These are some data security trends for 2023
Data is the new oil, the lifeblood of businesses - without access to critical data and systems, companies will stall at the roadside while their competitors race ahead. This is according to Byron Horn-Botha, Business Unit Head Arcserve Southern Africa, who advises...
Leverage SASE to deliver better security for a hybrid workforce
With more than 40% of companies globally planning to have adopted secure access service edge (SASE) before the end of this year, South African organisations must consider embracing this technology as a means to reduce the complexity of their existing cybersecurity...
Zero Trust will dominate cybersecurity in 2023
Hybrid work, the rise of the Internet of Things, and analysing data close to the edge mean traditional ways of safeguarding data are no longer sufficient. Zero Trust has emerged as a more proactive way for businesses to keep their systems, data, and networks protected...
Security goals to focus on in 2023
Working in cyber security can be draining. It's a high-pressure environment and the stakes are only getting higher. A recent report found that 45% of cybersecurity professionals have considered quitting over the constant threat of Ransomware attacks. By Danny Allan,...

Companies under siege as cyberattacks increase
Cybersecurity threats have become one of the biggest risks facing companies in 2022 – and this is only set to get worse. HP research shows that cyberthreats have grown by a staggering 300% year on year (YoY), with close to three-quarters of companies reporting they...
Open-source intelligence a new dimension in cybersecurity
When rebels shot down commercial passenger aircraft Malaysia Airlines Flight 17 in 2014, amateur online sleuths used social media posts to pinpoint the perpetrators and even the missile system used in the attack. More recently, at the start of the pandemic, a story...
MFA helps to secure online systems
The approach of the New Year is the ideal time to start investigating multifactor authentication (MFA), a layered approach to electronic security that requires two or more credentials to verify identity. South Africa's Internet Service Providers' Association (ISPA)...
Your data is being held hostage by cyber criminals. What now?
It's any company's worst nightmare - an employee in the organisation unknowingly downloads an email attachment containing malware, and within minutes your system has been hijacked and all your data encrypted. To make matters worse, the perpetrators are demanding a...
Cybersecurity is a process not a destination
If we are to understand the most important theme of the recent cybersecurity month, which as always, is accompanied by a host of articles around trends and best practice, it's pertinent to start with an analogy about our personal homes. By Antony Russell, chief...
Cloud security is a shared responsibility
With an increasing number of organisations moving their infrastructure and services to the cloud, many are adopting multi-cloud strategies, meaning that a host of different cloud computing and storage services are used in one heterogenous architecture. By Gerhard...
Stolen credentials a flourishing underground market
When you think about your social media accounts - for example, your Facebook password - does it have anything in common with your LinkedIn or bank account credentials? Does it have the same password as your business account? If so, you are not alone. According to a...
What does the rise of edge computing mean for cybersecurity?
As the number of users and devices connected at the 'edge' of a network continues to grow, organisations are increasingly distributing their computing ability and network resources closer to where those users and devices are located. By Prenesh Padayachee, chief...