What are the keys to effective information security?

December 17, 2014 • SecurityComments (0)

Rapidly evolving cyber threats and attack modes mean that every organisation should assume it has already been breached. The question now is – what to do next? Not only have cyber criminals become more sophisticated, but enterprise exposure to risk is growing fast, thanks to the advent of the ‘3rd platform’ in computing, delegates heard ...

Read More
Kaspersky Lab

Looking back at 2014′s cyber threats

December 10, 2014 • SecurityComments (0)

In 2014, Kaspersky Lab experts saw considerable growth in the number of malicious attacks on user computers and mobile devices, further development of financial malware and a change in the vectors of web attacks. According to Kaspersky Lab, based on the...

Top 5 2015 Cyber Security Threat Predictions

Top 5 2015 Cyber Security Threat Predictions

December 4, 2014 • Lists, Security, Top StoriesComments (0)

As 2015 approaches Fortinet and its threat research division FortiGuard Labs, have taken a look ahead to determine the most significant cyber security threats of the upcoming New Year – both from the perspective of a Black Hat hacker, as well as a Threat...

Cyber Crime tips

Infographic: How much do cybercriminals make from their victims?

December 1, 2014 • SecurityComments (0)

Cybercriminals could be raking in profits 20 times greater than the cost of their attacks, according to figures compiled by Kaspersky Lab experts. Their research compared the cost of the most frequently used hacker tools with the money stolen in a successful...


Security a top priority as Africa moves to LTE

November 11, 2014 • Opinion, SecurityComments (0)

Securing the network is a top priority for telcos and carriers as LTE becomes increasingly mainstream across Africa, says Fortinet. Perry Hutton, regional director of Fortinet for Africa, says: “LTE is changing the playing field. The previous generation of...

Cisco Connect 2014. (Image Credit: Darryl Linington).

Security research in SA uncovers heightened IT security risks

November 4, 2014 • Security, Southern Africa, Top StoriesComments (0)

Critical company data is at risk in South Africa as a result of organisations focusing IT security policies and resources more on external threats, such as cybercriminals and hackers, and not enough on the threat from within the business… this is...


Botnet Malware: Robots you want to avoid

November 4, 2014 • Opinion, SecurityComments (0)

Malware has been around in some form for over 40 years, but the use of malware to take control of a group of computers that are then organised into something called a botnet is more than a 21st century phenomenon, says Carey van Vlaanderen, CEO of ESET...


ESET reveals Smart Security 8 and NOD32 Antivirus 8

October 22, 2014 • SecurityComments (0)

ESET Southern Africa revealed the latest versions of its security software products: ESET NOD32 Antivirus 8 and ESET Smart Security 8. According to ESET, the latest lineup includes Botnet Protection and Enhanced Exploit Blocker that protects against...

biggest security breaches

Infographic: 8 Biggest security breaches in history

October 22, 2014 • Security, Top StoriesComments (0)

Over the years there has been many security breaches, with companies such as eBay being targets. The info graphic, which was submitted by, has visualised the 8 biggest security breaches in history —covering how and why we should be...

Jayson O'Reilly

Security challenges driving the need for security policies

October 15, 2014 • Opinion, SecurityComments (0)

Businesses today face myriad complex threats coming at them from every angle. From hackers and hacktivists, to sophisticated cyber criminal gangs and nation-state funded advanced attacks, these threats can be catastrophic to the business. Add to this the...

Daniel Kamau Microsoft SMS&P Public Sector Lead, Sub-Saharan Africa. (Image Source: Microsoft).

Securing the cloud: The art of developing strong passwords

October 15, 2014 • Opinion, SecurityComments (0)

Imagine if, within the space of a few hours, all your accounts in the cloud got hacked and you lost all your personal documents. That is exactly what happened to John, who, in keeping with the technological advancements, started saving all his personal...

Lutz Blaeser, MD of Intact Security (image: LivDigital)

No silver bullet for IT security

October 14, 2014 • Opinion, SecurityComments (0)

The security landscape is a complex one, and several layers of defence at multiple points in the organisation are needed to successfully combat today’s sophisticated threats. Unfortunately, for too many businesses, the idea of a ‘quick fix’ is tempting,...

Kaspersky Lab’s heuristic detection protection subsystem has successfully blocked attacks via a zero-day vulnerability in Adobe Flash (image: Charlie Fripp)

Kaspersky reveals security guide to keep data safe

October 13, 2014 • SecurityComments (0)

Security experts from Kaspersky Lab’s Global Research and Analysis Team share the security measures they use to protect their own communications via email, instant messaging tools, smartphones, and while browsing over computer networks and interacting with...

Lutz Blaeser, MD of Intact Security (image: LivDigital)

Web exploits threaten businesses

September 30, 2014 • Opinion, SecurityComments (0)

The Web is still the greatest attack surface and largest entry point for malicious code. These attacks usually happen via drive-by downloads, which see malware being downloaded and executed without the user even realising. “These threats make use of...

(Image Source:

Anti-virus software is just not enough anymore

September 29, 2014 • Opinion, Security, Top StoriesComments Off

Today’s society, globally and African-based, is always on, always connected – from PCs and notebooks to tablets, smartphones and even smart televisions and other devices – we have become used to accessing the Internet at will, wherever we are. While...

Kaspersky Lab

Do users expose themselves to cybercriminals?

September 23, 2014 • Security, Southern Africa, Top StoriesComments Off

According to the results of a survey conducted by Kaspersky Lab and B2B International, only a small number of respondents understand the risks associated with active use of social networks. At greatest risk are those who use mobile devices to access social...