Why you don’t have to compromise on security versus convenience
For those of a slightly cynical bent, the phrase, "give me convenience or give me death" could be seen as the rallying cry of the contemporary consumer. There can also be no doubt that companies old and new have gone out of their way to meet that desire for...
Microsoft introduces Security Experts
The security landscape has become increasingly challenging and complex for our customers. By Vasu Jakkal, corporate vice-president: security, compliance, identity and management at Microsoft Threats have grown at an alarming rate over the last year, and cybercrime is...
When thinking about security, do you consider employee wellbeing?
Insiders pose the greatest single threat to digital security, and the conditions created by hybrid workplaces are making the risk even more acute. According to the Ponemon Institute, insider security threats have risen over 44% since 2020. Yet while we focus a lot of...
Collaboration, the only way to build a trustworthy digital environment in South Africa
By Akhram Mohamed, Cyber Security and Privacy Officer (CSPO), Huawei South Africa - As South Africa's smartphone penetration and internet connectivity increases, so does the growing concern for cybersecurity and data privacy. The omnipresence of digital technologies,...
How your personal data can be weaponised against you
Yesterday (5 May) was World Password Day, a global date recognising the importance of strong passwords to ensure users remain safe while using online services. However, cybersecurity experts are warning that consumer habits of sharing personal information online - for...
Five must-haves for creating a secure password
World Password Day (5 May) comes around every year on the first Thursday of May and is the perfect time to remind everyone about the importance of having a secure password for all online accounts. Check Point Software Technologies is raising awareness of the most...
Password management needs a rethink
With technology integrated into every facet of an organisation, there are massive consequences if systems go down, regardless of the size or industry sector of a business. By Geshan Naicker, IT manager at Itec Over the years, I have seen my share of the IT challenges...
How biometrics has become lightning fast and accurate
How do you do trust someone you can't meet in person? It's a question organisations have been grappling with in the age of the internet, KYC requirements, and the rapidly escalating costs and consequences of identity fraud. "Enter biometrics with liveness detection, a...
Should you really have a password if you can’t keep it secure?
Since 2013, the first Thursday in May - this year falling on 5 May - is marked as World Password Day, aiming to promote better cybersecurity hygiene by upgrading easy-to-guess passwords or refreshing older passwords that may have been compromised. By Doros...
Cryptocurrency scams are on the rise in SA
The digital gold rush is here. As more people attempt to make money from cryptocurrencies, criminals and con artists aren't far behind. Make sure you know how to recognise the biggest schemes that want to part you from your digital coins. By Carey van Vlaanderen, CEO...
Why it is critical to have a robust cyber security strategy
The need for a solid cyber security strategy is constantly discussed and debated. Yet the basic worm-type attacks first documented in 1972 are still with us today. This is because even the most basic measures to protect control systems from these types of attacks are...
Face value: the ethics of facial recognition biometrics
The average person has a whopping 100 passwords that they use to access their various online accounts, a study by NordPass reveals. With the key to keeping all these accounts secure, being passwords that are long, complicated and hard to guess, the result is that they...