Humans still the number one attack vector
With insider risk on the rise and Gartner predicting that 50% of organisations will have adopted an insider risk program by 2025, J2 Software recognises that enterprise security is only achievable when the cyber strategy is underpinned by the human element. The...
Virtual burglaries to shine light on why criminals work in pairs
Immersive virtual reality (VR) technology is being used in a new study to understand how and why burglars work in pairs or groups. Students at the University of Portsmouth are being asked to become burglars for the day. Student participant pairs will be tasked with...
What AI means for digital security
As AI technology like ChatGPT evolves, so do the strategies and tactics used by cybercriminals. Steve Flynn, sales and marketing director at ESET Southern Africa, says ongoing awareness is crucial in understanding how to manage potential cybersecurity challenges posed...
Why strong, unique passwords are important
Cyberattacks and data breaches are becoming alarmingly common. Most attacks and breaches have one thing in common: victims were using weak passwords. In a digital world, it is more important than ever to ensure your online accounts are protected by strong and secure...
For complex security landscape, best practices can be simple
Last year, Gartner identified the expanding attack surface due to remote work as one of the top concerning security trends. This leaves organisations more vulnerable to attacks and makes security more complex. Following network security best practice is crucial in...
Develop an effective ransomware response checklist
FortiGuard Labs' research shows that organisations in almost all areas around the world are possible targets for ransomware attacks. Therefore, it is important to keep in mind that no sector is safe from ransomware. By Anthony Giandomenico, vice-president: global...
Stay ahead of ransomware and bad actors
Data is arguably the most important business asset today, and it is also the chief target of ransomware, which, along with other cybercrime activities, is trending upward at an alarming rate. By Kate Mollett, regional director at Commvault Africa Faced with...
The anatomy of a scam
The rise in finance and accounting cybercrime through phishing and Business Email Compromise (BEC) has made headlines with massive implications for South African companies with gaps in their payment systems. "However, robust financial controls together with strong...
What is a data breach and how can you protect against it?
You may not be able to prevent a data breach from happening, but you can take steps to safeguard your personal information and minimise the risk of identity theft. By Gary Allemann, MD of Master Data Management Data breaches have become an increasingly common...
The power of biometrics
Biometric identification is nothing new. It has literally become a fabric of our everyday routine, with most of us having things like fingerprint recognition readily accessible on our mobile phone to stop others from accessing our device. In the corporate world...
Why humans should lead your business cybersecurity strategy
How do you get staff on board with security? By making it personal, writes Kevin Halkerd, senior risk and security analyst at e4. Most successful cyber breaches have one thing in common: People. Your company can be protected from every tech angle, with the latest...
Start the financial year digitally secure
With phishing, ransomware and other cyberattacks on the rise in South Africa, appropriately budgeting for cybersecurity is a must, as the benefits of having strong measures in place far outweigh the assumed expense of digital security, writes Steve Flynn, sales and...