Before the advent of Industrial Internet of Things (IIoT), Operation Technology (OT) was safeguarded against most cyberattacks.  OT systems’ propriety nature, standards and hard-wired connectivity protected it against malicious attacks. Cyber threats and incidents are a major operating and business risk for every digital enterprise. In age the of digitisation,...
Cyber-security education, through the use of anti-phishing training programs, is vital in a world where humans remain the weakest link in the cyber-security chain. Cyber-security is a term on every businessperson’s mind, as the legal, financial and reputational implications of a breach are massive. The challenge is that, while a...
After 25 years of experience in IT, including 17 years of experience in the information security industry and, having filled many diverse roles, George-Paul de Lange, founder and CEO of Cyber Intelligent Systems, noticed a big demand for cybersecurity skills development on the African continent. In his own words,...
How do cybercriminals think when they enter into your organisation? What do they look for? And how can you use this insight to protect your business?  Hackers want in. They want into the business, its data and its details because cybercrime is a multi-billion-dollar business and there is plenty of...
Covid-19 was a boon to perpetrators of commercial identity theft around the world. The Global Consumer Pulse Study reports that 37% of South African consumers have recently been targets of Covid-19 related digital fraud. TransUnion reports that the percentage of suspected fraudulent digital transaction attempts against businesses that originate...
One significant finding published in our 1H 2022 FortiGuard Labs Threat Report is that ransomware is rampant. We’re seeing ransomware attacks becoming more sophisticated and aggressive, with attackers introducing new strains and updating, enhancing, and reusing old ones. What’s especially concerning as we look back at the first half...
HP Inc today announced enhancements to its HP Wolf Security endpoint protection portfolio, with the launch of Sure Access Enterprise (SAE). SAE protects users with rights to access sensitive data, systems, and applications. It prevents attackers from hi-jacking these privileged sessions – even if the users’ endpoint device is...
The launch of Vulnerability Remediation-as-a-Service (vRaaS) by cybersecurity solutions provider 2TS combines the use of an international industry-leading vulnerability management solution, together with unified endpoint management technologies, to detect and remediate vulnerabilities within your IT environment. At the same time, this offering is available across the board, for both...
Ransomware attacks are real, ever-present and wreaking havoc across the board for businesses. The bad news is that this type of cybercrime does not just target large multinationals. In fact, these are most likely avoided as an attack is expected, making SMEs a much easier target. Gilchrist Mushwana, Director...
One of the biggest challenges facing any CISO today is a term we call end user revolt – when users circumvent all security measures and protocols in order to do their jobs. When the business puts mechanisms in place to secure its infrastructure but these hinder users from being productive,...
A recent global Kaspersky study on the behaviour of small and medium businesses during crises shows staff reductions may cause additional cybersecurity risks. Yet only 51% of organisations’ leaders are confident that their ex-employees don’t have access to company data stored in cloud services, and just 53% are sure...
Kaspersky researchers discovered a new malicious version of a popular WhatsApp messenger mod dubbed YoWhatsApp. Popular for having features that the official app does not offer, this mod spreads the notorious Triada mobile Trojan, which can download other Trojans, issue paid subscriptions, and even steal WhatsApp accounts. Users around...
A cyber attack is an episode of unauthorized computer use to either steal information or disrupt systems, networks, or the operation of the computer itself. Because cyber attacks can be carried out from anywhere with access to the Internet and a computer, they are far more difficult to detect...
The rapid rise in digitisation, self-service onboarding and faster payments has left many banks, financial institutions and their customers at risk from fraudsters and cybercriminals. While many fraud- and risk-management measures severely hamper customer experience, MoData’s AI-driven Behavioural Biometrics platform ensures that the customer experience remains seamless while delivering...
As part of the global parent company, Exclusive Networks Africa has aligned with the organisation’s unique ‘local sale, global scale’ model, combining the extreme focus and value of local independents with the scale and service delivery of a single worldwide cybersecurity powerhouse. At the same time, this local company is...
When it comes to reporting on cybercrime, we tend to only come across stories impacting major companies or industries. Apart from the obvious reputational damage, we don't really grasp the consequences of something like a data breach on a company and its customers. There are no headline articles about the troubles...
22,877FollowersFollow

Recent Posts