Cybersecurity awareness and training must be ongoing
Even if your company missed out on Cyber Awareness Month in October, it is never too late to empower your HR and IT departments with tailormade training programmes. This is according to Isabel Adams, people enablement director at AVeS Cyber Security, whoch recently...
How AI voice deepfake tools used in cyber fraud can fool you
The Beatles have once again delighted millions of fans around the world by releasing a new song, all possible thanks to artificial intelligence (AI), combining parts of an old recording while also improved its audio quality. While there is joy at the band's...
AI a double-edged sword for SMB cybersecurity
Small and medium-sized businesses (SMBs) should take cybersecurity seriously because they increasingly becoming prime targets for cyberattacks. While these businesses may not have the extensive resources of large corporations, they often hold valuable customer data...
Passkeys will offer passwordless, unphishable web browsers
South Africans have become used to excellent in-app security when it comes to banking and other online transactions. Looking ahead, passkey technology will mean we could soon enjoy the same unphishable, biometric-based solution in the browser, boosting consumer...
Embedding a culture of security
Security culture. This is more than training employees, sneaking fake phishing tests and putting cybersecurity on the budget. It's a culture of using security solutions as part of the very fabric of the organisation to reduce vulnerabilities and ensure the...
Strong passwords for a better Black Friday
The digital era we live in is a double-edged sword. While it offers convenience and accessibility, it also poses risks, especially when it comes to our personal data and online security. One critical aspect that is often underestimated is the power of using strong...
Beware of changing cybercrime tactics
The recent discovery of a technique to brute-force fingerprints on Android phones gives a forewarning of emerging cyber risks that are harder to counter. This is according to Kevin Mortimer, CEO of Triple4, who says the recent BrutePrint study by Chinese researchers...
Embrace the power of APIs in cybersecurity
In the fast-evolving landscape of cyber security, the intersection of technology and security has become imperative. By Sarthak Rohal, vice-president: IT services at In2IT Technologies Within this dynamic realm, application programming interfaces (APIs) have risen to...
Gut instinct can protect you against scams
The global economy has worsened, placing an ever-tightening squeeze on households. Because of this, fraudsters have become more determined, and people are more desperate to make a quick and easy buck. Fraud continues to increase for South Africans as consumers fall...
What motivates cybercriminals?
Who are the hackers plaguing businesses and individuals with a relentless cycle of attack and manipulation? By Heino Gevers , senior director: customer support at Mimecast According to Mark T Hofmann, a business psychologist that specialises in profiling...
Turn the browser into a security endpoint
As a consumer application, the web browser has long created security challenges for enterprises. The enterprise browser is set to change that, writes Patrick Evans, CEO of SLVA Cybersecurity. It is ironic to note that the browser has become the most commonly used...
Why companies should transition to ZTNA and SWG
As we celebrate Cybersecurity Awareness Month, terms like Secure Access Service Edge (SASE), Security Service Edge (SSE), Zero Trust Network Access (ZTNA), and Secure Web Gateway (SWG) are increasingly being bandied about boardroom tables across South Africa. But do...