MENU

Security
Category

Cybersecurity risks should be elevated and managed in line with an organisation’s enterprise risk programme.(pixabay.com)

6 steps to achieving cyber resilience

June 7, 2017 • Security, Top StoriesComments Off on 6 steps to achieving cyber resilience

Security should be the enabler of the digital world. The ability to detect, protect, remediate and recover from a cyber threat is critical. Cyber resilience has become an elevated topic of discussion at board level. This has received further attention as a result of the recent WannaCry ransomware global attack. Speaking at an event focusing [&hellip...

Read More
The UK government has once again amped up its attacks on tech platforms’ use of end-to-end encryption.

Internet criticised for terrorist attacks

June 6, 2017 • General, Security, Top StoriesComments Off on Internet criticised for terrorist attacks

Tech companies have come under fire for having played a role in the recent terrorist attacks that took place in the UK. The UK government has lambasted big Internet companies for providing a “safe place” for extremists to spread messages of hate...

Darren Anstee, Chief Security Technologist at Arbor Networks.

Business case for DDoS protection

June 5, 2017 • Opinion, Security, SponsoredComments Off on Business case for DDoS protection

As our businesses continue to digitise, and an increasing number of services are delivered via the cloud, we tend to have very low tolerance for downtime. “Distributed Denial of Service (DDoS) attacks can rip straight into the heart of the modern digital...

Johan Scheepers, Commvault Systems Engineering Director for MESAT

If it’s not your expertise, leave disaster recovery to the experts

June 5, 2017 • Big Data, Cloud Computing, Opinion, SecurityComments Off on If it’s not your expertise, leave disaster recovery to the experts

With technological innovations on the rise and hardware and software becoming more complex as a result, the tasks associated with the upkeep of IT operations have become more time-consuming as well. Rather than giving their IT department more resources to...

TransferWise services are still only  available in the United States, Australia, Europe and Canada.

How to Identify an Insecure Website

June 1, 2017 • Online & Social, Security, Top StoriesComments Off on How to Identify an Insecure Website

If you think that simply because a website indicates ‘a secure pop-up’ you are safe from hacking, think again. Users without proper Secure Sockets Layering (SSL) technology are at a high risk of privacy concerns such as phishing, cyber stalking and...

Schalk Nolte, Entersekt CEO.

Risky business for mobile merchants

June 1, 2017 • Finance, Security, Southern Africa, Top StoriesComments Off on Risky business for mobile merchants

South African financial institutions are under severe pressure to better secure their mobile services. Fraud and increasingly sophisticated phishing attacks are massive challenges for organisations providing financial services via mobile devices, whereas the...

There may be more to come after WanaCry.

WannaCry might be the tip of the iceberg

June 1, 2017 • Opinion, SecurityComments Off on WannaCry might be the tip of the iceberg

The attack on 200,000 plus computers across more than 120 countries around the world by the WannaCry ransomware certainly got the attention of governments, media, consumers and law enforcement. But the actual impact could have been so much worse. Much ink is...

7 ways to protect your business from cyber crime. (image: Shutterstock)

10 Must-Have Android Privacy and Security Apps for 2017

June 1, 2017 • Lists, Mobile and Telecoms, Online & Social, SecurityComments (1)

  This year has seen some of the biggest hacks in history. For example, Yahoo, who admitted one of the largest breaches last year, announced about another hack in February, which might have affected millions of users. Gmail has been experiencing a...

One in Four Banks Find it Difficult to Verify the Identity of Online Banking Customers.
 (Image source: Business Advice UK)

Nigeria: N2.19 billion lost to cyber crime in 2016

June 1, 2017 • Finance, Security, Top Stories, West AfricaComments Off on Nigeria: N2.19 billion lost to cyber crime in 2016

According to reports by Nigeria Communications Week, electronic payment transaction fraud rose by 82 percent in 2016 with an estimated N2.19 billion ($6,9 million) lost to cyber criminals, according to the Nigeria Electronic Fraud Forum (NeFF) annual report...

New tech set to revolutionise authentication.

World-first SA technology gives birth to next gen digital identification

June 1, 2017 • Security, Southern Africa, Top StoriesComments Off on World-first SA technology gives birth to next gen digital identification

aiThenticate Computervision Labs, a company established as a joint venture by the University of Johannesburg, has announced that they have developed ground-breaking technology that simulates human cognition. The tech, which works off a smart phone, has...

Fortinet Security

3 Types of Employees that can cause a data breach

May 31, 2017 • Lists, Security, Top StoriesComments Off on 3 Types of Employees that can cause a data breach

When it comes to cybercrime, it is easy to imagine that the biggest threat to your company is external. However, more and more companies are realizing that trusted and trained employees can also pose an enormous threat. You may buy and install the latest and...

Solution House Software director, Tiaan Janse van Rensburg.

SA Company To Use Artificial Intelligence To Predict Crime

May 30, 2017 • Security, Software, Southern Africa, Top StoriesComments Off on SA Company To Use Artificial Intelligence To Predict Crime

Stop crime before it even happens? Sounds a bit far fetched due to the unpredictable nature of the beast but Cape-Town based software and solution developer, Solution House Software, may have just cracked the code. Designed to predict and map potential...

Bryan Hamman, territory manager for sub-Saharan Africa at Arbor Networks.

Arbor named as clear DDoS leader in Quadrant Knowledge report

May 30, 2017 • Security, SponsoredComments Off on Arbor named as clear DDoS leader in Quadrant Knowledge report

Arbor Networks’ clear leadership position in Distributed Denial of Service (DDoS) mitigation is once again confirmed – being named by Quadrant Knowledge Solutions as the 2017 Market and Technology Leader in the Global DDoS Mitigation Market. Quadrant...

(image: Yu Samoilov)

Password Reuse Threatens Enterprise Security

May 29, 2017 • Security, Top StoriesComments Off on Password Reuse Threatens Enterprise Security

Digital Shadows, a digital risk management company, today unveiled research into some of the main techniques cybercriminals are using to target organizations using stolen credentials which have been reused across a variety of sites and online forums. The...

BYOD increase the security risks of businesses.

BYOD: The good, the bad and the just plain unsafe

May 29, 2017 • Features, Gadgets and Gaming, General, SecurityComments Off on BYOD: The good, the bad and the just plain unsafe

Remember the good ol’ days? The days when you were judged on your work performance by the level of darkness outside when you stumbled in – and out – of work. Where your dedication to the job was assessed on one simple factor: your line manager could...

Ian Kilpatrick, EVP (Executive Vice-President) Cyber Security for Nuvias Group. (Image Source: Intelligent Tech Channels)

Internet of Things Security – are you failing to prepare?

May 26, 2017 • Internet of Things, Opinion, SecurityComments Off on Internet of Things Security – are you failing to prepare?

  For several years, the IT industry has enthusiastically extolled the virtues of the Internet of Things (IoT), eager to enlighten us to the difference that living in a connected world will make to all our lives. Now the IoT is here – in our homes...