Managing crises when they hit is something that all utility companies have to deal with. Adverse weather, natural disaster or vandalism etc. can all wreak havoc. How a power company or utility responds and recovers is critical to their business continuity and reputation management. However, as utilities – like other companies...
Fortinet network security products deliver outstanding functionality, ease of implementation and excellent cost-benefits. This is according to dozens of Fortinet customers from across the economic spectrum who posted their evaluations of the products on the Gartner Peer Insights review site. Gartner’s Peer Insights is the research and advisory organisation’s platform...
Value-added distributor Networks Unlimited Africa – local distributors of Cofense™ (formerly PhishMe) solutions – has announced the local availability of Cofense Vision, the company’s newest solution for protecting organisational assets from phishing attacks. Effective defences against phishing must include visibility into the threats that bypass technical controls and are delivered...
Although stories of large-scale data breaches litter news headlines on a daily basis, we hear relatively few stories about individuals who fall victim to cybercrime, even though these attacks happen far more frequently. As the time we spend online increases every year, so do the risks, and for individuals,...
Multiple unidentifiable devices fuelled by Shadow IT creates vulnerabilities in enterprise networks. Most organizations think they have their security taken care of but ironically, CIOs today are not accounting for how their network is actually accessed. A single user may be logged on through multiple devices: a phone, a tablet,...
THE first West African Cyber Crime Summit (WACCS) opens today (Tuesday) in Abuja, Nigeria's federal capital. The two-day summit brings together participants from across the West African sub region and beyond. The summit builds on the West Africa Internet Fraud Pre-Summit organized last February and the first international conference on advance...
Kaspersky has released its VPN Secure Connection to run natively on Macs powered by M1. This comes at a time when the use of Virtual Private Networks (VPNs) has significantly grown due to an increase in remote working. Understanding the need for privacy when exploring the web, Kaspersky says it is constantly updating...
More and more companies are falling prey to purveyors of ransomware, a virus that attacks computers and literally holds them to ransom – locking users out of their machines and demanding payment to unlock them. As large organisations are able to invest heavily in multi-layer cyber security, their risk...
Symantec Corp. today expanded its ability to protect enterprises against web-based threats with the addition of Web Gateway 4.5 to its Symantec Protection Suite Enterprise Edition. The Web security appliance provides comprehensive protection by employing multiple layers of anti-malware technologies including Symantec’s antivirus engine to protect customers against today’s most...
Nedbank is contacting clients who have been directly affected by a data breach at a company that sends out SMSs and emails on Nedbank’s behalf. 1.7-million Nedbank clients have had that their names, ID numbers, telephone numbers, physical addresses, and email addresses leaked. While this information may have been released,...
According to Symantec, in the March edition of the MessageLabs spam report, global spam levels fell by 33 percent when the Rustock botnet was dismantled in mid-March. However, the Bagle botnet quickly filled the void, together with a number of other spam botnets that increased their activities in the second half of...
The Cirque du Soleil show Toruk mobile app which was developed for the show which held its final performance on June 30 has made users’ mobile devices vulnerable. The app, named “TORUK – The First Flight,” provided a means for the audience to be part of the show via...
Kenya's tourism industry is increasingly driving exports and providing foreign exchange, earning the country tourism expenditures of about 1.2 billion US Dollars in 2017. This represented a 20% increase from approximately 989 million US Dollars in 2016, according to a hospitality report by Jumia Travel. This improving sector performance is...
Phishing is one of the most common attack vectors for hackers who exploit end-user behavior as the weakest link in an organizations cyber-defense. For years, criminals have disguised attacks in emails and today we see phishing emails as a primary delivery method for ransomware payloads. Phishing emails have led...
With Valentine’s day around the corner and fast approaching, everyone is looking for love – instead, they may find an online virus that is stealing their money. Ain’t that a kick in the head? Antivirus gurus Kaspersky say that while choosing the right partner for a romantic night out is...
With Distributed Denial of Service (DDoS) attacks increasing considerably in size, frequency and complexity, according to the recently released Arbor Networks’ 12th Annual Worldwide Infrastructure Security report, the chances of organisations being hit by a DDoS attack have never been higher. Being prepared will make you feel more confident –...
9,800FansLike
0FollowersFollow
22,877FollowersFollow

Recent Posts