How vendors and attackers are still exploiting FUD
The statistics make for worrying reading. According to the Veeam Data Protection Trends Report 2022, 97% of South African companies experienced an outage due to a cyberattack in the past 12 months. Of those, almost nine in 10 (86%) suffered a ransomware attack. By...
Are your Excel spreadsheets a cybersecurity risk?
The use of spreadsheets in accounting and finance departments has vastly improved data analysis and enabled fast and accurate reporting, computing and information storage. Life without them is almost unthinkable. However, danger lurks within and although the use of...
With growing threats, CISOs change their posture to proactive
Every CISO and IT security professional knows that cyber risks are exploding, with cybercrime syndicates becoming increasingly aggressive and sophisticated. To their credit, security execs are putting out fires and putting mitigation measures in place as fast as they...
Indicators of Behaviour and the Diminishing Value of IOCs
How secure is your organisation if you can only stop attacks that have already been detected in other environments based on Indicators of Compromise (IOCs)? Secure enough, if those were the only attacks you needed to be concerned with. By Cybereason Sales Director for...
The ultimate security pincer movement
Cybersecurity is a battlefield. An alarming one. According to the Allianz Risk Barometer, the risk of a cybersecurity breach ranks higher than supply chain disruption, a natural disaster and even the Covid-19 pandemic. This is a reasonable concern, after all, 93% of...
How to spot a crypto scam
Since the emergence of Bitcoin in 2009, cryptocurrency has gained significant traction in popularity over the years, with more and more people investing in the now many variations of digital currencies available such as Ethereum, Tether, Binance, and even Dogecoin. By...
Zero Trust Network Access the next step in an evolving security landscape
The hybrid workplace continues to enjoy consistent adoption, particularly amongst those industries that do not require their workforce to be at the office every day. The benefits are well-published and tangible, however, it has also brought with it smorgasbord of...
Data management at the core of ransomware readiness
Ransomware is one of the biggest threats and challenges facing organisations today. A simple online search will reveal hundreds of high-profile attacks and scary statistics around the acceleration of ransomware incidents and the costs involved. By Kate Mollett,...
Is the public cloud secure?
Is the public cloud safe? Organisations often have this concern as they engage services from third-party cloud hosts. They may have a point - the public cloud is not necessarily as secure as we want to think. The rise in cyberattacks partially correlates with the...
Cybersecurity depends on the people too
Check Point Software Technologies marks Cybersecurity Awareness Month (October) by highlighting the need for each and every individual to prioritise cybersecurity, in both their business and personal lives, in order to fend off the ever-increasing risk of cyberattack....
Get back to security basics
Cybersecurity is everyone's problem. It is the problem of the beleaguered chief information security officer (CISO), of the CEO and the manager; and of every employee at every level of the organisation from the person serving the tea to the person leading the team....
Trellix finds open source projects could be at risk
Trellix has announced the establishment of the Trellix Advanced Research Center to advance global threat intelligence. Comprised of hundreds of the world's most elite security analysts and researchers, the Advanced Research Center produces actionable real-time...