Modern KPIs for effective cybersecurity
Faced with increasingly frequent and sophisticated cyber-attacks, enterprises are scrambling to put technologies and processes in place to effectively detect and combat cyber risks. By Martin Potgieter, technical director at Nclose Research by Symantec found that...
Turning cyber threat into cyber opportunity
The network of connected sensors, devices, and appliances commonly referred to as the Internet of Things (IoT) has completely changed the way business works. This is as true of the heavy hauling and freight industry as any other. At any moment, various players in the...
Striata inks partnership with UK-based Communisis
Striata, a digital communications and document security specialist, has inked a partnership deal with UK-based customer communications specialist Communisis. As a result of the partnership, the two companies have created an integrated solution that helps companies in...
Panda Dome offers adaptive security
Panda Security, has simplified its solution offering bringing together its product range with new Panda Dome. Thw 100% customisable platform adapts to users changing needs in order to protect them against advanced threats. Panda Dome provides a resilient yet flexible...
Go phish …
Phishing is one of the oldest cons on the books, and still one of the more popular tools of cyber criminals. Cyber criminals want access to your details and the easiest way to get hold of them is by convincing you that they are someone else - like your bank or a...
PwC launches OT cybersecurity competency
Worldwide, cyber threats have become increasingly sophisticated and complex. As organisations embrace new technologies without fully understanding the implications these may have on the entire enterprise, they are rendering themselves susceptible to an array of...
Preventing network breaches is vital
South Africa has had its share of high profile security breaches. Cyber criminals have targeted prominent businesses such as Ster Kinekor and Master Deeds in 2017, and most recently, Liberty Holdings earlier this year. With GDPR now in effect, companies with...
Who’s responsible for data security in the cloud?
When moving data into the cloud, organisations should be aware that it is the responsibility of the information owner to ensure that holistic protection and clear visibility is in place, to avoid security breaches. Says Riaan Badenhorst, GM of Kaspersky Lab Africa:...
Human error the main cause of data breaches
With news headlines regularly announcing a new data breach, one wonders whether hackers are becoming more skilled and bolder, or whether organisations are not taking the security of the information they process seriously. Unfortunately, what businesses may not realise...
Is IoT risky business?
Where there is technology at play, you can be pretty sure there will be associated risks and the Internet of Things (IoT) has not been immune to these. The initial risk the IoT industry faced was that they would move too fast and technology adoption would outpace...
Lack of confidence can cost you more than you think
The European Union's General Data Protection Regulation (GDPR) came into effect almost two months ago. Leading the way to a new era of data protection, the long-awaited GDPR has emphasized the importance of data security more than ever before. Besides tarnishing their...
Cyber-crime attacks on SMEs on the increase
Cyber-crime is a real and present danger and attacks are becoming increasingly common and more sophisticated, especially among small to medium-sized businesses (SMEs). It is estimated that 32% of South African businesses have experienced cyber-attacks according to the...