stage 4 load shedding

Industroyer- The Malware That Could Leave You In Darkness

June 22, 2017 • Features, Mining & Energy, Security, Top StoriesComments (0)

Cyber-security firms ESET and Dragos have unearthed a new malware that can disrupt power grids leading to blackouts for days. The malware has been named Industroyer by ESET, while Dragos has termed it as CrashOverride in their respective analyses. Whatever be the name, the malware is seen as the biggest threat to appear after Stuxnet [&hellip...

Read More
Frans Labuschagne, Country Manager UK & Ireland.

Don’t confuse biometrics with strong authentication

June 22, 2017 • Opinion, SecurityComments (0)

As our world becomes more digitalised, the information we want to keep private is increasingly at risk – and yet no-one wants that information protected by cumbersome security measures which do not fit in with our pace of living. As such, the stage seems to...

One in Four Banks Find it Difficult to Verify the Identity of Online Banking Customers.
 (Image source: Business Advice UK)

24% of banks struggle to identify online banking customers

June 20, 2017 • Finance, Security, Top StoriesComments (0)

A survey conducted by Kaspersky lab has revealed that 24% of banks worldwide struggle with the identification of their customers when delivering digital and online banking services. According to the Financial Institutions Security Risks survey, 59% of banks...

VPN 10 questions to ask when selecting one.

How to Choose a VPN?

June 14, 2017 • Lists, Online & Social, Security, Top StoriesComments (4)

  As Internet users around the world continually search for ways to protect their privacy online, VPN have been singled out by many as an ideal solution. By using a VPN, one’s Internet traffic gets encrypted and routed through a secure tunnel between...

Cyber Crime tips

Successful cyber-resilience requires special attention

June 14, 2017 • Security, Top StoriesComments (0)

Business is now almost entirely dependent on digital platforms, and cannot function if their ICT systems are impacted or attacked. So, in order to build a resilient business, cyber resilience needs special attention, especially from executives. ”If the lead...

Combat security risks with an adaptive approach to risk management.
 (Image Source:

The Gartner IT Security Approach for the Digital Age

June 14, 2017 • General, SecurityComments (0)

The reality of digital business means that businesses must innovate or die. But security is an integral part of the digital business equation when it comes to technologies like cloud services and big data, mobile and IT devices, rapid DevOps, and technologies...

Bryan Hamman, territory manager for sub-Saharan Africa at Arbor Networks.

Beware: New hyper-efficient DDoS variant

June 14, 2017 • Opinion, SecurityComments (0)

Distributed Denial of Service (DDoS) attacks continue to morph and bend into new, dangerous shapes. While reflection and amplification techniques have come to characterise a large number of complex, multi-vector DDoS attacks, Arbor Network’s territory...

Neil Cameron, Johnson Controls Area General Manager, Building Efficiency – Africa.

Financial organisations need security solutions

June 13, 2017 • Opinion, SecurityComments (0)

Financial institutions are typically large, complex entities. They have one key requirement when it comes to security – the solutions they select have to last the distance. This means they need to be able to evolve rapidly, integrate easily with other...


Making people your best defence against phishing

June 13, 2017 • Opinion, Security, SponsoredComments (0)

The recent launch in South Africa of PhishMe®, an end-to-end phishing mitigation solution, has shown how companies worldwide can make people their best defence against the malicious art of phishing. The launch in the country of PhishMe Human Phishing Defence...

(Image Source:

ESET researchers discover sophisticated and dangerous malware

June 12, 2017 • Security, SponsoredComments Off on ESET researchers discover sophisticated and dangerous malware

ESET researchers have discovered the biggest threat to industrial control systems since Stuxnet, Industroyer Industroyer is a sophisticated and extremely dangerous malware designed to disrupt critical industrial processes. ESET researchers analysed samples of...

Cyber Crime tips

Trust and the future of online fraud protection

June 12, 2017 • SecurityComments (1)

The recent WannaCry attacks have underlined, underscored and highlighted how absolutely important it is to patch a computer, avoid opening unknown attachments and recognise risk when it arrives in an inbox. And, while there is no connection between the...

(Image source:

Ten steps for combating DDoS in real time

June 12, 2017 • Opinion, Security, SponsoredComments Off on Ten steps for combating DDoS in real time

To the uninitiated, a distributed denial-of-service (DDoS) attack can be a scary, stressful ordeal. But don’t panic. Follow these steps by David Holmes, senior technical marketing manager: Security, F5 Networks, to successfully fight an attack: If you...

One in Four Banks Find it Difficult to Verify the Identity of Online Banking Customers.
 (Image source: Business Advice UK)

New Embedded Systems Security to close Compliance Gap

June 12, 2017 • Security, Top StoriesComments Off on New Embedded Systems Security to close Compliance Gap

With the tactics of cybercriminals becoming ever more sophisticated, and with regulatory pressures also mounting, financial enterprises are up against increasing hurdles when it comes to future-proofing their ATMs, Point of Sale systems and Point of Service...

Michael Wright, CEO, Striata.

Is technology integration feeding the fraudsters?

June 10, 2017 • Opinion, SecurityComments Off on Is technology integration feeding the fraudsters?

Technology should make our lives easier. In order to do so, IT systems and connected devices are increasingly integrated with one another. With technology integration, however, comes increased risk, and often the consumer is left on their own to navigate this...

The pitfalls of biometrics in the work place.

Biometric Access: Is Your Workplace at Risk of Hacking?

June 8, 2017 • Opinion, SecurityComments Off on Biometric Access: Is Your Workplace at Risk of Hacking?

The past few years have seen an increasing trend in the implementation of biometric clocking systems to monitor and control employees’ access to the workplace. In the international sphere, courts are clamping down on the use of biometric clocking...

Drew van Vuuren, Data Protection Officer, ESET South Africa.

5 ways to protect yourself from a ransomeware attack

June 7, 2017 • Lists, Opinion, SecurityComments Off on 5 ways to protect yourself from a ransomeware attack

Ransomware is a very real threat to businesses and individuals alike, and when it comes to online security, it is arguably the most damaging threat. Yet, many people still don’t know what ransomware is, even though this type of cyber threat has been...