Microsoft 365 security is a ticking time bomb
Across boardrooms and IT departments, a dangerous assumption continues to grow that because data resides in Microsoft 365 and Azure it is automatically secure, writes John Mc Loughlin CEO of J2 This belief is fundamentally flawed and creates a false sense of...
The real ROI of security: Moving beyond cost to performance
In South Africa, security is still widely viewed as a grudge purchase, a necessary expense rather than a strategic investment. Too often, buying decisions focus on upfront price, with the assumption that most security products offer similar protection. But the reality...
Ransomware is shifting targets – and many organisations are not prepared
Ransomware attacks are evolving rapidly, moving beyond the simple encryption of files to target the systems organisations rely on to recover from an attack. According to Phila May, executive GTM at inq. Digital, this shift is forcing technology leaders to rethink how...
MDR helps SA businesses stay ahead of attackers
At the start of 2024, a Hong Kong finance worker at a multinational firm joined what appeared to be a routine video call with senior leadership. The call included people who looked and sounded like the company's UK-based CFO and other executives, but they were...
Why digital trust matters for African SMEs
For years, security for SMEs across sub-Saharan Africa meant metal grilles and alarm systems. Today, the most significant risks are invisible and growing faster than most businesses realise, writes Andrew Bourne, regional head of Zoho South Africa. Artificial...
Why cybersecurity awareness is failing, and what to fix first
South African businesses are investing heavily in cybersecurity technology. Detection tools are becoming more sophisticated, monitoring is more advanced, and response capabilities are faster. Yet most breaches still begin with a human error, writes Charmé van der...
Is this the calm before the cyberstorm?
No one enters the cybersecurity sector expecting serenity. The pace is relentless, and the stakes are high. By Brendan Widlake, regional director of Veeam Software South Africa According to the World Economic Forum, the weekly number of cyberattacks has more than...
Shadow IT is a symptom of friction, not rebellion
The use of unapproved apps and systems inside an organisation, known as Shadow IT, is often viewed as a rebellious act by employees looking to break the rules. The reality is far more nuanced. Shadow IT is rarely malicious; it is usually a quite rational decision made...
Cybersecurity awareness is a behavioural discipline, not an IT project
An employee receives an email from a Gmail address asking for payslips. It feels routine, and without hesitation, the attachment is sent. Or the employee can pause, verify the sender, and confirm the request. This is just one of many similar moments that determine...
The AI-SOC paradox: High hopes confront implementation hurdles
Almost all companies planning to establish a Security Operations Centre (SOC) regard artificial intelligence (AI) as a must-have component. However, despite high expectations, organisations face significant challenges in deploying and operationalising AI effectively....
SA CISOs facing burnout epidemic. AI is the cause – and solution
South African CISOs are operating in a perfect storm. The rising volume and sophistication of attacks, constrained budgets, and a deepening skills shortage are adding to the mental strain of alert fatigue and the growing expectations from boards. While AI holds a...
AI is silently turning into your organisation’s biggest cyber threat
AI didn’t storm in with board approval or a security checklist, writes By John Mc Loughlin, CEO of J2. It crept in unnoticed, drafting emails faster than you can read them, generating code on the fly, automating workflows behind the scenes, and empowering support...