MENU

Security
Category

New rigorous measures and effective legislative reforms help attract more investment in the country’s vibrant IT sector

Egypt’s software piracy drop and legal reforms boost foreign investment

September 18, 2018 • East Africa, Security, Top StoriesComments Off on Egypt’s software piracy drop and legal reforms boost foreign investment

Egypt has seen a two percent drop in its software piracy rate to reach (59%), the U.S.-based Business Software Alliance said in its recent study, released last June. The study revealed that Egypt has managed to decrease the commercial value of the unlicensed software, which declined significantly from $157m in 2015 to $64m in 2017. [&hellip...

Read More
Top tips to keep safe this Tax season

Top tips to keep safe this Tax season

September 18, 2018 • Finance, Security, Southern Africa, Top StoriesComments Off on Top tips to keep safe this Tax season

Tax season in South Africa opened on the 1st July – and to many it is an opportunity to file tax returns for a welcome refund. However, to online scammers it’s a window of opportunity. Sensitive financial data is everywhere: taxes filed online,...

US unveils first step toward new online privacy rules

African organisations processing EU personal data should have data security breach checklist in place

September 18, 2018 • SecurityComments Off on African organisations processing EU personal data should have data security breach checklist in place

Organisations in Africa that are processing the personal information of data subjects from within the European Union (EU) should already have effective General Data Protection Regulation (GDPR) compliance procedures in place, including Data Breach Security...

Parental Control report reveals children's online activities in Nigeria

Parental Control report reveals children’s online activities in Nigeria

September 17, 2018 • Security, Top Stories, West AfricaComments Off on Parental Control report reveals children’s online activities in Nigeria

A study conducted by Kaspersky Lab has revealed online activities of children across Nigeria, based on statistics from the company’s Parental Control modules. The research has revealed what children in the region watched, listened to, purchased and...

Kaspersky Lab detected the rise of mobile banker Asacub

Kaspersky Lab detected the rise of mobile banker Asacub

September 17, 2018 • SecurityComments Off on Kaspersky Lab detected the rise of mobile banker Asacub

Kaspersky Lab has recently saw a large-scale distribution campaign of the Trojan Asacub. According to company’s experts, the number of users who face Asacub reaches 40 thousands daily. Asacub is primarily aimed at Russian users, since the cybercriminals...

A closer look at the ups and downs of BYOD

A closer look at the ups and downs of BYOD

September 17, 2018 • Opinion, Security, Top StoriesComments Off on A closer look at the ups and downs of BYOD

Tablets, smartphones, iPods, MP3-players, USB flash drives, you name the device and people in Namibia have them. Employees or ‘ end-users’, if you will, will bring their own devices to work and not hesitate to connect to company’s wi-fi or directly plug...

Comstor Southern Africa offers SolarWinds to resellers in South Africa

Email hackers defeated by AI

September 17, 2018 • Security, Top StoriesComments Off on Email hackers defeated by AI

Email is a regular method of attack for the cybercriminal because it is the easiest and most successful way to spread high-risk threats. This makes it one of the most popular vectors in a hacker’s arsenal. The thing with hacking an email account is that the...

Nigeria: Cyber security advocacy group calls president to sign electronic transaction bill

Nigeria: Cyber security advocacy group calls president to sign electronic transaction bill

September 17, 2018 • Security, Top Stories, West AfricaComments Off on Nigeria: Cyber security advocacy group calls president to sign electronic transaction bill

Cyber Security Expert Association of Nigeria, CSEAN, has called for the President, Muhammadu Buhari to sign the Electronic Transaction bill. The Electronic Transaction Bill enables the validity of contracts expressed in electronic forms, matters relating to...

How remote administration tools bring unexpected threats to industrial networks

Kaspersky Lab launches International Cybersecurity Contest

September 15, 2018 • SecurityComments Off on Kaspersky Lab launches International Cybersecurity Contest

Kaspersky Lab has launched a new cybersecurity contest called ‘Secur’IT CUP’ which invites students and young professionals aged from 18 to 28 from all over the world to participate in solving cybersecurity cases, as individuals or in teams....

Christo van Staden, Forcepoint Regional Manager: Sub-Saharan Africa

The four biggest misconceptions about cloud security

September 14, 2018 • Cloud Computing, SecurityComments Off on The four biggest misconceptions about cloud security

The widespread adoption of cloud solutions has been driven by the myriad of associated benefits offered, such as flexibility, scalability and remote access. At the same time, concerns have been raised regarding the security of these solutions when it comes to...

SAS Regional Practice Lead in Fraud and Financial Crimes to speak at at the Anti-Money Laundering and Financial Crime 2018 Southern Africa Conference

SAS Regional Practice Lead in Fraud to speak at Anti-Money Laundering and Financial Crime 2018

September 14, 2018 • Events, Security, Southern AfricaComments Off on SAS Regional Practice Lead in Fraud to speak at Anti-Money Laundering and Financial Crime 2018

“The perception that Africa is the ideal destination to launder money is slowly changing” said a popular speaker, William Lawrence William, Regional Practice Lead: Fraud and Financial Crimes at SAS is back on the programme after a year of...

Don’t make your data compliance pop – make it POPIA

Beat the POPI blues with ManageEngine Log360 SIEM Solution

September 13, 2018 • Security, SponsoredComments Off on Beat the POPI blues with ManageEngine Log360 SIEM Solution

As cyber-attacks continue to persist across the globe as well as in South Africa, organisations are feeling the pressure to secure their systems. In the event of a data breach, individuals’ personal data can be exposed to cyber-extortionists, encouraging...

The shift of risk – how cybersecurity is impacting GRC

The shift of risk – how cybersecurity is impacting GRC

September 13, 2018 • Opinion, SecurityComments Off on The shift of risk – how cybersecurity is impacting GRC

Almost a third of South African businesses surveyed for PWC’s Global Economic Crime and Fraud Survey 2018 were affected by cybercrime over the past two years, ranking South Africa second for cybercrime, globally. On top of that, more than a quarter of...

Biometrics provides a "window to the soul" in the modern enterprise

Biometrics provides a “window to the soul” in the modern enterprise

September 12, 2018 • SecurityComments Off on Biometrics provides a “window to the soul” in the modern enterprise

The modern workspace is enduring a momentous amount of change, driven largely by needs associated with digitisation, real-time interaction and improving customer experience. Mobility is at the heart of this change and the mobile device is seen as the entry...

Top 5 things to be aware this Cyber Security Month

Taking a ‘human centric’ approach to security

September 12, 2018 • Opinion, SecurityComments Off on Taking a ‘human centric’ approach to security

Every time the details of a new security breach hits the headlines, something is made clear: Security tools and solutions aren’t working. Yet businesses continue to throw more and more money and technology at the problem. It’s time to look at the human...

Robert Lipovsky unpacks popular cyber threats

Interview: Senior Malware Researcher at ESET unpacks popular cyber threats

September 11, 2018 • People, Security, Top StoriesComments Off on Interview: Senior Malware Researcher at ESET unpacks popular cyber threats

Cybercrime remains a looming threat in the ICT sector and doesn’t show any signs of slowing down. Cybercriminals continue to find new and sophisticated ways to override security protocols for malicious purposes. In 2017, we saw the rise of ransomware as...