<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Lessons from 2024 cybersecurity breaches

In 2024, nearly six out of every 10 businesses experienced a cyberattack. The same research revealed that 70% of these attacks led to data encryption, with ransom demands increasing fivefold. Most concerningly, 32% of cyberattacks worldwide were attributed to...

Scammers take advantage of the desperate need to access cash

Revitalised from their end-of-year vacation, South Africans typically tackle the new year with gusto and renewed vigour. It is also a time when students who matriculated the year before, start the next phase of their journey as they enter into universities and...

Beyond contracts and compliance: Building trust in security 

Security vulnerabilities cost companies money, clients and reputations. Partnerships build resilience, stability and agile solutions that mitigate these vulnerabilities, writes Richard Frost, head of technology and innovation at Armata Cyber Security. Cybersecurity...

Prioritise data strategies in 2025

As South African businesses navigate an increasingly data-driven world, many face the challenge of turning overwhelming amounts of information into actionable insights. Ferdinand Steenkamp, co-founder at Tregter, emphasises the urgency for companies to adopt clear,...
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>