Anton Jacobsz, Security, Software

Discussing DDoS and the Ostrich Syndrome

August 18, 2017 • Security, Sponsored, Top StoriesComments (0)

The so-called Ostrich Syndrome is a term used to describe people who prefer to “stick their heads in the sand”, much as an ostrich does, rather than accept some uncomfortable facts. Sadly, when it comes to indisputable threats like Distributed Denial of Service (DDoS) attacks, every business in operation today should be acknowledging this reality...

Read More
DDoS Protection, Arbor,

Arbor Networks in first place when it comes to DDoS protection

August 17, 2017 • Security, Sponsored, Top StoriesComments (0)

The growing size, frequency and complexity of Distributed Denial of Service (DDoS) attacks presents a serious challenge for any business. A recent study by industry analysts Quadrant Knowledge Solutions has identified Arbor Networks as the global market and...

Cyber attacks moving to mobile

Cyber Attacks Moving to Mobile Devices

August 17, 2017 • Opinion, SecurityComments (0)

With individuals and businesses becoming increasingly dependent on mobile devices for everything from email to banking, cyber criminals have turned their attention to mobile platforms as a new target for attack. One of their most common strategies is mobile...

Cyber, Security, Gartner predicts increase spending on IT security in 2017.

Gartner: Global Information Security Spending Will Reach $86.4 Billion in 2017

August 16, 2017 • General, Security, Top StoriesComments (0)

Gartner has predicted that the worldwide spending on information security products and services will reach $86.4 billion in 2017. The company has highlighted that this is an increase of 7 per cent over 2016 and spending is expected to grow even more in 2018...


Shocking Research Reveals Your Browsing Habits Are Never Anonymous

August 16, 2017 • Security, Top StoriesComments (0)

The internet is a wonderful tool and has truly paved the way for the information age we currently find ourselves immersed in. In this age, we find ourselves constantly craving to be in the loop and we want that information at the speed of a click. So where do...

cloud, SME, Redstor

Turrito Networks Extends SME Portfolio With Redstor Partnership

August 16, 2017 • Cloud Computing, SecurityComments (0)

Turrito Networks is extending its cloud services portfolio for SMEs, by becoming a strategic partner for global enterprise cloud backup provider, Redstor. The partnership, according to both firms, comes at a time when SMEs are becoming increasingly vulnerable...

Nigeria cybercrime

Nigeria: EFCC Arrest 100 Students for Various Cybercrimes

August 16, 2017 • Security, Top Stories, West AfricaComments (0)

According to a report by Nigerian Communications Week, over 100 undergraduates of tertiary institutions across the Southwest of Nigeria have been detained for various cybercrimes by the Ibadan Zonal Office of the Economic and Financial Crimes Commission...

Cyber, Security, Gartner predicts increase spending on IT security in 2017.

SA operational technologies open to attack

August 15, 2017 • Security, Southern Africa, Top StoriesComments (0)

South African operational Industrial Control System (ICS) /SCADA systems are becoming increasingly intelligent and connected, and therefore increasingly at risk of attack. “While a major breach has not yet been reported in South Africa, it is only a matter...

Anton Jacobsz, Security, Software

Networks Unlimited supports SA’s evolution of the digital classroom

August 15, 2017 • Education, Security, Southern Africa, Sponsored, Top StoriesComments (0)

The growing threat of ransomware today looms across a number of different industries – healthcare, retail, hospitality, finance and insurance, government, professional services, technology and manufacturing – and education is not immune. However,...

Simeon, Africa, Cash vs Card, Opinion

Migrating to a digitised environment? Consider the security risk

August 14, 2017 • General, Opinion, SecurityComments (0)

The emergence of the digital world has caused a number of organisations to shift from analogue to digitised environments. Among the many complexities and challenges this transition gives rise to, new security considerations have also materialised. Businesses...

Opinion, Dark Web, Marketplace, shutdown, Cybercrime,

Cybercrime finds a way despite dark web shutdowns

August 14, 2017 • General, Online & Social, Opinion, SecurityComments (0)

The law enforcement operations that took down the AlphaBay and Hansa marketplaces were meant to strike a sizable blow to the online trade of illegal goods and services. Frequenters of these services might now think twice before placing their trust in these...

Nigeria, NCC, Pre-Registered Sims, Telcos, Warning, Punishment

Nigeria- NCC Threatens Telcos To Scrap Pre-Registered Sims or Face Punishment

August 14, 2017 • Mobile and Telecoms, Security, Top Stories, West AfricaComments (0)

According to reports by the Nigerian Communications Week, the Nigerian Telecommunications Commission (NCC) has demanded that all mobile telecommunications firms block the use of pre-registered sim cards. The use of these sim cards are believed to be what...

Anton Jacobsz, Security, Software

Cybercrime growth highlights need for short- and long-term ICT education plans in South Africa

August 11, 2017 • Opinion, Security, Southern Africa, SponsoredComments (0)

The Joburg Centre for Software Engineering’s (JCSE) seventh annual ICT skills survey showed that South Africa continues to lag behind other African countries, such as Kenya, Nigeria and Egypt, in information communication technology (ICT) skills training...

Cyber, Security, Gartner predicts increase spending on IT security in 2017.

The rise of security as a service in the evolving threat landscape

August 10, 2017 • Security, SponsoredComments (0)

The constant evolution of the global security threat landscape is playing a part in the rise of cyber ‘security as a service’ offerings. In addition, the evergreen discussion around cost modelling, namely the ‘Capex vs Opex?’ issue, is also a factor...

Kenya Decides, IEBC

Kenya: Electoral Commission disputes hacking allegations

August 10, 2017 • East Africa, Online & Social, Security, Top StoriesComments (0)

The Independent Electoral and Boundaries Commission (IEBC) has disputed allegations that their systems were hacked. IEBC released a statement saying that the system was secure during the elections and that no results were manipulated. Leader of opposition...

data protection

All you need to know about data protection

August 3, 2017 • Big Data, Security, Southern AfricaComments Off on All you need to know about data protection

The mess that is the Cash Paymaster Services (CPS), Net1 and South Africa Social Security Agency (SASSA) data debacle serves as a lesson to all business owners, managers and individuals. If you give your data away without securing it, expect your privacy (or...