Putting the safe into social.
In February 2021, the data from 500-million LinkedIn users was leaked by hackers. In June 2021, more than 700-million LinkedIn users had their data leaked and put up for sale. In June 2022, the FBI said that the fraud on LinkedIn posed a significant threat to the...
Huawei endeavors to help operators deploy and operate networks with high resilience
By Syed Jawad Imam Jafri, Cyber Security and Privacy Officer (CSPO), Huawei South Africa - In terms of business operations, it is imperative for Huawei to follow the security design principles of attack and defense. Specifically, enhanced cyber resilience based on...
Huawei’s 5G security assurance above standards for the core network
By Syed Jawad Imam Jafri, Cyber Security and Privacy Officer (CSPO), Huawei South Africa - Huawei has adopted various measures to assure the security for the 5G core network in the practice, from security standards to slice access and management security. ...
Demystifying cyberattacks on critical infrastructure
The notion of cyber-attacks seems distant from our daily lives, as we go about our work, social and family lives. By Carlo Bolzonello, country lead at Trellix Cyber-attacks feel like they happen to big businesses who can quickly bounce back from them after the issue...
Cybersecurity must-haves when it comes to defending business systems
Earlier this year, TransUnion was the target of a hacker group who obtained access to one of its servers containing the personal records of a significant number of South Africans. By Chris Norton, regional director for Africa at Veeam The group demanded a $15-million...
Shoprite ransomware a reminder of the role employees play in cybersecurity
Check Point Software Technologies is reminding African organisations of the importance of cybersecurity training for employees, following the recent cyber-attack on Shoprite Holdings. Ransomware attacks are currently rife - and increasing - across the African...
The mind-boggling puzzle of cybersecurity
Keeping pace with all the tools and technologies that provide protection from the cybersecurity onslaught can be overwhelming, but not impossible, writes Colin Thornton, chief commercial officer at Turrito Networks. There are a lot of statistics when it comes to...
SMEs vulnerable to cyber attacks
South Africa has the sixth highest rate of cybercrime victims worldwide, according to a report by international cybersecurity company Surfshark. Following the breach of President Cyril Ramaphosa's personal data by hackers, consumers have been cautioned to remain...
Cisco Security Cloud will connect and protect IT ecosystem
Cisco has unveiled its plan for a global, cloud-delivered, integrated security and networking service for organisations of any shape and size. The Cisco Security Cloud will be an open platform, protecting the integrity of the entire IT ecosystem - without public cloud...
Post-Covid fraud trends to be aware of
The effects of Covid-19 may have done wonders for digital commerce and remittances, but the mass move to digital channels also opened doors for scammers to take advantage of unwary consumers. By Mark Mwongela Ngungi, sales development director: Africa at PayPal Most...
More cybercrooks are impersonating the CEO
Over the past month, there has been an increase in an evolved method in change in bank details or payment fraud. This trend involves an internal change of bank details, mostly for the CEO. By John Mc Loughlin, CEO of J2 Traditional payment fraud has been rife for some...
The high walls of data security
Privacy, data security, digital identity - walled security gardens are becoming increasingly important tools for organisations looking to embed robust security, writes Aaron Thornton, chief service officer of Turrito Networks. Gartner has long discussed the importance...