Why you should use a pseudonym at Starbucks
Innocently providing your name at your local coffee shop is just an example of how easy it can be for miscreants to cut through the 'privacy' of social media accounts, says Carey van Vlaanderen, CEO at ESET South Africa. When Starbucks introduced personalising the...
Communication missing in physical and IT security integration
Better communication is the key to integrating physical and IT security in enterprises today. This is according to Charl Ueckermann, CEO at AVeS Cyber Security, who says physical and IT security resources have traditionally been treated as separate disciplines. As...
Kaspersky Lab automates training platform
In 2017, 59% of South African companies attributed weaknesses in their IT security strategy to the careless actions of employees. With staff training seen as an important way to reduce cybersecurity incidents, finding the most efficient approach remains a pain point...
Naspers warns of e-book scam
The Naspers Group has been made aware of a scam targeting members of the South African public. Victims of the scam receive an e-book via social media channels such as WhatsApp and Telegram, which describes Naspers as "a registered online trading platform". As part of...
Security predictions for 2019
NetScout Arbor, which specialises in advanced distributed denial of service (DDoS) protection solutions, has released its security predictions for this year, against a background which saw the largest ever DDoS attacks being unleashed in 2018. Bryan Hamman, territory...
Is your business getting its priorities right?
If 77% of cyberattacks happen through apps, why do companies spend 90% of their security budget securing the perimeter of their systems? F5 Networks revealed this statistic back in 2016, and yet businesses don't seem to have changed their spending priorities. By...
A cybersecurity checklist for African SMEs
Email is still an organisation's weakest point, with 91% of attacks starting with email-based phishing attacks. And they're not going away. In fact, 90% of global organisations have seen an increase in the volume of phishing attacks in the last year. By Heino Gevers,...
Carbon Black receives five-star customer ratings
Carbon Black customers have given a thumbs-up to the company in a recent Gartner Peer Insights review. Carbon Black, a leader in next-generation endpoint security delivered by the cloud, received 112 five-star ratings from customers in the January 2019 Gartner Peer...
Safer Internet Day: better together
Yesterday was Safer Internet Day - a call for collaboration that comes at a time when corporate privacy scandals, global ransomware epidemics, nation-state attacks and the regrettably fast-expanding cybercriminal world all threaten to tear the internet apart....
A continuous approach to privileged access management
When we think of insider threats, the image that comes to mind is often that of a disgruntled employees looking to cause damage to an organisation. However, these threats are caused by honest mistakes more often than not, says Byron Davel, product manager at Credence...
Old IoT vulnerabilities — a botnet gift that keeps on giving
The first thing anyone purchasing any device that connects to the Internet should do upon switching it on for the first time, is immediately update it. If you don't, you risk having it hijacked by a botnet. So says Bryan Hamman, territory manager for sub-Saharan...
Security implications for 5G and IoT
The advent of 5G networks is about much more than just incredibly fast speeds and more reliable connections, writes Doros Hadjizenonos, regional sales director for Fortinet in South Africa. When combined with today's powerful edge devices -- whether consumer-grade...