A false perception of cybersecurity
Cybersecurity has been given a bad reputation. This is largely because how cybersecurity companies operate is misunderstood for the services they provide. This is because many individuals believe that by having a cybersecurity partner by their side, they are...
When it comes to cybersecurity, 2022 could be a tough year …
While most of the world dealt with the impact and disruption of year two of the Covid-19 pandemic, cybercriminals expanded their activities with ambitious attacks on critical infrastructure. Armed with sophisticated and brute-force attack methods, threat actors...
An intelligent approach to ransomware
Globally, ransomware is predicted to cost organisations across the world $10,5-trillion annually, driven by growing connectivity and increasingly sophisticated attacks. By Kate Mollett, regional director at Commvault Africa Between January 2020 and June 2021, which...
In 2021, Africa bore the brunt of increased cyberattacks
Last year, the number of cyberattacks recorded was record-breaking, with a 50% increase in overall attacks per week on corporate networks compared to 2020. In fact, in 2021, the world witnessed one of the most serious vulnerabilities on the internet, with millions of...
Is the future CISO a chief trust officer?
The convergence of network and security means CISOs are now firmly in the spotlight, becoming the new chief trust officer for their organisations. Tris Morgan, director of global advisory at BT, shares his views. Right now, many businesses are at different stages of...
OT threats are on the rise: are you prepared?
For years, operational technology (OT) systems have been working to control everything from factories to transportation networks to utilities. But the reality is that most citizens don't think about these systems until there's a problem. By Rick Peters, CISO...
What will online privacy and security look like in 2022?
In many ways, 2021 was a landmark year for online privacy, writes Andrew Bourne, regional manager: Africa at Zoho Corporation. In April 2021, Apple rolled out an update allowing users to opt out of app tracking, with most iPhone users having done so by the end of the...
Multi-cloud security doesn’t have to be complicated, just consistent
As organisations in every industry shift infrastructure and services to the cloud by means of a multi-cloud strategy, their business assets, software and applications become distributed across several cloud-hosting environments. By Kumar Vaibhav, solution architect at...
Kaspersky develops cybersecurity policy for bionic devices
Kaspersky is one of the first organisations to address the challenge of the human augmentation phenomenon, by presenting a comprehensive cybersecurity policy. The document aims to enhance the workforce while also considering employees' security and welfare when using...
AvosLocker ransomware uses AnyDesk in safe mode to launch attacks
Sophos has released new research about AvosLocker ransomware, explaining how attackers attempt to bypass security controls by using a combination of Windows Safe Mode and the AnyDesk remote administration tool. Windows Safe Mode is an IT support method for resolving...
The greatest asset becomes the biggest risk
It's never been more important to protect employees from cyber-attacks while also mitigating the risk they pose as trusted insiders. The erosion of the cyber-perimeter as a result of new virtual workforce models necessitates a new approach, one that baselines...
In a world without boundaries, SASE is the security framework businesses need
Digital transformation and technology evolution has effectively removed the physical boundaries that previously constrained IT systems. As it has done this, the perimeter of organisations has been pushed closer to the edge, driven by cloud adoption, the Internet of...