Make multi-factor authentication your personal cybersafety resolution
With South Africa’s Information Regulator on record as saying the country suffered at least 150 data breaches a month in 2024, South Africans must make Multi-factor Authentication (MFA) the non-negotiable centrepiece of their personal cybersecurity new year’s...
What is fake hacking and how can we protect ourselves?
In the high-stakes world of cybersecurity, the term “hacking” often conjures up images of sophisticated cyber threats and data breaches orchestrated by skilled attackers. However, a lesser-known but equally dangerous phenomenon is the rise of “fake hacking” - where...
Adopting human-centric security
As businesses adopt new technologies and adapt their ways of working to take advantage of the latest digitalisation trends, the unfortunate truth is that they are increasing their cyber risk. By John Penn, security propositions architect at BT Attacks like phishing,...
Protect you kids in the digital playground
As online gaming grows in popularity, children are increasingly spending time on apps that often encourage in-app purchases, especially during school holidays. While these purchases can enhance the gaming experience, they aren’t without risk says Carey van Vlaanderen,...
Bridge the security gap between risk and awareness
Much like the rest of the world, South Africa grapples with challenges emanating from a digital landscape fraught with escalating cyber threats that pose significant risks to businesses and other organisations. By Ryan Boyes, governance, risk and compliance officer at...
GenAI: key considerations for cybersecurity teams
The AI landscape is changing faster than ever, and this is especially true in cybersecurity. Many organisations in South Africa are now focusing their investments on application security, putting a significant emphasis on AI-driven solutions to boost their...
Check Point Infinity XDR/XPR achieves 100% detection rate
Check Point Software Technologies’ Infinity XDR/XPR achieved a 100% detection rate in the rigorous 2024 MITRE ATT&CK Evaluations. During the evaluation, Infinity XDR/XPR detected all 57 applicable attack steps, with 56 detections at the technique level. "In an era...
Strong leadership crucial in building a security-conscious organisation
Let’s face it, technology alone is not enough to protect against ever-evolving cyber threats. Effective cybersecurity requires strong leadership. Leadership must foster a culture of security, make informed strategic decisions, and guide organisations through the...
Third-party providers contribute to a culture of support and awareness
Cybersecurity is often viewed through the lens of technology – firewalls, encryption, and antivirus software are the tools we typically rely on to protect our digital environments. By Nemanja Kristic, operations manager: managed security services at Galix, and...
Don’t let tax fraudsters spoil the holidays
While it is the season to be jolly, it’s also a time for caution, as South Africans face a heightened risk of tax scams during this period. “People are more relaxed this time of year and tend to let their guard down, making them easy targets for tax fraudsters,” says...
Kaspersky joins global alliance on AI
Kaspersky has announced that it has joined the Global Alliance on Artificial Intelligence for Industry and Manufacturing (AIM Global), launched by the United Nations Industrial Development Organisation (UNIDO). This strategic collaboration reflects the company’s...
Mindfulness is key in thwarting cyberattacks
Up to 90% of all successful cybersecurity attacks involve social engineering; exploiting human vulnerabilities. While technical measures like strong passwords and anti-virus updates are crucial, cultivating mindfulness can be an equally powerful defence against these...