Common Facebook Marketplace scams and how to avoid them
Last year, Facebook Marketplace passed 1-billion global users. With this, it has become a giant in the consumer-to-consumer commerce space, allowing individual Facebook users to buy and sell seamlessly. Carey van Vlaanderen, CEO of ESET South Africa shares critical...
Understanding cybersecurity in the post-pandemic era
Prior to the Covid pandemic, employees would access data from within the office environment through a secure, centralised on-premises network. By Ian Engelbrecht, system engineering manager at Veeam Africa As remote and hybrid work became the norm, the attack surface...
Technology Education Day: teaching younger generations about cybersecurity
Technology Education Day (today, 23 September) assumes more significance than ever as so much course work and classroom teaching relies on digital platforms. No matter what field of study they choose, be it engineering or business, there is no way students can...
IT security at the heart of smart cities
South Africa is currently in the process of developing smart cities - one in Gauteng and one in the Eastern Cape. More will surely follow as this is the future of living; where technology and connectivity are deeply ingrained in the processes of daily life. By Wandile...
How to fortify your security strategy
Digital transformation presents a strong opportunity to harness the power of data. However, it brings certain challenges to the fore including an organisation's ability to be secure and resilient. By Michel Nader, senior regional director: data protection and cyber...
AI, ML, digital assistants transform how SMBs address cyberattacks
The cyber threat landscape for businesses of all sizes is terrifying. According to the World Economic Forum, risks are increasing exponentially, while the rate of detection and prosecution is frighteningly low at a rate of below 1%. Organisations, especially small...
Zero day: the wide-open door
Zero-day exploits are becoming more common and more vicious and this is why you should be worried. A zero-day exploit is a cyber-attack that does precisely what the name suggests - it exploits a previously unknown vulnerability to gain access to a system, platform,...
Identity proofing allows easy virtual ID checks, but exercise caution
The Covid pandemic saw virtual identity checks become the norm. But not all identity proofing methods are created equal - some of the mainstream options fall far short of best practice guidelines. By choosing the right methodology and technology, CIOs and security and...
The mobile malware landscape in 2022
Cyberattacks are increasing in number all the time, writes Pankaj Bhula, EMEA regional director: Africa at Check Point. Indeed, our 2022 Mid-Year Report revealed a 42% global year-on-year increase in attacks and according to the World Economic Forum's 2022 Global Risk...
These are the most dangerous RansomOps attackers
Ransomware gangs have really upped their game in the last few years, generating billions in paid ransoms from public and private sector organisations. By Brandon Rochat, sales director: Africa at Cybereason The gangs have increased attacks on critical infrastructure...
Should you pay ransom settlements?
Ransomware is one of the top threats facing organisations and individuals today. In fact, according to a recent survey, 85% of organisations are more worried about a ransomware attack than any other cyber threat. By Aamir Lakhani, global security strategist and...
Kaspersky shares a guide to top ransomware techniques
In Q2 2022, ransomware remains one of the main threats towards information security, and the META region is not an exception. One of the most notable cases includes attacks on Shoprite, the largest retail chain in Africa. Other examples of aggravating situation with...