What to do if someone tries to hack you
In today's connected world, it is a matter of when rather than if you will experience someone trying to hack you. With cybercriminals becoming more sophisticated in their attempts, it is possible that at some point or another you may interact with a scammer or click...

How to navigate the cryptocurrency security maze
In an era where the allure of cryptocurrencies captivates the imagination of the global market, the double-edged sword of the decentralised and unregulated nature of these digital assets presents opportunities and significant security challenges for businesses. This...
Businesses urged to prioritise prevention over paying ransoms
Ransomware is a serious threat that keeps changing to outsmart defences. As both businesses and individuals deal with more frequent and advanced attacks, it's crucial to understand how cybercriminals operate to better protect ourselves. By Brandon Rochat, regional...
Why does your business need endpoint protection?
In today's world, where digital technology is everywhere, keeping our online information safe is more important than ever. For businesses, this means paying special attention to something called endpoint protection. But what is an endpoint? Simply put, an endpoint is...
Almost half of SA SMEs are vulnerable to attacks
Millions of companies have been left vulnerable in the wake of the South African Companies and Intellectual Property Commission's (CIPC) recent cybersecurity breach which saw personal information being unlawfully accessed and exposed. A statement released by the...
CIPC hack could have serious consequences for SA organisations
The South African Companies and Intellectual Property Commission (CIPC) holds the registration details of companies, co-operatives and intellectual property rights within a vast database that comprises ID numbers, addresses, contact information and more. It has also...

CISO role evolves to one of strategic leadership
The role of the chief information security officer (CISO) has evolved significantly, prompting questions about reporting structures within organisations. By Simeon Tassev, MD and QSA at Galix. Traditionally, the CISO reported to the chief information officer (CIO),...
Choosing the right cybersecurity partner is non-negotiable in supply chain
Finding the right cybersecurity specialist ranks among a logistics firm's most important tasks. With South Africa now among the world's biggest cybercrime hotspots, these companies are scrambling to guard against new and highly sophisticated attacks. The ransomware...

Don’t gamble with your cybersecurity
The recent wave of cyberattacks targeting the global casino and hospitality industries has raised alarm bells. Carey van Vlaanderen, CEO of ESET South Africa, says smaller chains, online gaming sites and their customers are equally susceptible. Fortunately, there are...

Fortify data security to protect against cyberthreats and meet regulatory demands
As cyberthreats continue to rise and data becomes an increasingly valuable business commodity, South Africa's data regulation landscape is evolving, and businesses need to prioritise data security and privacy measures. By Modeen Malick, principal systems engineer at...
How to navigate the fusion of GenAI and digital defence
The convergence of Generative AI (GenAI) and cybersecurity has emerged as a critical battleground amid ongoing digital transformation. Mandla Mbonambi, CEO of Africonology, asserts that in this dynamic intersection, cybersecurity professionals stand at the forefront,...
Deception technology crucial to unmasking the silent theft of data
The "silent theft" of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation. By Iniel Dreyer, MD of Data...