<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

What to do in the first 24 hours after a ransomware attack

A ransomware attack is a nightmare scenario for any organisation. It’s disruptive, costly, and often deeply damaging to your reputation. By Richard Ford, chief technology officer at Integrity360 How you respond in the first 24 hours will determine the difference in...

Traditional defences are no longer enough

From finding creative recipes or drafting business emails to creating images for a small business’s social media posts, generative artificial intelligence (GenAI) tools like ChatGPT and Midjourney are rapidly becoming a part of our daily lives. But, along with its...

SA is a prime target for ransomware attacks

Ransomware attacks have become a significant threat to South African businesses, with the country emerging as a top target in Africa. By Kumar Vaibhav, lead senior solution architect: cybersecurity at In2IT The prevalence of these attacks is driven by a combination of...

Why real emails now look fake

In the fight against phishing, forward-thinking organisations are winning. But there’s a twist. The heightened vigilance that has empowered employees to detect suspicious emails is now creating a new dilemma: legitimate, business-critical messages are being flagged,...

Pause before you install

Kaspersky researchers have uncovered a new method of distributing malware: under the guise of fake security certificates. When users attempt to enter an infected site, an iframe appears stating the site's security certificate is out of date and the connection cannot...

read more
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>