Cracked hacks: when fun becomes deadly
By June 2021, the Crackonosh cryptojacking malware, had earned threat actors a hefty profit of $2-million. Once in a system, the malware destroyed any antivirus programmes installed and then set about mining cryptocurrency. This malware is one of many that's found its...
Edge computing demands an integrated security response
One of the new battlefields of today is the rise of the edge. One the one hand this domain brings significant functional and economic benefits, enabling for instance the emergence of a new breed of real time applications but at the same time such plethora of devices...
Fight back against ransomware with EDR solutions
When cyberattacks are on the rise, as they certainly have been in South Africa this year, an organisation cannot afford to have its cybersecurity operating in a reactive manner. And yet, far too many businesses operate in this manner, making them prime targets for a...
Support your workforce with these cybersecurity best practices
It has been almost two years since the pandemic began, with the first lockdown in March 2020 forcing businesses to adopt a remote working approach. By Andrew Bourne, regional manager: Africa at Zoho Now that South Africa is opening up, a hybrid model is quickly...
The malicious insider: behind the security front door
What if the person that just broke down your corporate defences is someone you trusted? This is not a drill. This is a question that around 66% of organisations have been asking, and that the other 34% should be prioritising. At a time when the cybersecurity threat...
IT security professionals help to secure society
The role of information security professionals has become a critical one as the world enters the second phase of the internet revolution, in which computers run everything and everything is connected. This emerged at the inaugural KB4-CON cyber security event for...
SA needs cyber defence to combat growing onslaught
Now in its 18th year, Cybersecurity Awareness Month (CSAM) in October is a global initiative first launched by the US Department of Homeland Security and National Cyber Security Alliance to raise awareness of the role everyone can play in improving cyber security. By...
Huawei Continuously Optimises End-to-end Assurance System to Secure Cyber Security
By Herman Kannenberg, Head of Legal Affairs and Cyber Security, Huawei South Africa - Huawei is committed to developing secure and trustworthy digital products and services and has continuously optimised its end-to-end assurance system, making sure that each domain is...
Optimise security, minimise user friction for a secure hybrid workplace
Employees nowadays do not intend to put their companies at risk. As such, they've spent the past year-and-a-half, doing their best to navigate the challenges of hybrid working, juggling new processes and procedures, all the while trying to get their job done. By...
Cybersecurity covered on a small business budget
Just because you're a small business doesn't mean you won't be a target for cyberattacks. In fact, small businesses can be particularly vulnerable because they lack the cybersecurity resources of larger businesses. With the increasing shift to remote and roaming work...
Cybercrime ‘tsunami’ on the way
South Africa’s retail organisations, particularly online stores, could expect a significant ramp-up in cybercrime ahead of the holiday season. This is the warning from Deon Smal, CEO of Cyber Insight, a Cape-based cyber security assessment firm. “While data breaches...
Innovation versus security: can you have them both?
It was the motoring legend Jeremy Clarkson that once said: "speed doesn't kill it's the coming to a stop that gets you." The same applies to rapid innovation. If you roll out the latest and greatest technology too quickly without securing it, you might be vulnerable...