MyCyber Training closes the security loop
Company-wide cybersecurity can only be achieved through a combination of technology tools and security-conscious user behaviour. There are hundreds of tools available on the market that address the technology aspect of security, but way fewer that attempt to manage...
Securing the remote workforce
For many organisations, the need to suddenly enable a remote workforce at scale has overtaken long-term plans they may have had to gradually extend remote work capacity. By Doros Hadjizenonos, regional sales director at Fortinet In a such context, time is of the...
Datacentrix secures PSiRA certification
Datacentrix has received a formal Private Security Industry Regulatory Authority (PSiRA) certification, making the company one of a handful of local ICT organisations to hold the proper accreditation for surveillance and security-related environments. PSiRA is the...
The importance of next-generation firewalls
Despite the benefits of a digital and always-connected business environment, cyber security risks have also evolved to become more sophisticated and increasingly pervasive. By Rentia Booysen, collaboration and networking lead at Westcon-Comstor Sub-Saharan Africa As...
MSPs turn to cybersecurity, IoT
Cybersecurity specialisation and services linked to the Internet of Things lead the next wave of technology offerings from managed services providers (MSPs), according to a new report from CompTIA. Two-thirds of MSPs surveyed for the "Trends in Managed Services"...
BT launches Cyber Security Advisory Services practice
BT has launched its Security Advisory Services practice, offering strategic security guidance and solutions to organisations across the globe. BT Security Advisory Services will be led by Tris Morgan, with approximately 300 members of specialist staff based across the...
A growing attack surface
The complexity and span of devices on the network continues to develop at an astounding rate and many organisations are struggling to address the growing attack surface. By Mandy Duncan, country manager at Aruba A plethora of devices are being brought into the...

Security Terminology Demystified: Adware
The Shylock of malware, adware is always looking to take its pound of flesh. When most people think about adware they think of a relatively harmless piece of code that’s annoying in its efforts to sell to you and take up space, but little more. The truth is that...
Pause before you install
Kaspersky researchers have uncovered a new method of distributing malware: under the guise of fake security certificates. When users attempt to enter an infected site, an iframe appears stating the site's security certificate is out of date and the connection cannot...
US government employees ignorant on ransomware
IBM Security has released the results of a new poll of US city and state employees which examines their preparedness for dealing with cyberattacks. The study found that 73% of government employees surveyed are concerned about impending ransomware threats to cities...
Schneider Electric joins Cybersecurity Tech Accord
Schneider Electric has joined the Cybersecurity Tech Accord, a watershed agreement among its signatories to enhance the cybersecurity ecosystem and to defend the digital economy from cyberattacks. The Cybersecurity Tech Accord is a public commitment among 144 global...
Ransomware: not about prevention anymore
Ransomware hit the headlines in 2019, with several high-profile attacks causing significant service disruption. By Johann Scheepers, country head at Commvault South Africa Some of the most notable ransomware attacks which caused lengthy outages at City of Johannesburg...