Windows 10 free

Top IT security issues to consider when migrating to a new OS

July 30, 2015 • Security, Top StoriesComments (0)

Major events in the IT landscape, such as the availability of a new operating system (OS), cannot go by unnoticed, because they affect businesses of all shapes and sizes. Many will ask themselves “should we migrate to a new version and if yes – when?” Anyone who has ever gone through the process knows that [&hellip...

Read More
Candice Sutherland

Ashley Madison hack highlights cybercime threat for businesses

July 22, 2015 • Security, Top StoriesComments (0)

The need for African and global businesses to ensure that they are adequately protected from cybercrime has been brought to light once again following the recent hack of notorious dating website Ashley Madison. It is estimated that more than 37 million of its...

ashley madison

Ashley Madison hacked, security expert reacts

July 21, 2015 • Security, Top StoriesComments (0)

News of the hack has reached a global audience. The data stolen in the hack includes the company’s databases of 37 million users, financial records, and other proprietary information. The site is essentially a dating website that...


Investment managers must tackle data analytics and cyber-risks

July 13, 2015 • Security, Top StoriesComments (0)

Investment managers must successfully navigate an increasingly complex regulatory environment, if they are to capitalise on growth opportunities, according to a new report by KPMG. The latest report, Navigating Opposing Forces, reveals that on the one hand,...

(Image Source:

Tips for safe and secure holidays in Kenya

July 8, 2015 • East Africa, Security, Top StoriesComments (0)

With school holidays around the corner in Kenya, many Kenyans may be heading off for a well-deserved break with friends and family. With that in mind, becoming infected with malware or becoming a victim of fraud or some other cyber-threat is not necessarily...

Cyber Bullying

How to help victims of online cyberbullying

July 6, 2015 • Online, SecurityComments (0)

Cyberbullying, which is bullying that takes place using digital technology, has become a serious issue including within Africa. The consequences can be serious: children become withdrawn and secretive, their schoolwork suffers and they may become aggressive,...

online payments

Internet users in SA still think branches are safer than online banking

June 24, 2015 • Security, Southern Africa, Top StoriesComments (0)

Almost half (43%) of Internet users  in South Africa believe traditional over-the-counter banking is safer than banking online, according to a survey carried out by Kaspersky Lab and B2B International. Despite these fears most people still make some payments...

AJ Hartenberg 1

Securing the cloud: The factors that need to be considered

June 22, 2015 • Cloud Computing, Security, Top StoriesComments (0)

Security has typically been, and continues to be, one of the major areas of concern for organisations contemplating a move into the cloud, and for good reason. Security breaches can have far-reaching consequences that could cripple a business, and legislative...

By Gad Elkin, Security Sales Director, EMEA, F5 Networks.

South African companies plagued by cyber-attacks

June 8, 2015 • Security, Southern Africa, Top StoriesComments (0)

The speed of technological change is leaving gaping holes in highly sensitive company IT infrastructure. These vulnerabilities are being targeted by cybercriminals at an increasing rate as South Africa is starting to feel the heat from attackers across the...

Doros Hadjizenonos, Country Manager of Check Point South Africa.

The first step to stopping the next Cyberattack

June 4, 2015 • Security, Top StoriesComments (0)

Given the ever-increasing sophistication of cybercrime methods, organisations must employ advanced assessment tools and practices to reduce or eliminate security gaps. The first step to a successful security posture is to know what your current security...

New national surveillance system now live in Kenya (Nairobi skyline. Image source:

Kenya’s Safaricom says national police surveillance system live

May 27, 2015 • East Africa, Mobile and Telecoms, Security, Top StoriesComments (0)

Kenya’s Safaricom says a new national police surveillance system has gone live. Despite a number of groups voicing concerns over the new system and what it could mean for privacy in the East African country, the country has gone ahead with the system. The...

Windows Live ID

New scam uses Windows Live ID to capture information

May 21, 2015 • Security, Top StoriesComments (0)

According to Kaspersky Lab, experts are warning of a new scam that uses Windows Live ID as bait to catch personal information stored in user profiles on services like Xbox LIVE, Zune, Hotmail, Outlook, MSN, Messenger and OneDrive – Which are currently...

Fred Mitchell - 2014

Technology is not the silver bullet for cyber security threats

May 21, 2015 • Security, Top StoriesComments (0)

In Africa as well as globally Cyber security is no longer an IT problem, but rather a priority of the highest levels at a majority of organisations. The reason for this is simple – cyber threats have become a serious issue that costs businesses money,...

(Image Source:

18 percent of South Africans lost backup copies of data

May 19, 2015 • SecurityComments (0)

According to Kaspersky Lab and B2B International, 18 percent of South African users who kept backup copies of their data on physical media eventually lost these copies. In the modern world, where information is highly valuable, it is important to not only...


Is 2015 the year of a data dystopia?

May 7, 2015 • Opinion, Security, Top StoriesComments (0)

With news of the 2015 Oscar winners still ringing in our ears, there is something about this time of year that makes watching a good film particularly satisfying. However, even amidst so many great new releases, there is nothing like sitting down and watching...

Citrix South Africa

Rethink security to beat tomorrow’s threats

May 6, 2015 • Opinion, Security, Top StoriesComments (0)

The transformation of enterprise IT can seem like one of the biggest challenges for security professionals as there is a whole new skill set required today to protect data. It’s no longer about providing employees an all access pass to the network, it’s...