
What are MFA fatigue attacks and how can they be prevented?
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering...
How to spot a cyberattack if you aren’t a security pro
Business owners and executives dread receiving that call: criminals have breached their computer systems. It may happen in a flash, but this moment is often the culmination of days to months of moves by cybercriminals, finding ways into systems, gaining control, and...
Embedded physical, digital security needed in Africa’s oil and gas sector
Oil and gas play an important role in Africa's present and future prospects. In South Africa especially, local gas production is expected to grow at a CAGR of 48% by 2027, thanks in part to several recently discovered deposits off the country's coastline. By Marcel...
A growing imperative for cybersecurity transparency in African enterprises
As African governments and enterprises build momentum around digital transformation, they face mounting pressure not only to fortify their cybersecurity measures, but also to embrace transparency in disclosing cyberattacks. Bryan Hamman, regional director for Africa...
Cybersecurity concerns mount in mining arena
In today's digital era, the Internet's evolution and technologies like the Internet of Things (IoT) have equalised the cybersecurity landscape. No industry, including the mining sector, is exempt from cyber threats such as phishing, ransomware, malware, and financial...

Security intelligence needs AI and ML-powered data protection, risk response
From retail to government, private sector to financial services, organisations of all types and sizes are vulnerable to a constantly evolving threats. By Lourens Sanders, senior sales engineer at Commvault The consequences of a breach have also become increasingly...

The persistent threat of N-Day vulnerabilities
While zero-day exploits often dominate headlines, N-day exploits, which involve the use of long-standing and known vulnerabilities, may pose a significantly greater security risk to organisations. N-day vulnerabilities offer virtually free-for-all access to bad actors...
The impact of cybercrime on employee health and happiness
Not only is cybercrime bad for business, but employees also pay the price. Researchers have identified a correlation between the spectre of cybercrime and employee health and wellbeing. Stress, fear, and uncertainty are leading to poor health, such as burnout,...
Battling the persistent threat of N-Day vulnerabilities
While zero-day exploits often dominate headlines, N-day exploits, which involve the use of long-standing and known vulnerabilities, may pose a significantly greater security risk to organisations. N-day vulnerabilities offer virtually free-for-all access for...
What to do if someone tries to hack you
In today's connected world, it is a matter of when rather than if you will experience someone trying to hack you. With cybercriminals becoming more sophisticated in their attempts, it is possible that at some point or another you may interact with a scammer or click...

How to navigate the cryptocurrency security maze
In an era where the allure of cryptocurrencies captivates the imagination of the global market, the double-edged sword of the decentralised and unregulated nature of these digital assets presents opportunities and significant security challenges for businesses. This...
Businesses urged to prioritise prevention over paying ransoms
Ransomware is a serious threat that keeps changing to outsmart defences. As both businesses and individuals deal with more frequent and advanced attacks, it's crucial to understand how cybercriminals operate to better protect ourselves. By Brandon Rochat, regional...