What will online privacy and security look like in 2022?
In many ways, 2021 was a landmark year for online privacy, writes Andrew Bourne, regional manager: Africa at Zoho Corporation. In April 2021, Apple rolled out an update allowing users to opt out of app tracking, with most iPhone users having done so by the end of the...
Multi-cloud security doesn’t have to be complicated, just consistent
As organisations in every industry shift infrastructure and services to the cloud by means of a multi-cloud strategy, their business assets, software and applications become distributed across several cloud-hosting environments. By Kumar Vaibhav, solution architect at...
Kaspersky develops cybersecurity policy for bionic devices
Kaspersky is one of the first organisations to address the challenge of the human augmentation phenomenon, by presenting a comprehensive cybersecurity policy. The document aims to enhance the workforce while also considering employees' security and welfare when using...
AvosLocker ransomware uses AnyDesk in safe mode to launch attacks
Sophos has released new research about AvosLocker ransomware, explaining how attackers attempt to bypass security controls by using a combination of Windows Safe Mode and the AnyDesk remote administration tool. Windows Safe Mode is an IT support method for resolving...
The greatest asset becomes the biggest risk
It's never been more important to protect employees from cyber-attacks while also mitigating the risk they pose as trusted insiders. The erosion of the cyber-perimeter as a result of new virtual workforce models necessitates a new approach, one that baselines...
In a world without boundaries, SASE is the security framework businesses need
Digital transformation and technology evolution has effectively removed the physical boundaries that previously constrained IT systems. As it has done this, the perimeter of organisations has been pushed closer to the edge, driven by cloud adoption, the Internet of...
It’s the end of passwords as we know it
Imagine it’s October 2050 and a school class is on a Cybersecurity Awareness Month field trip at the local museum. Suddenly, a student asks his teacher “what’s that?” staring at some strange combination of letters, symbols and numbers. “Oh, that’s a password,” the...
Hardware-based remote access solutions key to hybrid work security
As South Africa continues to grapple with the Covid-19 pandemic, the outbreak of the fourth wave and the discovery of the new omicron variant of the virus have likely scuppered the hopes of businesses seeing their employees return to the office any time soon. By Benji...
Better quality security requires synchronicity
There’s a lot of talk about cyber security - and for good reason. Barely a week passes without news of yet another high-profile breach, either in South Africa or abroad. By Antony Russell, chief technology officer of Telviva Perhaps the biggest risk for organisations...
Looking for trouble – cybersecurity for the digital age
Faced with relentless growth in cyberattacks, coupled with the complexity of today’s digital ecosystem, how should your business respond? Bas Burger, CEO: global at BT, shares his insights. There’s no going back. Over the past 18-months, businesses have got to grips...
Clearly defined roles and responsibilities critical for cloud security
When it comes to cloud versus on-premises infrastructure, security requirements remain the same, although the cloud requires additional controls because it is publicly available. By Simeon Tassev, MD and QSA at Galix The major difference is that on-prem has highly...
With ransomware, hindsight is 20/20
There are few things worse than discovering that your business has been compromised. Be it a phish, ransomware, hack or malicious attack, it's going to leave a long legacy of damage and complexity behind it. This is according to Martin Potgieter, co-founder and...