Unemployed grads are closing the global cybersecurity skills gap
The race to embrace digitalisation has created a pressing challenge - a worldwide cybersecurity skills gap, leaving businesses and society vulnerable to the constant threat of cybercrime and malicious attacks. By Martin Pienaar, chief operations officer at Mindworx...
Think like a hacker to stay ahead of cyber threats
In today's rapidly developing digital landscape, cyber security teams must move away from purely reactive defence measures and start adopting a more proactive mindset. By Dale de Kok, systems engineer at Fortinet Thinking like a hacker is crucial for organisations to...
Tips for protecting your identity online
When engaging in online activities, one cannot ignore the inherent risks involved. Whether you're accessing information, interacting with a company or buying a product or service, your data is being stored and then possibly shared with others. If it gets into the...
Security innovations never stop
During the recent Huawei Eco-Connect Sub-Saharan Africa 2023, Steven Zhao, vice-president of Huawei's Data Communication Product Line, delivered a keynote speech outlining the security threats facing networks today. The speech, which was titled "Huawei Intelligent...
Should your organisation be using EDR?
How secure are the devices that access your company networks? Can you rest easy, knowing that something is monitoring threats that exploit people's laptops and smartphones? Most organisations are not as secure as they believe. Phishing in particular diminished most...
Threat actors add .zip domains to their phishing arsenals
Phishing has been a digital thorn in the side of cybersecurity for over a decade. These unsolicited, cleverly masked requests are the wolf in sheep's clothing of the digital world. They are always looming, waiting for some unsuspecting employee to click on a malicious...
Industry urgently needs to implement robust cyber security strategies
A common misconception is that both cyberattacks and cybersecurity controls are sophisticated and complex. "In fact, the methods criminals use to infiltrate industrial networks are often relatively straightforward," warns Charles Blackbeard, business development...
Next-generation data protection is critical
The value of data has increased exponentially, to the point where becoming a victim of cybercrime is no longer an if, but a when. By Kate Mollett, senior director at Commvault Africa The reality is that your environment will be breached at some point because...
Employee mistakes still the biggest cybersecurity threat
With almost 88% of data breaches being caused by an employee mistake, a strong human risk management programme with regular employee training and cybersecurity awareness is critical, writes Carey van Vlaanderen, CEO of ESET Southern Africa. Ask any cybersecurity...
How to strengthen data security for Office 365
Amid an alarming rise in ransomware attempts and cloud data security breaches globally, it's important for businesses to reassess their data protection strategies for Microsoft Office 365. Despite Microsoft's robust and secure infrastructure, businesses must not...
Individual digital identity holds potential
The way we perceive business flourishing is undergoing a paradigm shift as digital identity and consumer consent redefine the dynamics of transactions. Shanaaz Trethewey, chief operating officer of Comcorp South Africa, emphasises the pivotal role of individuals'...
Ethical hacking: when white hats turn grey
What colour hat is the hacker that just penetrated your organisation without your permission wearing? Grey? Black? White? Hacking is often seen as a black-and-white issue: either you are a malicious hacker who breaks into systems for personal gain, or you are an...