A zero-trust approach to cybersecurity
Today's cybersecurity threats have matured well beyond viruses, and the stakes have grown too. While cyberattack on users' identities and bank accounts continue to dominate headlines, it is no longer just data that's at stake as the Internet of Things (IoT) continues...
Two-factor authentication an underutilised measure
Whenever a business considers the security measures it can implement, three options always crop up: antivirus on endpoints and servers to detect and eliminate as many threats as possible; backups to ensure that any data lost in an incident such as a ransomware attack...
IS launches cybersecurity education service
Internet Solutions has launched PhishNet to support corporate cybersecurity education efforts. PhishNet allows security teams to launch authentic phishing campaigns to their colleagues, bolstering training by demonstrating what a phishing lure looks like - and how...
More about the DBE’s hacking incident
The Department of Basic Education's website was recently hacked by the Islamic State, posting gory pictures and a message about the US Government. Following this incident, Bryan Hamman, territory manager for sub-Saharan Africa at Arbor Networks, has compiled a few...
Gemato offers biometrics, machine learning
Gemalto is launching the Gemalto Assurance Hub, a new approach to fraud prevention in online banking. Powered by machine learning, it analyses the profile and the behavior of customers in real time. The platform only activates additional authentication measures when...
Boosting cyber security skills
The shortage of security skills is a growing concern for SA businesses. Coupled with the increased sophistication and number of attacks, nation states and hacktivists, business face massive challenges in combatting cyber threats. "There are just not enough security...
Protect your system from ransomware
Another round of ransomware assault has just hit over 2,000 global targets, including Danish shipping company Maersk, US pharmaceutical company Merck, and many private and public institutions in Ukraine. Unlike WannaCry attack that hit seven weeks ago, the latest...
Top tips for preventing invoice fraud
Invoice fraud is becoming more common in South Africa, perhaps in response to worsening economic conditions. Detecting and successfully prosecuting this type of crime is difficult, but the losses can be very high. This is one case where prevention really is better...
Great expectations for new era of enterprise firewalls
The recent surge in network security preparedness has been driven by threats related to remote access employees - threats that penetrate and persist unnoticed - as well as rapid updates and integrated threat intelligence. This is according to Frost and Sullivan...
Preventing Petya – stopping the next ransomware attack
Check Point's Incident Response Team has been responding to multiple global infections caused by a new variant of the Petya malware, which first appeared in 2016 and is currently moving laterally within customer networks. It appears to be using the 'EternalBlue'...
Getting to grips with the Petya virus
Picture the scene: in parts of Africa and Europe, office workers are sitting at their computers when the instruction comes into their office mailboxes: "As a precautionary measure, turn off your Windows-based computer and do not use WiFi - the company is under attack...
Growing concern over global security
The recent WannaCry and Petya ransomware attacks over the space of a month have emphasised the importance of preventing system breaches, and of providing an immediate and structured response to breaches. Recent research in the UK indicates that ransomware attacks 44%...