Step up your surveillance game with Seagate SkyHawk™
When looking for a hard drive to power your CCTV security network, a standard HDD won’t do the trick, as the need for always-on operational demand and high-definition images is simply too high. Surveillance drives are specifically focused on mass data and speed - and...
Kaspersky invites young innovators to step up
Kaspersky has announced an open call for Secur'IT Cup '22 - the international competition for talented motivated students, and young researchers seeking to change the world of technology by enhancing its security. With the increasing penetration of digital technology...
Common Facebook Marketplace scams and how to avoid them
Last year, Facebook Marketplace passed 1-billion global users. With this, it has become a giant in the consumer-to-consumer commerce space, allowing individual Facebook users to buy and sell seamlessly. Carey van Vlaanderen, CEO of ESET South Africa shares critical...
Understanding cybersecurity in the post-pandemic era
Prior to the Covid pandemic, employees would access data from within the office environment through a secure, centralised on-premises network. By Ian Engelbrecht, system engineering manager at Veeam Africa As remote and hybrid work became the norm, the attack surface...
Technology Education Day: teaching younger generations about cybersecurity
Technology Education Day (today, 23 September) assumes more significance than ever as so much course work and classroom teaching relies on digital platforms. No matter what field of study they choose, be it engineering or business, there is no way students can...
IT security at the heart of smart cities
South Africa is currently in the process of developing smart cities - one in Gauteng and one in the Eastern Cape. More will surely follow as this is the future of living; where technology and connectivity are deeply ingrained in the processes of daily life. By Wandile...
How to fortify your security strategy
Digital transformation presents a strong opportunity to harness the power of data. However, it brings certain challenges to the fore including an organisation's ability to be secure and resilient. By Michel Nader, senior regional director: data protection and cyber...
AI, ML, digital assistants transform how SMBs address cyberattacks
The cyber threat landscape for businesses of all sizes is terrifying. According to the World Economic Forum, risks are increasing exponentially, while the rate of detection and prosecution is frighteningly low at a rate of below 1%. Organisations, especially small...
Zero day: the wide-open door
Zero-day exploits are becoming more common and more vicious and this is why you should be worried. A zero-day exploit is a cyber-attack that does precisely what the name suggests - it exploits a previously unknown vulnerability to gain access to a system, platform,...
Identity proofing allows easy virtual ID checks, but exercise caution
The Covid pandemic saw virtual identity checks become the norm. But not all identity proofing methods are created equal - some of the mainstream options fall far short of best practice guidelines. By choosing the right methodology and technology, CIOs and security and...
The mobile malware landscape in 2022
Cyberattacks are increasing in number all the time, writes Pankaj Bhula, EMEA regional director: Africa at Check Point. Indeed, our 2022 Mid-Year Report revealed a 42% global year-on-year increase in attacks and according to the World Economic Forum's 2022 Global Risk...
These are the most dangerous RansomOps attackers
Ransomware gangs have really upped their game in the last few years, generating billions in paid ransoms from public and private sector organisations. By Brandon Rochat, sales director: Africa at Cybereason The gangs have increased attacks on critical infrastructure...