MENU

Posts Tagged ‘IT Security’

  • Forcepoint Cybersecurity Predictions for 2019

    Forcepoint Cybersecurity Predictions for 2019

    November 23, 2018 • SecurityComments Off on Forcepoint Cybersecurity Predictions for 2019

    Today we announce the release of our 2019 #Cybersecurity Predictions Report! This year’s report includes insights about #AI, cyber cold warfare, and where cyber professionals expect risks to increase in general. Read the full report:...

  • The dark, foreboding presence of shadow IT inspires fear in most IT departments, sneaking into businesses undetected as people download their own, unapproved applications, software and even devices.

    Shadow IT – is it as ominous as it sounds?

    November 20, 2018 • Opinion, SecurityComments Off on Shadow IT – is it as ominous as it sounds?

    The dark, foreboding presence of shadow IT inspires fear in most IT departments, sneaking into businesses undetected as people download their own, unapproved applications, software and even devices. However, is shadow IT as ominous as it sounds? And, if so,...

  • No one is to be trusted when it comes to online data

    No one is to be trusted when it comes to online data

    November 9, 2018 • Big Data, SecurityComments Off on No one is to be trusted when it comes to online data

    A new study of mid-size businesses and consumers reveals that many are confused and lack trust when it comes to the privacy and security of their online data and behaviour. The research, which covered six countries in Europe and North America, found that...

  • IT Spending in EMEA to total $973 Billion in 2019 – Gartner

    November 9, 2018 • FinanceComments Off on IT Spending in EMEA to total $973 Billion in 2019 – Gartner

    IT spending in EMEA is projected to total $973 billion in 2019, an increase of 2 per cent from the estimated spending of $954 billion in 2018, according to the latest forecast by Gartner, Inc. “2018 is not a good year for IT spending in EMEA,”...

  • cyber security

    Naive employees are the greatest risk to a company’s cyber security

    November 7, 2018 • SecurityComments Off on Naive employees are the greatest risk to a company’s cyber security

    The greatest threat to the data security of any organisation is often traced to an oblivious employee who has inadvertently brought a company to its knees by allowing confidential and sensitive data to be hacked. Cyber forensic security expert, Rudi Dicks,...

  • Your digital identity could be on sale for less than $50

    Your digital identity could be on sale for less than $50

    November 6, 2018 • SecurityComments Off on Your digital identity could be on sale for less than $50

    While many of us have heard of, or even fallen victim to, cybercrimes such as data and identity theft, it seems that relatively few know the value of the information stolen from us. A new study from Kaspersky Lab has revealed that while our identity may not...

  • What makes a WAF ‘advanced’?

    Over 100 security professionals tell Cofense how they combat corporate phishing

    October 30, 2018 • SecurityComments Off on Over 100 security professionals tell Cofense how they combat corporate phishing

    Threat actors understand that one of the easiest and most cost-effective ways to enter an organisation illicitly is by tricking legitimate employees into allowing the threat actor into the infection process and thereby breaching the company’s defences. This...

  • Scholars beware: phishing fraudsters hunt for university credentials

    Scholars beware: phishing fraudsters hunt for university credentials

    October 27, 2018 • Security, Top StoriesComments Off on Scholars beware: phishing fraudsters hunt for university credentials

    Kaspersky Lab urges academics to be careful online: the company’s researchers have detected multiple cyberattacks hitting at least 131 universities in 16 countries, including South Africa, where several well-known universities have experienced at least...

  • According to legislation, businesses are required to manage the complete destruction of all data when IT assets reach end-of-life.

    Blancco simplifies PoPI compliance

    October 26, 2018 • General, SecurityComments Off on Blancco simplifies PoPI compliance

    According to legislation, businesses are required to manage the complete destruction of all data when IT assets reach end-of-life. Blancco has now introduced Erasure-as-a-Service, a certifiable secure data erasure solution that is PoPI compliant. Blancco...

  • Dana Eitzen

    Why the office of the future will demand stronger security measures

    October 26, 2018 • Opinion, SecurityComments Off on Why the office of the future will demand stronger security measures

    In today’s age of innovation, enterprises are understandably concerned with how new technologies will impact the way jobs are performed in the next few years. The office of the future is forcing business leaders to grapple with how to seamlessly...

  • cyber security

    The importance of ‘S’ in HTTPS

    October 11, 2018 • Online & Social, OpinionComments Off on The importance of ‘S’ in HTTPS

    Research shows that 81 of the top 100 non-Google websites are using Hyper Text Transfer Protocol Secure (HTTPS) to make their sites a safer place for individuals. HTTPS encrypts communications that are sent between an individual’s browser and the website...

  • Google Lens tests feature to analyze imported images

    Google+ is shutting down

    October 9, 2018 • Online & Social, Security, Top StoriesComments Off on Google+ is shutting down

    Google+ is shutting down after a data leak affected 500,000 users due to a security flaw that no one fixed. The Wall Street Journal reported on Monday, 8 October, that Google detected the flaw earlier this year, but that the tech giant failed to inform users...

  • From laptop computers to off-the-shelf devices, the cyber vulnerabilities keep multiplying as homes and offices incorporate more internet-connected devices.

    10 smart home cyber security tips for “Hacktober”

    October 9, 2018 • Security, Top StoriesComments Off on 10 smart home cyber security tips for “Hacktober”

    From laptop computers to off-the-shelf devices, the cyber vulnerabilities keep multiplying as homes and offices incorporate more internet-connected devices. According to cyber researchers at Ben-Gurion University of the Negev, Cyber Security Awareness Month...

  • ESET researchers discover the first-ever UEFI rootkit

    ESET researchers discover the first-ever UEFI rootkit

    October 3, 2018 • SecurityComments Off on ESET researchers discover the first-ever UEFI rootkit

    ESET researchers discovered a cyberattack that used a UEFI rootkit to establish a presence on the victims’ computers. Dubbed LoJax by ESET, this rootkit was part of a campaign run by the infamous Sednit group against several high-profile targets in Central...

  • How to tell if you've been hacked

    Comstor Southern Africa offers SolarWinds to resellers in South Africa

    September 30, 2018 • Software, Southern AfricaComments Off on Comstor Southern Africa offers SolarWinds to resellers in South Africa

    Comstor Southern Africa is pleased to announce that customers in South Africa now, as a result of the extension of its distribution contract, have access to the full range of end-to-end IT infrastructure management software solutions from SolarWinds....