ThisIsMe (TIM) has announced it will soon be launching blockchain technology to further enhance its current services of true identity (ID) verification, onboarding, background checks and KYC/AML (know-your-customer and anti-money laundering). “While often associated with the virtual currency, Bitcoin, blockchain technology is now being considered as an additional layer of...
Google has supported the Kenya Scouts Association to hold the 2019 edition of Web Rangers, a youth programme for online safety, to mark Safer Internet Day. The scheme has been run in over fifteen countries and was launched in Kenya in 2015. This year, approximately 1.4 million scouts and 50,000 scout...
The past decade has seen developments in technology that were previously unimagined. Businesses around the globe are increasingly reliant on the Internet and other technologies that keep them connected to their customers, supply chains and crucial business applications. However, while these technologies have brought significant benefits in terms of...
KnowBe4, provider of one of the world’s largest security awareness training and simulated phishing platforms, today announced it has partnered with the Centre for Cyber Safety and Education to launch the KnowBe4 Women of Colour in Cybersecurity (South Africa) Scholarship. The recipient of this award will receive an R110,000 ($7,090.68)...
Sophos has announced the findings The State of Endpoint Security Today which shows the extent to which businesses are at risk of repeated ransomware attacks and are vulnerable to exploits. The survey polled more than 2,700 IT decision makers from mid-sized businesses in 10 countries worldwide, including the US,...
In South Africa, 75% of CEOs stated that the increasing complexity of cyber threats is shaping their businesses. This is according to the PwC 23rd Annual CEO Survey 2020 which also highlights the growing public concern over data privacy and vulnerabilities in supply chains and business partners. However, with...
The attack on 200,000 plus computers across more than 120 countries around the world by the WannaCry ransomware certainly got the attention of governments, media, consumers and law enforcement. But the actual impact could have been so much worse. Much ink is still being expended trying to determine who was...
The face of cybercrime has changed, alongside the strategies used. It’s no longer just the teen hacker in their bedroom, it’s a variety of different people with a broadening array of tactics. And what’s more, in the current climate of goodwill it is increasingly easy to get caught up...
Ransomware is getting nastier and more expensive all the time and it has affected almost every industry and geography. No one is immune from the threat. In a global ransomware survey conducted by Fortinet, 67% of organizations report suffering a ransomware attack. Even worse, almost half said they had been targeted more than...
Cyber resilience cannot be considered in isolation, but should rather be considered within the context of the overall business continuity plan, says Cindy Bodenstein, Marketing Manager at Continuity SA. She says that cyber resilience was chosen as the theme for this year’s Business Continuity Awareness Week because of the...
Kenyan users are reporting on social media that they are being signed up as members of political parties in the country without their knowledge or consent via the Office of the Registrar of Political Parties (ORPP). Many are finding the developments baffling: https://twitter.com/echenze/status/1405859277315756035 As of yet, there is no clear answer for...
NEC XON Summit 2019 is covering key metrics about delivering the integrated IT solutions to Orchestrate a Brighter World (OABW) for Africa. Eugene le Roux, CEO of NEC XON Africa, has described a future Africa in which technology plays a foundational role in helping to realise the benefits of the...
Endpoint protection is one of the primary considerations for cybersecurity. There was a time when on-premise desktop computers were the only thing that had to be secured. However, BYOD and enterprise mobility have changed all that. There are now a number of different devices that are using an organisation’s network...
Ride-hailing services, such as Uber, are transforming the way we move around. A few clicks on a smartphone can have you on your way in no time, meeting the modern consumer’s need for on-demand, accessible and convenient services. According to a recent report by Genesis Analytics and the Financial Sector...
Environments running Operational technology (OT) are stepping up their focus on cybersecurity amid a growing number of attacks. This emerged insecurity breaches Fortinet’s recent State of Operational Technology and Cybersecurity Report, which found about 74 per cent of OT organisations have experienced a malware intrusion in the past 12...
NEXT Biometrics, a provider of fingerprint sensor technology, and secure authentication and smart card solutions provider MK Group have agreed to extend cooperation. Joint market and product development efforts will now also comprise identity and access management (IAM) applications as well as Public-Key-Infrastructure* (PKI)-based secure authentication solutions. NEXT Biometrics had...
22,877FollowersFollow

Recent Posts