MENU

Security
Category

Martin Walshaw, Senior Engineer at F5 Networks.

How to step up your cyber security game

May 19, 2017 • Opinion, SecurityComments (0)

In a time of changing and ever-present cyber-attacks, it’s crucial for every business to know where its risks lie. If you’re an IT security professional, you need to understand your potential cyber enemy and the current threat landscape so you can anticipate risk, determine your likelihood of being hacked, and the resulting impact when (not [&hellip...

Read More
How to protect yourself against a ransomware attack.

9 ways to protect yourself against ransomware attacks

May 17, 2017 • Lists, Security, Top StoriesComments (0)

The first and most important thing is making it harder for attacks to take place. While it’s necessary to take preventative steps, it’s also important to come to terms with the fact that nothing will ever be 100% effective. That being said, the right...

Simeon Tassev, Managing Director and QSA at Galix Networking

The four steps of cyber security

May 17, 2017 • Big Data, Opinion, SecurityComments (0)

The threat of cyberattacks is on the rise for restaurants and retailers across South Africa and a data breach that leaves millions of consumer credit cards at risk is a threat that no business operator ever wants to face. However, given the increased demand...

The right security architecture can also be a powerful enabler.

Smart mobile security to drive innovation in e-commerce

May 17, 2017 • Finance, Security, Southern AfricaComments (0)

South African consumers are becoming increasingly dependent on their mobile devices for daily banking activities. As such, there is pressure on financial service providers to adapt quickly to a mobile-first environment. Looming large among the challenges that...

(Image Source: http://cdn.digisecrets.com)

6 Myths about ransomware busted

May 16, 2017 • Lists, Security, Top StoriesComments (0)

The first step to creating an effective cyber security strategy is arming yourself with knowledge. It is for this simple reason that we have decided to tackle the myths around ransomware, giving you the hard facts for your own protection. Myth #1: Ransomware...

Andrew Potgieter

Don’t cry over data loss as a result of WannaCry if you could have prevented it

May 15, 2017 • Opinion, Security, SponsoredComments (0)

The WannaCry ransomware cyber attack orchestrated over the weekend of the 12th of May should act as a stark reminder to companies that data backups need to be done regularly, that security solutions have to remain up to date and that user education is still a...

ISACA’s Cybersecurity Nexus Training Platform and Assessment Tool offer on-demand, hands-on training and skills assessment in live lab environment.  (image: Yu Samoilov)

Global Ransomware Attack: Outbreak Disrupts IT Systems Worldwide

May 15, 2017 • Online & Social, Security, Sponsored, Top StoriesComments (0)

A new wave of ransomware known as “WannaCry” has spread across the globe and infected tens of thousands of computers. This ransomware propagates by exploiting a Microsoft Windows vulnerability in unpatched computers. According to Europol, more than...

How to keep yourself safe while using public Wi-Fi.

5 ways to keep yourself safe when using public Wi-Fi

May 11, 2017 • Lists, Mobile and Telecoms, Online & Social, SecurityComments (0)

Free Wi-Fi at cafes, airports, restaurants and city streets is used by almost everyone who’s traveling – but how many people take an extra step to make sure their browsing is not only convenient, but also safe? According to a study by privatewifi.com, 79%...

Celeste Buitendag, Underwriter at SHA Specialist Underwriters

IS YOUR INTERNET BROWSER REALLY SECURE?

May 10, 2017 • Online & Social, Opinion, SecurityComments (0)

When browsing the internet, users typically come across a ‘secure pop-up’ on most internet browsers. However, this does not always mean that the browser is 100% safe and as a result internet users may face an increased risk to various potential threats,...

Online banking is convenient but the best protection is to monitor bank accounts.
 (image: Pixels)

New Payment Security Solution To Reduce Online Fraud

May 10, 2017 • Finance, Security, Southern Africa, Top StoriesComments (0)

CA Southern Africa, a provider of IT management and security solutions,  revealed on Tuesday the launch of CA Technologies, CA Risk Analytics Network. The newly launched network is aimed at tackling online fraud. The CA Risk Analytics Network is the payment...

Martin Walshaw, Senior Engineer at F5 Networks.

Putting app security centre stage

May 10, 2017 • Opinion, SecurityComments (0)

A strong performance lives long in the memory. It is the ticket that ensures audiences return wanting more. In business, every company survives on delivering complete customer satisfaction. Yet, one bad experience can undermine confidence and trade can...

Carey van Vlaanderen, CEO at ESET South Africa.

What motivates people to become cybercriminals

May 10, 2017 • General, Opinion, SecurityComments (0)

We know that cybercriminals are almost always seeking financial gain, but it seems that this is not usually what young cybercriminals have in mind when they take their first steps over to the “dark side”, says Carey van Vlaanderen, CEO at ESET South...

82 percent of enterprises are facing a gap between user demand and what IT can deliver.

Businesses lose $21.8m to downtime

May 9, 2017 • Cloud Computing, Security, Software, Top StoriesComments (0)

The Veeam Availability report released late last month revealed that organisations lost an average of $21.8 million due to unplanned downtime. The 2017 Veeam Availability Report surveyed more than 1,000 senior IT leaders from 24 countries and shows that 69...

After several months in decline, Exploit kit infections show sharp uplift and deliver a variety of threats, says Check Point. (Image source: Business Advice UK)

Rig Makes List of ‘Most Wanted’ Malware in Africa

May 8, 2017 • East Africa, Security, West AfricaComments Off on Rig Makes List of ‘Most Wanted’ Malware in Africa

Check Point Software Technologies has taken note of an increase in Exploit Kit usage by cybercriminals worldwide, with Rig making its way onto the list of top ten threats in Kenya and Nigeria according to the company’s March Global Threat Impact Index....

Google

Google Doc users become victim of Phishing scam

May 5, 2017 • Security, Top StoriesComments Off on Google Doc users become victim of Phishing scam

Close to a million Google users were victims of a phishing scam on Thursday morning. The attack allowed hackers to gain access to contents of emails, contact lists and online documents of victims. The attack came in the form of an email from Google Docs...

Understanding a risk, and how to respond and recover from it, requires knowing how it affects the rest of the organisation’s processes and people.

Achieve cyber resilience with business continuity plan

May 4, 2017 • Security, Top StoriesComments Off on Achieve cyber resilience with business continuity plan

Cyber resilience cannot be considered in isolation, but should rather be considered within the context of the overall business continuity plan, says Cindy Bodenstein, Marketing Manager at Continuity SA. She says that cyber resilience was chosen as the theme...