to help organisations reduce the risk of growing data security threats and improve their overall resilience. Developed in collaboration with Zero Trust expert Jason Garbis of Numberline Security,...

GenAI and its impact on payment fraud
The accessibility of generative AI tools has lowered the barriers for would-be criminals, while the transition to hybrid work models and geographically dispersed teams has expanded the attack surfaces they can exploit. In this context, the overlap of AI technology and...
Cybercriminals will prey on unwary consumers this festive season
While South African consumers are generally alert to common cyber scams such as fake e-commerce sites, there are many other ways cybercriminals could compromise consumers' digital security and financial well-being. This is the warning from committee members of the...
GenAI and its impact on payment fraud
The accessibility of generative AI tools has lowered the barriers for would-be criminals, while the transition to hybrid work models and geographically dispersed teams has expanded the attack surfaces they can exploit. In this context, the overlap of AI technology and...