Monday, April 28, 2025
No menu items!

African Cybersecurity

CA Southern Africa on the Forefront of Cybersecurity

CA Southern Africa, as a representative of Broadcom Software and a driving force behind the adoption of Symantec Enterprise Cloud (SEC) in South Africa's enterprise market, unveils exciting developments following Broadcom's acquisition of Symantec in 2019. This acquisition strengthened...

Remote Work is Here to Stay: 4 Critical Elements Companies MUST Address

Every business has to protect three critical assets – its staff, customers and its data. When one has six-foot walls around their home, one hopes to protect their physical property and household goods. Unfortunately, most people's defences are woefully...

How Companies Should Deal with the Threat of Cybercrime

Cybercrime is on the rise and South African C-suites would do well to ensure that they have up-to-date and appropriately resourced strategies to deal with its threat. The pandemic showed us that while land and sea borders can be...

Research Shows an Increase in Ransomware Attacks on South African Companies

South Africa is firmly in the sights of international cybercrime syndicates, who have been ramping up their attacks on local companies in the past six months - reveals cybersecurity defence, offence and protection specialist, Nclose. ‎ Martin Potgieter, Co-Founder of...

Protecting the IT Landscape in a Borderless World

The evolution of technology has pushed the perimeter of organisations further and further towards the edge, and we no longer have the monolithic structures we did in the past. The cloud, the Internet of Things (IoT), even the COVID-19 pandemic...

5 Reasons Why (Not Only) Financial Companies Struggle with Cybersecurity

Financial services companies have been a popular target for cybercriminals for a long time. Not without good reason, since beyond working with money, financial companies handle a slew of sensitive client data that criminals utilise in various fraud schemes...

How to Create a Culture of Cybersecurity

Security. This is a word that can make a grown CFO tremble and an entire SOC crumble. It is the word that captures a complex landscape littered with complexity, cybercriminals and technology. It defines how well an organisation adheres to...

5 Cybersecurity Tips for Startups

From 2020 being dubbed ‘the year of the side hustle’ to small businesses grappling to maintain continuity and profitability, despite these unprecedented times there has been a significant uprising in entrepreneurial activity the world over. Startups tend to be created...

Why Cyber Attacks are Technology’s ‘Natural’ Disasters

The SolarWinds attack was stunning in its scope and scale. If it were an earthquake, it would be 9.9 on the Richter scale. As digital transformation accelerates in 2021 and beyond—and applications accelerate as central enablers of business and...

How the ‘Broken Window’ Theory Affects Cybersecurity Matters

Here at Networks Unlimited Africa, we are applying the ‘broken window’ principle when looking at our internal cybersecurity posture and how it affects business processes. The term ‘Broken window’ comes from George Kelling, a criminologist, who wrote in 1982 that,...
- Advertisement -spot_img

Latest News

Offboarded Employees and ITAM – It Doesn’t Have to Be a Mess

As today’s workplace shifted to digital, companies often focus heavily on onboarding, but what happens when an employee decides...
- Advertisement -spot_img