MENU

Security
Category

Online banking is convenient but the best protection is to monitor bank accounts.
 (image: Pixels)

How To Avoid Online Travel Scams

April 4, 2017 • Online & Social, Security, Southern Africa, Top StoriesComments Off on How To Avoid Online Travel Scams

As online crimes continue to increase and effect an array of industries it is important to always be vigilant. The hospitality industry is not immune to this infectious rate of increase cyber crime, especially during festive periods where fraudsters target people who are desperate to secure travel and accommodation at the last minute. The increase [&hellip...

Read More
Carey van Vlaanderen, CEO at ESET South Africa.

10 ways to protect yourself from cyberattacks

April 3, 2017 • Security, Top StoriesComments Off on 10 ways to protect yourself from cyberattacks

Technology has changed the way we live, our relationships with others, and even how we take care of ourselves. These days, everyone – from the most inexperienced to the most advanced user – takes measures to protect themselves from cybercriminals seeking...

Ransomware

Ransomware – Not Only File Encryption

March 30, 2017 • Internet of Things, Opinion, SecurityComments Off on Ransomware – Not Only File Encryption

Ransomware is an ever-increasing threat worldwide, claiming new victims on a regular basis with no end in sight. While most ransomware families prevent the victims from accessing their documents, pictures, databases and other files by encrypting them and...

How to keep yourself safe when banking online. (Image source: Business Advice UK)

How to keep yourself safe when banking online

March 30, 2017 • Finance, Online & Social, Security, Southern Africa, Top StoriesComments Off on How to keep yourself safe when banking online

The ease and convenience of banking on a mobile device is undeniable. However, this luxury does not come without any risk as cyber crime continues to plague various industries by taking advantage of the unknowing consumer. This threat has seen banks make a...

The internet has created the perfect platform for cyber criminals to grow and prosper.

Data – The most valuable business asset in the technological age

March 30, 2017 • Big Data, Security, Southern AfricaComments Off on Data – The most valuable business asset in the technological age

Cybercrime is expected to cost businesses about R78 trillion by 2021, according to statistics quoted by Cisco Connect South Africa. The internet has created the perfect platform for cyber criminals to grow and prosper as they find ways around security systems...

Darren Anstee, Chief Security Technologist at Arbor Networks.

Don’t fall prey to the common DDoS myths

March 29, 2017 • Opinion, Security, SponsoredComments Off on Don’t fall prey to the common DDoS myths

As a rapidly evolving threat, Distributed Denial of Service attacks are surrounded in a haze of confusion. Let’s explore some of the most-common myths… Distributed Denial of Service (DDoS) attacks have appeared on the threat horizon as one of the most...

Almost 1.4 billion data records compromised in 2016 as hackers targeted large-scale databases across industries (Image source: Specialized Security Services)

2016 Breach Level Index Shows 86% Rise In Data Breaches

March 28, 2017 • Security, Top StoriesComments Off on 2016 Breach Level Index Shows 86% Rise In Data Breaches

  Gemalto, a digital security company, today released the findings of the Breach Level Index. It revealed that 1,792 data breaches led to almost 1.4 billion data records compromised worldwide during 2016, an increase of 86% compared to 2015.  The...

BYOD increase the security risks of businesses.

5 WAYS BYODs ARE WEAKENING BUSINESSES DATA SECURITY

March 24, 2017 • Gadgets and Gaming, General, Lists, SecurityComments Off on 5 WAYS BYODs ARE WEAKENING BUSINESSES DATA SECURITY

BYOD (Bring Your Own Device) is a recent increasing trend towards employee-owned devices within a business. However, this recent trend of IT consumerization, regardless of its advantages, increasingly poses a security risk to organizations when these personal...

Fortinet Security

Poor Digital Hygiene Puts Your Device at Risk

March 24, 2017 • General, Mobile and Telecoms, Security, Top StoriesComments Off on Poor Digital Hygiene Puts Your Device at Risk

Increasing levels of information stored on smartphones, tablets and computers put at risk modern digital devices because of users’ poor digital hygiene. New global research by Kaspersky Lab reveals that user attitudes towards app care and maintenance on...

Paul Williams, Country Manager SADC at Fortinet.

Securing your growing home network

March 22, 2017 • General, Opinion, Security, Southern AfricaComments Off on Securing your growing home network

The number of connected devices in South African homes are expected to increase exponentially. Smart TVs, connected appliances, online fitness devices, entertainment and gaming systems, smart cars, connected water and power meters, climate control systems and...

Android Nougat 7.0

The why and how of encrypting files on your Android smartphone

March 22, 2017 • Mobile and Telecoms, Security, Top StoriesComments Off on The why and how of encrypting files on your Android smartphone

Your smartphone is crammed with sensitive information about your life, from confidential business emails and mobile banking passwords to private photos and social media logins. That means you should secure it as carefully as you would your credit cards or...

How payment mechanisms in Africa can change the way the unbanked can be incorporated into the mobile banking system.

As retail payments burst with innovation, new threats emerge

March 22, 2017 • Finance, Online & Social, Retail, SecurityComments Off on As retail payments burst with innovation, new threats emerge

The payments space is one of the most vibrant areas of financial services at the moment, with consumers craving faster, simpler ways to make payments – especially for those regular, low-value transactions that punctuate our daily comings-and-goings. Banks,...

AJ Hartenberg, Portfolio Manager: Data Centre Services at T-Systems South Africa.

Cloud Security: the 5 most important considerations

March 17, 2017 • Cloud Computing, Opinion, SecurityComments Off on Cloud Security: the 5 most important considerations

Forewarned, as they say, is forearmed. And being well-armed for the barrage of emerging cyber threats is essential as you plot your journey to enterprise cloud services. T-Systems’ AJ Hartenberg looks at the 5 biggest cloud security considerations: 1....

Biometrics and facial recognition to be used in the registration process.

World First, PayToo to Use Biometrics and Facial Recognition in Sign Up Process

March 16, 2017 • Finance, Mobile and Telecoms, Security, Top StoriesComments Off on World First, PayToo to Use Biometrics and Facial Recognition in Sign Up Process

PayToo® Wallet, a mobile banking solution, announced on the 9th of March the exclusive release of PayToo® Assistant, a new digital application that uses facial verification and biometrics to verify customers’ identity, facilitating the PayToo® sign...

Blockchain based security technology has the capability to register and validate billions of events per second, making it ideal to meet the needs of an IoT world. (image source: pixabay.com)

Preventing intrusion in the age of blockchain and IoT

March 15, 2017 • Internet of Things, Opinion, SecurityComments Off on Preventing intrusion in the age of blockchain and IoT

The era of the Internet of Things (IoT) is here, bringing with it a host of ‘futuristic’ functionality, from fully smart buildings which can be monitored and controlled through a single handheld device, to smart health devices which can detect...

A printer is an entry point into your network. And for most companies, it is a security blind spot. (image: Pixabay)

Print security: is your network at risk?

March 14, 2017 • Hardware, Security, Top StoriesComments Off on Print security: is your network at risk?

Sat quietly in the corner, your office printer might not appear to be the biggest security risk. However, studies suggest it could be a gateway to a whole host of malware, ransomware, and social engineering threats. If left unprotected, printers can be a...