The ‘PITfalls’ in SARS’ 2017 Tax Statistics
National Treasury and the South African Revenue Service released the 10th annual edition of the tax statistics for South Africa on 12 December 2017. By Des Kruger, partner and Wesley Grimm, candidate attorney at Webber Wentzel The document provides data on the key...
SA organisations must prioritise security in 2018
Cyber-attacks are as old as technology itself. But even as organisations implement better ways to safeguard themselves and their data, malware evolves to become more sophisticated. The reality is that breaches will happen. It is how the organisation can mitigate those...
Cyber-predictions for 2018
Doros Hadjizenonos, country manager of Check Point South Africa, looks at the wider cybersecurity-related issues impacting our daily lives that we can expect to emerge over the coming year. As the publisher Arnold H Glasow put it, “The trouble with the future is that...
Keep children safe online
This festive season many youngsters will be receiving phones or tablets from Santa. In today's technology dominated world, it's quite normal to be concerned with your child's safety online. The digital age is here to stay and security for children will be a continuing...
Cybersecurity predictions for 2018
Online security is seemingly getting more compromised with each passing year. 2017 has witnessed some of the worst security breaches in history -- such as the breach of Equifax, which impacted over 143-million clients in the US and abroad. There were also three major...
Budgeting for security in 2018
The industry at large has tightened its belts this year, and as we head into 2018 if 2017 has taught us anything then it is that we can't afford to skimp on cybersecurity. In fact, in 2017 so many businesses have had to make do with fewer resources to combat a much...
Hacking public WiFi
Public WiFi is great in so many ways. It costs nothing, saves on mobile data, and is often faster when it comes to downloading. However, as much as we love the convenience, hackers love public WiFi too, and for different reasons. Nastassja Poorter, enterprise sales...
Google Cloud Platform users get Gemalto security
Gemalto providing Google Cloud Platform customers with the ability to manage and maintain full control of their encryption keys on Google Cloud Platform. Gemalto's SafeNet Luna Hardware Security Module (HSM) and SafeNet KeySecure now both fully support Google Cloud's...
A chilling portrait of the cyber-threat landscape
The cybercrime space is advancing so rapidly, it can be a challenge to keep up. Experts from world-leading security vendor, Check Point, provide a detailed look at the current threat landscape and, most importantly, what companies need to know. If when you picture...
ESET, Microsoft help disrupt Gamarue botnets
Security researchers at ESET, in collaboration with Microsoft and law enforcement agencies -- the Federal Bureau of Investigation (FBI), Interpol, Europol, and other stakeholders in cybersecurity -- have taken down a major botnet operation known as Gamarue (detected...
Two-factor authentication should be a staple
The tools for two-factor authentication have been available for about a decade and in an era of increasing cyber crime, fraud and identity theft, two layers of authentication at least should be a staple for security. But it is not. While some are already graduating to...
Use Computer Security Day to strengthen resilience
All organisations should use Computer Security Day on 30 November 2017 as an opportunity to improve their ability to recover from disaster. This is according to Padma Naidoo, head: advisory services at ContinuitySA, who adds: "Computer Security Day was inaugurated in...