<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

What to do in the first 24 hours after a ransomware attack

A ransomware attack is a nightmare scenario for any organisation. It’s disruptive, costly, and often deeply damaging to your reputation. By Richard Ford, chief technology officer at Integrity360 How you respond in the first 24 hours will determine the difference in...

Traditional defences are no longer enough

From finding creative recipes or drafting business emails to creating images for a small business’s social media posts, generative artificial intelligence (GenAI) tools like ChatGPT and Midjourney are rapidly becoming a part of our daily lives. But, along with its...

SA is a prime target for ransomware attacks

Ransomware attacks have become a significant threat to South African businesses, with the country emerging as a top target in Africa. By Kumar Vaibhav, lead senior solution architect: cybersecurity at In2IT The prevalence of these attacks is driven by a combination of...

Why real emails now look fake

In the fight against phishing, forward-thinking organisations are winning. But there’s a twist. The heightened vigilance that has empowered employees to detect suspicious emails is now creating a new dilemma: legitimate, business-critical messages are being flagged,...
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>