-
April 3, 2018 •
Security, Top Stories •
Fundisiwe Maseko •
Comments Off on Limiting the ransomware threat
Ransomware attacks, where a hacker uses malware that encrypts or locks an individual or businesses valuable files and systems, then demands a random to unlock them, is on the rise. These attacks have become commonplace, adding one more reason why consumers...
-
March 21, 2018 •
Security, Top Stories •
Fundisiwe Maseko •
Comments Off on Protecting against identify theft
Although stories of large-scale data breaches litter news headlines on a daily basis, we hear relatively few stories about individuals who fall victim to cybercrime, even though these attacks happen far more frequently. As the time we spend online increases...
-
February 23, 2018 •
Security •
Fundisiwe Maseko •
Comments Off on The importance of insuring your digital life
The world of interconnected devices known as the Internet of Things (IoT) is set to go mass market, with the smart devices market already worth tens of billions of Dollars annually. However, many consumers are rightfully concerned about how secure these...
-
February 6, 2018 •
Security, Top Stories •
Fundisiwe Maseko •
Comments Off on Study: Over 50 percent of organisations hit by ransomware in 2017
Sophos has announced the findings The State of Endpoint Security Today which shows the extent to which businesses are at risk of repeated ransomware attacks and are vulnerable to exploits. The survey polled more than 2,700 IT decision makers from mid-sized...
-
February 5, 2018 •
Opinion, Security, Top Stories •
Fundisiwe Maseko •
Comments Off on New Ransomware seeks to destroy your business
Ransomware – a type of malware that infiltrates and infects a user or company’s system and encrypts their data, holding the organisation to ransom until a large sum of money is paid in return for a decryption key to unlock it – is more pervasive...
-
January 22, 2018 •
General, Opinion •
Fundisiwe Maseko •
Comments Off on 5 Ways to avoid Shadow IT
What is Shadow IT? It is technology used within an organisation without explicit approval — could be aptly termed as the modern Trojan horse! Since these technologies are not IT-approved, they have the potential to allow ransomware and malware to invade an...
-
January 19, 2018 •
Security, Top Stories •
Dean Workman •
Comments Off on Cybersecurity Trends 2018: The Cost of our Connected World
According to a recent ESET report, incidents and risks are predicted to grow even further in 2018. The report titled “Cybersecurity Trends 2018: The Cost of our Connected World” compiled by ESET security experts, presents topics that will be of interest...
-
January 16, 2018 •
Backup and Storage, Opinion, Security •
Dean Workman •
Comments Off on Is your backup the last line of defense against Ransomware?
Every 40 seconds a business falls victim to a ransomware attack, according to a recent story by the Forbes Technology Council. In fact, ransomware is being hailed as the greatest threat to businesses, and a report by Cybersecurity Ventures predicts that...
-
December 12, 2017 •
Gadgets and Gaming, Mobile and Telecoms, Online & Social, Opinion, Security, Top Stories •
Dean Workman •
Comments Off on Why you shouldn’t have to monitor your employees’ content consumption
Talk of monitoring and blocking employee access to certain types of Internet content might sound like draconian management measures. After all, we’re all adults in the workplace and we shouldn’t need to be told what we can and can’t look at on the...
-
December 11, 2017 •
Lists, Online & Social, Security, Top Stories •
Dean Workman •
Comments Off on Cybersecurity Predictions and Trends for 2018
Online security is seemingly getting more compromised with each passing year. 2017 has witnessed some of the worst security breaches in history – such as the breach of Equifax, which impacted over 143 million clients in the U.S. and abroad. There were also...
-
December 7, 2017 •
Security, Top Stories •
Fundisiwe Maseko •
Comments Off on A portrait of the current cyber-threat landscape
When you picture hackers, you conjure up an image of rebellious teenagers in hoodies, think again. Cybercrime is a great deal more organised than you might think and cybercriminals are increasingly developing business models of their own. In fact, certain...
-
December 7, 2017 •
Opinion, Security •
Fundisiwe Maseko •
Comments Off on Sophos 2017 Malware trends and predictions
Ransomware is on every platform – don’t assume your mobile and tablets are safe. This year, WannaCry shook the world as the cyber hi-jack accounted for more than 45% of all ransomware tracked, closely followed by Cerber at 44.2%, according to Sophos’...
-
December 4, 2017 •
Security, Top Stories •
Fundisiwe Maseko •
Comments Off on The 2018 Cybersecurity landscape
Every year around this time all the security businesses and analysts leap for their crystal ball and attempt to predict what we should be worrying about in the coming 12 months or more. And the sad reality is that not a lot will change as there is not much...
-
November 29, 2017 •
Security, Top Stories •
Fundisiwe Maseko •
Comments Off on 26 percent of ransomware attacks now target business
According to a study by Kaspersky Lab, 26.2 percent of those targeted by ransomware were business users in 2017, compared to 22.6 percent in 2016. This is due in part to three unprecedented attacks targeting corporate networks that changed forever the...
-
November 29, 2017 •
Security, Top Stories •
Dean Workman •
Comments Off on Fortinet report reveals botnet role in cyber attacks
On Wednesday 29 November 2017, cybersecurity company, Fortinet, announced the findings of its latest Global Threat Landscape Report. The research reveals that high botnet reoccurrence rates and an increase of automated malware demonstrate that cybercriminals...
-
November 23, 2017 •
Security, Top Stories •
Fundisiwe Maseko •
Comments Off on Automated data protection is critical says Redstor
The theft of data is so prevalent, so orchestrated and serious, it requires technology that is just as quick and equal to the task of providing effective protection. Because theft is automated, the security should also be automated say executives from...