Can we really fight AI cybersecurity threats with more AI?
In a world where artificial intelligence (AI) is increasingly being weaponised by cybercriminals, the question of whether we can effectively combat AI threats with more AI is not just a technical inquiry, but a pressing global concern, writes Lisa Strydom, senior...
Don’t let phishing emails steal your data
Email has become an integral part of daily life, but it’s also a prime channel for cybercriminals. Phishing scams – malicious emails designed to trick recipients into revealing sensitive information – are among the most prevalent threats. In South Africa, where...
How to safeguard against cybercrime
South Africa is a growing cybercrime hotspot on the African continent, with attacks on businesses becoming more common as well as increasingly sophisticated. Karen Rimmer, head of distribution at PSG Insure, highlights that the consequences of cybercrime can be...
Trust no-one: Making sense of zero trust for your business
Protecting small and medium-sized enterprises (SMEs) from cyber threats goes beyond traditional firewalls. A zero-trust approach is now essential, offering enhanced security against insider threats and risks associated with remote work. Despite the initial investment,...
35 years on, is ransomware still effective?
Ransomware has been around for 35 years, with the first known case involving the AIDS Trojan. This malware was spread using physical disks, pretending to be software to assess people’s risk of developing AIDS. Since then, ransomware has become a major cyber threat,...
Top cyber security controls for SMEs
There are a multitude of cyber security controls that businesses can implement and leverage to protect against cyber threats, but we’ve selected five of the best that are ideal specifically for SMEs. In today’s digital, data-driven economy, cyber security is the...
Make multi-factor authentication your personal cybersafety resolution
With South Africa’s Information Regulator on record as saying the country suffered at least 150 data breaches a month in 2024, South Africans must make Multi-factor Authentication (MFA) the non-negotiable centrepiece of their personal cybersecurity new year’s...
What is fake hacking and how can we protect ourselves?
In the high-stakes world of cybersecurity, the term “hacking” often conjures up images of sophisticated cyber threats and data breaches orchestrated by skilled attackers. However, a lesser-known but equally dangerous phenomenon is the rise of “fake hacking” - where...
Adopting human-centric security
As businesses adopt new technologies and adapt their ways of working to take advantage of the latest digitalisation trends, the unfortunate truth is that they are increasing their cyber risk. By John Penn, security propositions architect at BT Attacks like phishing,...
Protect you kids in the digital playground
As online gaming grows in popularity, children are increasingly spending time on apps that often encourage in-app purchases, especially during school holidays. While these purchases can enhance the gaming experience, they aren’t without risk says Carey van Vlaanderen,...
Bridge the security gap between risk and awareness
Much like the rest of the world, South Africa grapples with challenges emanating from a digital landscape fraught with escalating cyber threats that pose significant risks to businesses and other organisations. By Ryan Boyes, governance, risk and compliance officer at...
GenAI: key considerations for cybersecurity teams
The AI landscape is changing faster than ever, and this is especially true in cybersecurity. Many organisations in South Africa are now focusing their investments on application security, putting a significant emphasis on AI-driven solutions to boost their...