Tips for protecting your identity online
When engaging in online activities, one cannot ignore the inherent risks involved. Whether you're accessing information, interacting with a company or buying a product or service, your data is being stored and then possibly shared with others. If it gets into the...
Security innovations never stop
During the recent Huawei Eco-Connect Sub-Saharan Africa 2023, Steven Zhao, vice-president of Huawei's Data Communication Product Line, delivered a keynote speech outlining the security threats facing networks today. The speech, which was titled "Huawei Intelligent...
Should your organisation be using EDR?
How secure are the devices that access your company networks? Can you rest easy, knowing that something is monitoring threats that exploit people's laptops and smartphones? Most organisations are not as secure as they believe. Phishing in particular diminished most...
Threat actors add .zip domains to their phishing arsenals
Phishing has been a digital thorn in the side of cybersecurity for over a decade. These unsolicited, cleverly masked requests are the wolf in sheep's clothing of the digital world. They are always looming, waiting for some unsuspecting employee to click on a malicious...
Industry urgently needs to implement robust cyber security strategies
A common misconception is that both cyberattacks and cybersecurity controls are sophisticated and complex. "In fact, the methods criminals use to infiltrate industrial networks are often relatively straightforward," warns Charles Blackbeard, business development...
Next-generation data protection is critical
The value of data has increased exponentially, to the point where becoming a victim of cybercrime is no longer an if, but a when. By Kate Mollett, senior director at Commvault Africa The reality is that your environment will be breached at some point because...
Employee mistakes still the biggest cybersecurity threat
With almost 88% of data breaches being caused by an employee mistake, a strong human risk management programme with regular employee training and cybersecurity awareness is critical, writes Carey van Vlaanderen, CEO of ESET Southern Africa. Ask any cybersecurity...
How to strengthen data security for Office 365
Amid an alarming rise in ransomware attempts and cloud data security breaches globally, it's important for businesses to reassess their data protection strategies for Microsoft Office 365. Despite Microsoft's robust and secure infrastructure, businesses must not...
Individual digital identity holds potential
The way we perceive business flourishing is undergoing a paradigm shift as digital identity and consumer consent redefine the dynamics of transactions. Shanaaz Trethewey, chief operating officer of Comcorp South Africa, emphasises the pivotal role of individuals'...
Ethical hacking: when white hats turn grey
What colour hat is the hacker that just penetrated your organisation without your permission wearing? Grey? Black? White? Hacking is often seen as a black-and-white issue: either you are a malicious hacker who breaks into systems for personal gain, or you are an...
Digital immunity the next goal for cybersecurity
Amid rapid change and evolution of cyberrisk, traditional approaches to cybersecurity and cyber resilience are no longer enough to protect organisations. By Gary Jardim, sales and marketing manager at Triple4 Global A new model is emerging, in which organisations...
Reverse Engineering the most complicated cybersecurity task, Kaspersky contest finds
The latest Codebreakers competition organised by Kaspersky among cybersecurity specialists from more than 35 countries including the UAE, Saudi Arabia, Turkiye, and South Africa has revealed that reverse engineering is the most complex task performed by InfoSec...