ESET a founding member of Google’s App Defense Alliance
ESET has become a founding member of the App Defense Alliance to protect the Google Play Store. ESET will provide its detection capabilities and security for the Android ecosystem and will also spearhead investigations that make the Google Play Store safer. The...
Safeguard your data in the online world
In a world ruled by data, it is frightening to think how few people take protecting their information seriously. While it has become easy to share everything from your email address and mobile number to more sensitive things such as your ID number and other personal...
ESET is founding member of Google’s App Defense Alliance
ESET has become a founding member of the App Defense Alliance to protect the Google Play Store. ESET will provide its detection capabilities and improved security for the Android ecosystem and will also spearhead investigations that make the Google Play Store safer....
Kaspersky scores 100% detection rate in fileless threats
Kaspersky Endpoint Security for Business showed a 100% detection rate and the highest prevention rate (94,12%) of 14 endpoint security vendors in a recent assessment by AV-TEST. The products were judged on the ability to detect fileless threats and to protect and...
Essential security skills for all employees
Cybercrime is a problem that affects everyone. It doesn't matter how big or small the company may be, it is at risk of breach, fraud, hack, and theft. The statistics around the costs of cybercrime are plentiful, as are those that highlight the percentage growth of the...
Best-practice in the event of a data breach
We've all heard the famous prophecy that states: if we fail to prepare then we must prepare to fail. This statement is never more relevant than in the event of a data breach. By Steve Benton, BT deputy chief security officer, GM of cyber and physical security...
Beware these ‘harmless’ online habits
Everyone nowadays is connected to the Internet and has by now probably settled into some online routines: we all have such habits as checking our e-mails and social media pages first thing in the morning and consider these rituals healthy and harmless. However, some...
Security Terminology Demystified: Spam
Is it a tin of unidentifiable meat that was once a staple of the 1970s diet or is it the security threat that everyone forgets? Spam, both the extremely concerning meat product in a tin and the email security threat, is the scourge of humans around the world. It’s the...
Cyber security: humility key to constant improvement
If we are to continue improving our response to cyber risk, we must accept that breaches will happen. When they do, we must detect, respond and - most importantly - learn from them, writes Michiel Jonker, director: IT advisory at BDO South Africa. While technology and...
Bank cards still a secure, convenient payment option
Recently, there's been a lot in the news about the supposed increase in card fraud attempts. While this has understandably made some people nervous about using their bank cards, Chris Wood, executive for card issuing and payments at Nedbank, remains positive that,...
DeepFakes: when seeing isn’t believing
Deepfake technology is rapidly becoming easier and quicker to create and it's opening a door into a new form of cybercrime. Although it's still mostly seen as relatively harmful or even humorous, this craze could take a more sinister turn in the future and be at the...
The importance of XDR for cyber protection
With 35% of South African organisations expecting an imminent cyberattack and a further 31% bracing for it to happen within a year, according to local research conducted by Trend Micro, attention is turning to whether existing solutions are up to the challenge of...