MENU

Security
Category

Interview :Understanding the cyber resilience strategy

March 1, 2019 • Features, Security, Top StoriesComments Off on Interview :Understanding the cyber resilience strategy

Technology has become deeply ingrained in our lives. The way businesses handle the risks posed by their technology is changing. As with anything, adaptability is survivability. Cyber resilience is a set of practices and perspectives that mitigate risk within the processes and workflow of normal operations in order to protect organisations from their own...

Read More
Beware of new malicious trojan doing the rounds

Beware of new malicious trojan doing the rounds

March 1, 2019 • SecurityComments Off on Beware of new malicious trojan doing the rounds

If you haven’t heard of it yet, then be on the lookout for this malevolent trojan currently doing the rounds. Emotet is reported to dwarf the impact of WannaCry and NotPetya which made headlines in 2018 for multimillion-dollar losses incurred to businesses...

Privileged Credential Abuse contributes to 74 Percent of data breaches

Privileged Credential Abuse contributes to 74 Percent of data breaches

February 28, 2019 • SecurityComments Off on Privileged Credential Abuse contributes to 74 Percent of data breaches

  Centrify, a provider of cloud-ready Zero Trust Privilege to secure modern enterprises, has announced results of a new survey revealing that most IT decision makers are not prioritizing Privileged Access Management (PAM) practices and solutions, despite...

Universities beware the Stolen Pencil ATP

February 28, 2019 • Security, Top StoriesComments Off on Universities beware the Stolen Pencil ATP

There is a new advanced persistent threat (APT) in the global village and it’s called ‘Stolen Pencil’, because it apparently targets academic institutions. “We say ‘new’ threat,” says Bryan Hamman, territory manager for sub-Saharan Africa at...

How Kenyan businesses can improve their cyber security

February 22, 2019 • East Africa, Features, Security, Top StoriesComments Off on How Kenyan businesses can improve their cyber security

According to a Kaspersky research, the first quarter of 2018 showed an overall increase in local threats infections (malware spread in local networks, by USBs, CDs, DVDs) with Kenya taking the first place with 61.8% of its users infected. And with the uptake...

FNB prioritieses debit order fraud

February 22, 2019 • Finance, Security, Top StoriesComments Off on FNB prioritieses debit order fraud

FNB has detected abnormally high volumes and disputes of suspicious debit orders with descriptors Procall and Mzansi in December 2018 and January 2019. In line with its standard practice, the Bank informs customers of new debit orders loaded on their bank...

The 3 main business risks Botswana faces in 2019

The 3 main business risks Botswana faces in 2019

February 20, 2019 • Security, Southern AfricaComments Off on The 3 main business risks Botswana faces in 2019

One of the most important trends to emerge in recent years is that it is increasingly difficult to identify individual risks in isolation. Business, society and culture are all complex and that gives rise to an interconnected risk landscape which requires an...

Watch out for phoney Facebook logins

Watch out for phoney Facebook logins

February 19, 2019 • Online & Social, Security, Top StoriesComments Off on Watch out for phoney Facebook logins

Phishers are using a new tactic to get your Facebook login details: copycat single sign-on login windows. A plethora of third-party websites use single sign-on, or SSO, to let you log in with your Facebook details. This way your Facebook login is used as a...

Organisation should consider security concerns in the cloud

Organisation should consider security concerns in the cloud

February 18, 2019 • Cloud Computing, SecurityComments Off on Organisation should consider security concerns in the cloud

Organisations should pay closer attention to security concerns associated with storing data in the cloud as configuration errors together with cloud threats pose a significant and ever-increasing risk to enterprise data, says Nompumelelo Mdima, McAfee...

Cyber incidents, major risks for financial services -study

Cybercrime tools have become democratised reveals study

February 15, 2019 • SecurityComments Off on Cybercrime tools have become democratised reveals study

The second instalment of the 2019 Security Report by Check Point highlights how tools and services used to commit cyber-crime have become democratised, with advanced attack methods now available to anyone willing to pay for them, as part of the growing...

34 percent of South African organisations are ready to comply with POPI Act

34 percent of South African organisations are ready to comply with POPI Act

February 14, 2019 • Security, Southern Africa, Top StoriesComments Off on 34 percent of South African organisations are ready to comply with POPI Act

Sophos, a network and endpoint security company, has revealed the findings of a new study that was commissioned to determine the state of POPI compliance within South African organisations. The POPI Act (Protection of Personal Information) promotes the...

How to protect your heart and money from Romantic Phishing

February 14, 2019 • Security, Top StoriesComments Off on How to protect your heart and money from Romantic Phishing

Kaspersky Lab experts have detected a sharp increase in phishing activities from criminals offering users various romantic goods on the eve of St. Valentine’s Day. The total number of user attempts to visit fraudulent websites with a romantic theme that...

Uganda strengthens security with Automated Biometric Identification System

February 11, 2019 • East Africa, Security, Top StoriesComments Off on Uganda strengthens security with Automated Biometric Identification System

Digital security company, Gemalto is supplying its Cogent Automated Biometric Identification System (CABIS) and LiveScan technology to the Ugandan Police. These biometric solutions enable the police force to better solve crimes through the electronic...

Apple rails against secret screen recordings

February 10, 2019 • Security, Top StoriesComments Off on Apple rails against secret screen recordings

In a recent article from TechCrunch, it was revealed that Apple is calling for the removal of code that lets developers record how a user interacts with their iPhone apps or face having their apps removed from the App Store entirely. Apple issued this warning...

Google launches Web Rangers in partnership with Kenyan scouts

February 8, 2019 • East Africa, SecurityComments Off on Google launches Web Rangers in partnership with Kenyan scouts

Google has supported the Kenya Scouts Association to hold the 2019 edition of Web Rangers, a youth programme for online safety, to mark Safer Internet Day. The scheme has been run in over fifteen countries and was launched in Kenya in 2015. This year,...

More organisations to adopt mobile-centric biometric authentication by 2022

February 8, 2019 • SecurityComments Off on More organisations to adopt mobile-centric biometric authentication by 2022

Gartner has predicted that by 2022, 70 per cent of organisations using biometric authentication for workforce access will implement it via smartphone apps, regardless of the endpoint device being used. In 2018, this figure was fewer than 5 per cent. Lower...