MENU

Security
Category

Selling your privacy for ‘free’ services

Selling your privacy for ‘free’ services

February 19, 2018 • Security, Top StoriesComments (0)

Facebook, Twitter, Snapchat, Instagram… Chances are that most people are a user of at least one of these social media sites. However, when signing up for a social media account, most users are more concerned about which profile picture to choose, than about reading the seemingly endless terms of service document. And what they fail [&hellip...

Read More
Cybersecurity – a digital growth enabler

Cybersecurity – A digital growth enabler

February 19, 2018 • General, Mobile and Telecoms, Online & Social, Opinion, SecurityComments (0)

Organisations are in the midst of transforming their business models where everything that can be digitised, is being digitised. This raises competitive stakes, as more organisations seek to digitally transform and disrupt their industries to stay ahead of...

7 Steps security leaders can take to deal with Spectre and Meltdown

7 Steps security leaders can take to deal with Spectre and Meltdown

February 16, 2018 • Security, Top StoriesComments (0)

Security and risk management leaders must take a pragmatic and risk-based approach to the ongoing threats posed by an entirely new class of vulnerabilities, according to Gartner, Inc. “Spectre” and “Meltdown” are the code names given...

Advanced DDoS for SMEs from Arbor Networks

Advanced DDoS for SMEs from Arbor Networks

February 14, 2018 • Security, SponsoredComments (0)

Around the globe, you don’t have to look far to find anecdotes about the increasing need for small and medium enterprises (SMEs) to ramp up their cybersecurity arrangements. In South Africa, Professor Basie von Solms, Director of the Centre for Cyber...

How to make your mobile device more resilient

How to make your mobile device more resilient

February 13, 2018 • Gadgets and Gaming, Opinion, SecurityComments (0)

If you’re reading this article, it’s likely that you’re hoping for quick tips on what to do if you suspect there’s spyware or a tracker on your phone. If that is the case, you’re likely to be disappointed; there are no quick lists of things to...

MyCybercare to launch personal data monitoring service

2018 ICT Security: A year of dire predictions

February 13, 2018 • Satellite Communications, SecurityComments (0)

For both consumers and corporates, the security threat landscape will this year become even more treacherous with experts predicting an increase in zero-day exploits and massive changes in the way ransomware operates. According to Bitdefender’s threat...

How banks can crowd-source fraud management?

Combating Fraud with Tokenised Identities

February 12, 2018 • General, Online & Social, Opinion, SecurityComments (0)

Secure national identity infrastructure is foundational to delivering the benefits of a digital economy, where the bulk of transactions involve online interactions between remote entities. Whilst citizens in developed countries take identity for granted, in...

Cyber security is smarter now so there’s no excuse

Cyber security is smarter now so there’s no excuse

February 9, 2018 • Opinion, SecurityComments (0)

Office 365 missed nearly 1 million spam, phishing, and other e-mails in September 2017 that contained malware of 10 million e-mails verified. Of that number, the darkreading.com story continues, about 34 000 were phishing mails, which was not too surprising,...

Microsoft Tech Summit 2018: Moving to the modern workplace with 365

Microsoft Digital Civility Index reveals South Africa’s online behaviours

February 9, 2018 • Online & Social, Security, Southern Africa, Top StoriesComments (0)

Microsoft, coinciding with Safer Internet Day (SID), released the results of its Microsoft Digital Civility Index. The index examines the extent of negative behaviours, online interactions and their consequences. The research encompassed 23 countries and 20...

Boost security by detecting active compromises

Boost security by detecting active compromises

February 9, 2018 • Opinion, Security, Southern AfricaComments (0)

A huge surge in large-scale ransomware attacks, such as the recent WannaCry, Petya and variations thereof, coupled with massive data breaches such as Verizon, Deloitte and closer to home, Hetzner, is highlighting in no uncertain terms how crucial security...

Cyber security: The winner takes it all

Cyber security: The winner takes it all

February 9, 2018 • Opinion, Security, SponsoredComments (0)

It is pretty much a given that the majority of people have their personal information documented somewhere in virtual space. This data has been captured in many forms and bits and bytes through online transactions, social engagement, studies, business and...

Martin Walshaw, Senior Engineer at F5 Networks.

Why decision-makers should reconsider their security focus this Valentine’s Day

February 9, 2018 • Opinion, SecurityComments (0)

Love is purportedly in the air again, but is it being channelled in the right direction? As customers engage with your apps this Valentine’s, do you have the right strategy to secure a long-term relationship? In the quick-fire, post-Tinder world, those...

7 Steps security leaders can take to deal with Spectre and Meltdown

Companies increasingly turning to cloud for improved security

February 8, 2018 • Opinion, Security, Top StoriesComments (0)

Data breaches that result in confidential data being compromised, whether it is just released to the general public or used for more malicious purposes, have become almost a daily occurrence, making cybersecurity a non-negotiable for organisations. This...

Crossing the online privacy border puts Valentine’s Day gestures in jeopardy-Study

Crossing the online privacy border puts Valentine’s Day gestures in jeopardy

February 8, 2018 • Security, Top StoriesComments (0)

When relationships blossom, individual digital lives become blurred and online boundaries compromised, which can endanger our personal privacy. A global research conducted by Kaspersky lab and Toluna, reveals that despite an overwhelming majority of people...

Get cyber insurance for your mobile through Mycybercare and The Foschini Group.

First of its kind cyber insurance launched in Africa

February 7, 2018 • Mobile and Telecoms, Online & Social, Security, Southern Africa, Top StoriesComments (0)

On Tuesday 6 February 2018, The Foschini Group (TFG) announced a partnership with cyber insurance company, Mycybercare, which will see customers buying mobile phones from TFG stores be financially protected, and covered for financial losses incurred due to...

Is your business harnessing remote IT support services?

How to avoid disaster in the wake of spectre and meltdowm

February 7, 2018 • Mobile and Telecoms, Opinion, Security, Southern AfricaComments (0)

Earlier this month, while the majority of South African business owners were still enjoying their summer holiday, the global technology industry suffered a rather devastating blow. Two major security vulnerabilities, dubbed Meltdown and Spectre, were...