MENU

Security
Category

John Maddison, senior vice president of products and solutions at Fortinet.

Top 5 Cyber threats every security leader must know about

October 2, 2017 • East Africa, North Africa, Security, Southern Africa, West AfricaComments Off on Top 5 Cyber threats every security leader must know about

Networks are evolving at an unprecedented rate. Physical and virtual environments, private and public clouds, and a growing array of Internet of Things (IoT) and endpoint devices are all dramatically expanding the potential attack surface. Protecting highly elastic network environments present cyber security leaders with a complex array of security...

Read More
Cybercrime

Roughted remains the top malware in Africa to watch out for

September 30, 2017 • East Africa, Finance, Security, Southern Africa, Top Stories, West AfricaComments Off on Roughted remains the top malware in Africa to watch out for

Check Point Software has revealed that banking Trojans were extensively used by cyber-criminals during August 2017, with three variants appearing in the company’s latest Global Threat Impact Index. The Zeus, Ramnit and Trickbot banking trojans all...

33 million South Africans have their personal info leaked online

Kenya gets new cybersecurity policy

September 29, 2017 • East Africa, Finance, Security, Top StoriesComments Off on Kenya gets new cybersecurity policy

Aon Kenya, an insurance company has launched an enterprise Cyber Enterprise Solutions with the aim to protect businesses against cybercriminals, data loss and the potential ramifications of a cyber-incident. According to the company, the policy covers...

Accenture, Microsoft and Avanade expand cybersecurity partnership

Accenture, Microsoft and Avanade expand cybersecurity partnership

September 28, 2017 • East Africa, North Africa, Security, Southern Africa, Top Stories, West AfricaComments Off on Accenture, Microsoft and Avanade expand cybersecurity partnership

Accenture, Microsoft and Avanade announced on Wednesday 27 September 2017 that the companies are extending their collaboration through a multi-year, multi-million-dollar agreement to develop, integrate and bring to market enhanced cyber defence solutions to...

cybersecurity

Starting an online business? Here are some cybersecurity tips

September 28, 2017 • East Africa, North Africa, Online & Social, Security, Southern Africa, Top Stories, West AfricaComments Off on Starting an online business? Here are some cybersecurity tips

If you are one of those enthusiastic and adventurous entrepreneurs who are on the verge of launching your own startup, here’s an important question for you: Have you secured your startup enough so that it can resist the security threats of today?...

South Africans lead the way in Mobile Banking

Mobile Trojans steal users’ money through WAP-billing services

September 22, 2017 • Mobile and Telecoms, Security, Top StoriesComments Off on Mobile Trojans steal users’ money through WAP-billing services

Mobile Trojan clickers that are stealing money from Android users through WAP-billing have been discovered by Kaspersky Lab researchers. The trend is becoming common with thousands of affected users in different countries across the globe. Wireless...

SA biometrics firm aims to curb identity theft.

South Africa: Biometrics firm aims to curb identity theft

September 22, 2017 • Security, Southern Africa, Top StoriesComments Off on South Africa: Biometrics firm aims to curb identity theft

Ideco, a South African biometrics company, has unveiled its identity assurance ecosystem – which according to the company – aims to deliver fraud-proof trusted identity authentication, confirmed with a digital certificate of authenticity in...

fintech africa

Are we safe to bank on biometrics?

September 20, 2017 • Finance, Security, Top StoriesComments Off on Are we safe to bank on biometrics?

For financial institutions, the primary goal of digitisation is making banking simpler and more intuitive for customers. Biometric identification has huge potential, offering convenience, simplifying password management and providing a frictionless...

Preventing and Mitigating Ransomware with Cyber Situational Awareness

Preventing and Mitigating Ransomware with Cyber Situational Awareness

September 20, 2017 • East Africa, North Africa, Opinion, Security, Southern Africa, Top Stories, West AfricaComments Off on Preventing and Mitigating Ransomware with Cyber Situational Awareness

If you’re familiar with mafia movies then you’re familiar with extortion – the practice of obtaining something, especially money, through force or threats. Extortion has been around for centuries – well before “The Godfather” or “Goodfellas.”...

'BlueBorne vulnerability'

BlueBorne Attacks: Tips to protect yourself and your Bluetooth-enabled devices

September 19, 2017 • Security, Top StoriesComments Off on BlueBorne Attacks: Tips to protect yourself and your Bluetooth-enabled devices

Fortinet has urged caution regarding a new Bluetooth exploit, known as BlueBorne, that has been discovered to exploit a number of Bluetooth vulnerabilities, making billions of devices potentially vulnerable to attack. While there is no evidence that such...

Connected devices

Security should be a priority in an increasingly connected world

September 19, 2017 • Internet of Things, Security, Top StoriesComments Off on Security should be a priority in an increasingly connected world

The Internet of Things (IoT) is rapidly expanding to include a previously undreamed of amount of connected devices – cars, toys, medical devices, home appliances – and all these smart things connecting to the Web have to be secured. Unfortunately,...

33 million South Africans have their personal info leaked online

Cyber impersonation attacks the latest security threat to businesses

September 18, 2017 • East Africa, North Africa, Security, Southern Africa, Top Stories, West AfricaComments Off on Cyber impersonation attacks the latest security threat to businesses

Amidst the global furore over high-profile cyber espionage, businesses and individuals have to contend daily with increasing cyber criminality. In line with the uptick in ransomware, impersonation attacks have become a common way for cybercriminals to extract...

Mobile network security calls for new generation of services

Mobile network security calls for new generation of services

September 18, 2017 • Mobile and Telecoms, Opinion, Security, Top StoriesComments Off on Mobile network security calls for new generation of services

It has become more common these days to hear about the latest security breach or denial of service (DOS) attack, which highlights the many challenges businesses face as they look to curb an increasing number of attacks passing through their IT networks. In...

IT security shouldn't be a grudge purchase

IT security shouldn’t be a grudge purchase

September 17, 2017 • East Africa, North Africa, Opinion, Security, Southern Africa, Top Stories, West AfricaComments Off on IT security shouldn’t be a grudge purchase

Selling cybersecurity products and services is challenging at the best of times. Security, even though it is understood to be essential, tends to be a grudge purchase for most businesses. “Security is aimed at preventing a business from falling victim to a...

33 million South Africans have their personal info leaked online

Top 3 tips for expanding your organisation’s security strategy

September 13, 2017 • East Africa, North Africa, Security, Southern Africa, Top Stories, West AfricaComments Off on Top 3 tips for expanding your organisation’s security strategy

With a leadership team in place and a set of known and likely email security threats identified, African organisation’s need to be ready to build out advanced security strategy. Here are 3 ways in which advanced security strategies can be expanded. Engage...

Why hire people to breach your network?

Why hire people to breach your network?

September 13, 2017 • East Africa, North Africa, Opinion, Security, Southern Africa, West AfricaComments Off on Why hire people to breach your network?

As data breaches become more commonplace, littering the headlines on a daily basis, businesses of all types and across all industries need to work on the assumption that they are a target. Because of this, organisations, especially those who house sensitive,...