MENU

Security
Category

fintech africa

Are we safe to bank on biometrics?

September 20, 2017 • Finance, Security, Top StoriesComments (0)

For financial institutions, the primary goal of digitisation is making banking simpler and more intuitive for customers. Biometric identification has huge potential, offering convenience, simplifying password management and providing a frictionless authentication process. However, combining the desire for ease of use with the need to improve security is a...

Read More
Preventing and Mitigating Ransomware with Cyber Situational Awareness

Preventing and Mitigating Ransomware with Cyber Situational Awareness

September 20, 2017 • East Africa, North Africa, Opinion, Security, Southern Africa, Top Stories, West AfricaComments (0)

If you’re familiar with mafia movies then you’re familiar with extortion – the practice of obtaining something, especially money, through force or threats. Extortion has been around for centuries – well before “The Godfather” or “Goodfellas.”...

'BlueBorne vulnerability'

BlueBorne Attacks: Tips to protect yourself and your Bluetooth-enabled devices

September 19, 2017 • Security, Top StoriesComments (0)

Fortinet has urged caution regarding a new Bluetooth exploit, known as BlueBorne, that has been discovered to exploit a number of Bluetooth vulnerabilities, making billions of devices potentially vulnerable to attack. While there is no evidence that such...

Connected devices

Security should be a priority in an increasingly connected world

September 19, 2017 • Internet of Things, Security, Top StoriesComments (0)

The Internet of Things (IoT) is rapidly expanding to include a previously undreamed of amount of connected devices – cars, toys, medical devices, home appliances – and all these smart things connecting to the Web have to be secured. Unfortunately,...

Cyber impersonation attacks the latest security threat to businesses

Cyber impersonation attacks the latest security threat to businesses

September 18, 2017 • East Africa, North Africa, Security, Southern Africa, Top Stories, West AfricaComments (0)

Amidst the global furore over high-profile cyber espionage, businesses and individuals have to contend daily with increasing cyber criminality. In line with the uptick in ransomware, impersonation attacks have become a common way for cybercriminals to extract...

Mobile network security calls for new generation of services

Mobile network security calls for new generation of services

September 18, 2017 • Mobile and Telecoms, Opinion, Security, Top StoriesComments (0)

It has become more common these days to hear about the latest security breach or denial of service (DOS) attack, which highlights the many challenges businesses face as they look to curb an increasing number of attacks passing through their IT networks. In...

IT security shouldn't be a grudge purchase

IT security shouldn’t be a grudge purchase

September 17, 2017 • East Africa, North Africa, Opinion, Security, Southern Africa, Top Stories, West AfricaComments (0)

Selling cybersecurity products and services is challenging at the best of times. Security, even though it is understood to be essential, tends to be a grudge purchase for most businesses. “Security is aimed at preventing a business from falling victim to a...

Cyber impersonation attacks the latest security threat to businesses

Top 3 tips for expanding your organisation’s security strategy

September 13, 2017 • East Africa, North Africa, Security, Southern Africa, Top Stories, West AfricaComments (0)

With a leadership team in place and a set of known and likely email security threats identified, African organisation’s need to be ready to build out advanced security strategy. Here are 3 ways in which advanced security strategies can be expanded. Engage...

Why hire people to breach your network?

Why hire people to breach your network?

September 13, 2017 • East Africa, North Africa, Opinion, Security, Southern Africa, West AfricaComments (0)

As data breaches become more commonplace, littering the headlines on a daily basis, businesses of all types and across all industries need to work on the assumption that they are a target. Because of this, organisations, especially those who house sensitive,...

Cybersecurity

Organisations must disrupt cyber attacks before they become a business disrupt

September 12, 2017 • SecurityComments (0)

ICT services and solutions provider, Dimension Data, and Cisco, have joined forces and published a white paper to help organisations stay ahead of ransomware threats. The Ransomware: The Pervasive Business Disruptor looks at ransomware trends and impacts,...

Top 7 ways to ensure a data breach does not happen to you

Top 7 ways to ensure a data breach does not happen to you

September 12, 2017 • East Africa, North Africa, Opinion, Security, Southern Africa, Top Stories, West AfricaComments (0)

143 million… The number of US consumers potentially affected by the recently announced credit services data breach is staggering. It’s nearly half the US population. And as a credit reporting service, this data includes names, addresses, financial...

Fortinet Global Threat Landscape report

Poor cybersecurity hygiene and risky application usage enables attacks

September 11, 2017 • Security, Top StoriesComments (0)

Fortinet has announced the findings of its latest Global Threat Landscape Report. The report reveals that poor cybersecurity hygiene and risky application usage enables destructive worm-like attacks to take advantage of hot exploits at record speed....

Online safety

How to protect your child’s identity online

September 11, 2017 • Online & Social, Opinion, Security, Top StoriesComments (0)

There are indications that identity theft syndicates are now targeting children. Common-sense practices, backed up by proper education, will save endless trouble down the line. In the online world, identity theft has become big business. People are remarkably...

Preventing and Mitigating Ransomware with Cyber Situational Awareness

Top 5 mobile digital risks to look out for

September 6, 2017 • East Africa, North Africa, Opinion, Security, Southern Africa, West AfricaComments Off on Top 5 mobile digital risks to look out for

I’ll venture to guess you’re using a mobile device to read this. In a recent Ericsson Mobility Report, the total number of mobile subscriptions at the end of 2016 was approximately 7.5 billion and growing around 4 percent year-on-year. Greater speed,...

Shadow IT could be the reason businesses “wannacry”

Shadow IT could be the reason businesses “wannacry”

September 5, 2017 • East Africa, North Africa, Opinion, Security, Southern Africa, West AfricaComments Off on Shadow IT could be the reason businesses “wannacry”

There are mixed opinions about implementing unauthorised, IT applications (apps) within the organisation, a practice known as Shadow IT. Opinion on Shadow IT is divided into two camps. Some believe that due to the fast pace of business, demands are exceeding...

Direct Pay Online receives International Security Certification

Direct Pay Online receives International Security Certification

September 4, 2017 • Finance, Security, Top StoriesComments Off on Direct Pay Online receives International Security Certification

Direct Pay Online Group (DPO) is the first payment service provider (PSP) in Africa to receive the Payment Card Industry Data Security Standard (PCI DSS) Level 1 certification in 12 African countries. This comes after the successful completion of...