Trust no-one: Making sense of zero trust for your business
Protecting small and medium-sized enterprises (SMEs) from cyber threats goes beyond traditional firewalls. A zero-trust approach is now essential, offering enhanced security against insider threats and risks associated with remote work. Despite the initial investment,...
35 years on, is ransomware still effective?
Ransomware has been around for 35 years, with the first known case involving the AIDS Trojan. This malware was spread using physical disks, pretending to be software to assess people’s risk of developing AIDS. Since then, ransomware has become a major cyber threat,...
Top cyber security controls for SMEs
There are a multitude of cyber security controls that businesses can implement and leverage to protect against cyber threats, but we’ve selected five of the best that are ideal specifically for SMEs. In today’s digital, data-driven economy, cyber security is the...
Make multi-factor authentication your personal cybersafety resolution
With South Africa’s Information Regulator on record as saying the country suffered at least 150 data breaches a month in 2024, South Africans must make Multi-factor Authentication (MFA) the non-negotiable centrepiece of their personal cybersecurity new year’s...
What is fake hacking and how can we protect ourselves?
In the high-stakes world of cybersecurity, the term “hacking” often conjures up images of sophisticated cyber threats and data breaches orchestrated by skilled attackers. However, a lesser-known but equally dangerous phenomenon is the rise of “fake hacking” - where...
Adopting human-centric security
As businesses adopt new technologies and adapt their ways of working to take advantage of the latest digitalisation trends, the unfortunate truth is that they are increasing their cyber risk. By John Penn, security propositions architect at BT Attacks like phishing,...
Protect you kids in the digital playground
As online gaming grows in popularity, children are increasingly spending time on apps that often encourage in-app purchases, especially during school holidays. While these purchases can enhance the gaming experience, they aren’t without risk says Carey van Vlaanderen,...
Bridge the security gap between risk and awareness
Much like the rest of the world, South Africa grapples with challenges emanating from a digital landscape fraught with escalating cyber threats that pose significant risks to businesses and other organisations. By Ryan Boyes, governance, risk and compliance officer at...
GenAI: key considerations for cybersecurity teams
The AI landscape is changing faster than ever, and this is especially true in cybersecurity. Many organisations in South Africa are now focusing their investments on application security, putting a significant emphasis on AI-driven solutions to boost their...
Check Point Infinity XDR/XPR achieves 100% detection rate
Check Point Software Technologies’ Infinity XDR/XPR achieved a 100% detection rate in the rigorous 2024 MITRE ATT&CK Evaluations. During the evaluation, Infinity XDR/XPR detected all 57 applicable attack steps, with 56 detections at the technique level. "In an era...

Strong leadership crucial in building a security-conscious organisation
Let’s face it, technology alone is not enough to protect against ever-evolving cyber threats. Effective cybersecurity requires strong leadership. Leadership must foster a culture of security, make informed strategic decisions, and guide organisations through the...
Third-party providers contribute to a culture of support and awareness
Cybersecurity is often viewed through the lens of technology – firewalls, encryption, and antivirus software are the tools we typically rely on to protect our digital environments. By Nemanja Kristic, operations manager: managed security services at Galix, and...