<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

How to access business information securely

A recent Kaspersky survey entitled “Cybersecurity in the workplace: Employee knowledge and behaviour”, showed that professionals surveyed in South Africa, use multiple devices for work: along with a computer, 44,8% of local respondents also use a mobile phone, and...

Trust nothing, verify everything: Zero Trust is essential for cloud security

The shift to remote work and cloud storage has rendered traditional security strategies, designed for a world of office buildings and centralised networks, ineffective. By: Kumar Vaibhav, lead senior solution architect: cybersecurity at In2IT With users working...

Addressing concerns over biometric authentication

Biometrics, particularly face biometrics, continue to be adopted as a method of identity verification (IDV) across multiple sectors in South Africa. By Lance Fanaroff, co-founder and chief strategy officer of iiDENTIFii While the technology promises greater security...

Could 15 March 2029 be D-Day for cybersecurity in your organisation?

The 15th of March is etched in history as the day when Julius Caesar met his end at the hands of the senators of Rome, and it's about to become even more significant. "Beware the Ides of March," a soothsayer tells Caesar in Shakespeare's play, and since then, the...

The growing costs of cybercrime

Modern enterprises face an onslaught of cyberattacks from many quarters and must not only be prepared to contend with the direct costs of potential breaches, but also with spiralling indirect costs, such as compliance fines and reputational damage. By Simeon Tassev,...

read more

Robots take up the cybersecurity fight

The massive surge in cybercrime, the ever-increasing number of threat vectors, and a critical skills shortage has left organisations feeling more vulnerable to cyberattacks than ever before. With exponentially more ransomware incidents being reported than there are...

read more

Look again at security automation

The sheer scale and pace of today’s cyber threats could prove overwhelming for the security department, outpacing its resources. Hila Meller, BT Security, Global Head of Sales shares BT’s own learnings on the top five things to consider for your security automation...

read more

Putting the safe into social.

In February 2021, the data from 500-million LinkedIn users was leaked by hackers. In June 2021, more than 700-million LinkedIn users had their data leaked and put up for sale. In June 2022, the FBI said that the fraud on LinkedIn posed a significant threat to the...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>