MENU

Posts Tagged ‘cybercriminals’

  • 5 WordPress hosting features for high performance

    How to safeguard your online profile

    June 5, 2019 • SecurityComments Off on How to safeguard your online profile

    Millions of South Africans have an online presence, and most eagerly start and end each day checking Facebook, Twitter and Instagram profiles. However, many do not keep in mind that, with the amount of personal information they post online, they need to...

  • Password awareness critical in the fight against cybercrime says experts

    Password awareness critical in the fight against cybercrime says experts

    June 3, 2019 • SecurityComments Off on Password awareness critical in the fight against cybercrime says experts

    If you knew just how valuable your identity was, would you pay more attention to securing it? A recent Kaspersky Lab study revealed that digital identity data and information holds significant value to cybercriminals – who craft ways of gaining this data...

  • Trend Micro launches new channel programme in Sub-Saharan Africa.

    BYOD and IoT threats in the Workplace

    June 2, 2019 • SecurityComments Off on BYOD and IoT threats in the Workplace

    The concept of the Internet of Things (IoT) is becoming widely known and understood, not just in business but in the home too. The problem with IoT however is knowing what devices are IoT-enabled and which are not. Opening a huge security risk for businesses...

  • Startups can get online and save cash

    Hosting company warns against domain hijacking

    March 14, 2019 • SecurityComments Off on Hosting company warns against domain hijacking

    Domain names can be stolen, held hostage and used to wreak havoc for a business website owner. Domain hijacking entails cyber criminals unlawfully gaining access to a website’s unique domain in order to impersonate the business for other illegal...

  • Tech support scams are up, warns Microsoft

    March 11, 2019 • SecurityComments Off on Tech support scams are up, warns Microsoft

    Hackers are always on the lookout for new ways to make more money. Cybercriminals have an impressive arsenal of tools to use in order to retrieve data or money from someone’s network. One of the methods that they are using far more often is the tech support...

  • What is the cyber security recipe for SMEs?

    What is the cyber security recipe for SMEs?

    January 24, 2019 • Security, StartupsComments Off on What is the cyber security recipe for SMEs?

    Small and medium-sized businesses are becoming more and more attractive targets for cybercriminals – both direct and also as a starting point for larger attacks across a supply chain. Unfortunately, these companies often lack the experts, systems and...

  • Most businesses struggle with implementing adequate data protection-Study

    Preparing for the inevitable – what 2018 taught businesses about data protection

    January 22, 2019 • SecurityComments Off on Preparing for the inevitable – what 2018 taught businesses about data protection

    Around this time last year, commentators across the industry predicted that 2018 was going to be the ‘year of data protection’, and it was. Even halfway through the year, we had seen a number of high profile data breaches and the public’s...

  • Tapping into an open source eco-system critical in 2019

    January 21, 2019 • FeaturesComments Off on Tapping into an open source eco-system critical in 2019

    There are some big things set for 2019. Customer expectations continue to evolve, new technologies are developed to push the envelope and all of that leads to continuous transformation of our business, our people, our processes and of course, the technology...

  • Data security sits at the heart of democracy

    Data security sits at the heart of democracy

    January 15, 2019 • Security, Southern AfricaComments Off on Data security sits at the heart of democracy

    Military risks immediately spring to mind: a recent report found that even the Pentagon’s latest advanced military systems are vulnerable and can be “easily hacked”. The consequences for citizens of rogue military assets is unthinkable. But...

  • Cyber incidents, major risks for financial services -study

    Are we prepared to face 2019’s cyber security challenges?

    January 10, 2019 • SecurityComments Off on Are we prepared to face 2019’s cyber security challenges?

    “Technology is a queer thing. It brings you great gifts with one hand, and it stabs you in the back with the other,” wrote novelist and scientist C. P. Snow in the New York Times in 1971. It still rings true today. Every new tool or technology we...

  • Connected car chargers could leave home networks vulnerable

    Connected car chargers could leave home networks vulnerable

    January 8, 2019 • SecurityComments Off on Connected car chargers could leave home networks vulnerable

    While modern electric vehicles are tested constantly for vulnerabilities, some of their essential accessories, such as the battery chargers, often remain neglected. Kaspersky Lab experts have discovered that electric vehicle (EV) chargers supplied by a major...

  • Biometrics has a keen stake in the war on identity fraud

    December 6, 2018 • SecurityComments Off on Biometrics has a keen stake in the war on identity fraud

    Identity fraud remains one of the most prominent cybercrime threats of modern society today. Global research notes that on average businesses loose over US$ 200 billion every year – while consumers loose more than US$ 16 billion due to identity fraud. In...

  • Trend Micro launches new channel programme in Sub-Saharan Africa.

    Endpoint Detection and Response – the best way to do it

    November 7, 2018 • SecurityComments Off on Endpoint Detection and Response – the best way to do it

    Endpoint protection is one of the primary considerations for cybersecurity. There was a time when on-premise desktop computers were the only thing that had to be secured. However, BYOD and enterprise mobility have changed all that. There are now a number of...

  • nCipher, Credence Security to offer data protection solutions across Sub-Saharan Africa

    App permissions can be used to exploit your data

    October 24, 2018 • Security, Top StoriesComments Off on App permissions can be used to exploit your data

    Every time an application is installed on a device, the user is asked to allow that app certain permissions. These range from being able to view your contacts, to using your camera and microphone, tracking your location, and many, many more. While some of...

  • What to know before giving into ransom demands

    What to know before giving into ransom demands

    October 18, 2018 • SecurityComments Off on What to know before giving into ransom demands

    Despite small and medium enterprises (SMEs) becoming increasingly popular targets for cybercriminals, many remain completely unprotected in this regard. As a result, when faced with a ransomware attack, there is often a lack of preparation and awareness...

  • Top 7 tips for protecting your Smart TV

    Top 7 tips for protecting your Smart TV

    October 9, 2018 • Top StoriesComments Off on Top 7 tips for protecting your Smart TV

    The final few months will likely be a busy time of year for people and cybercriminals will be no different as they continue to look for weak spots in networks. It’s holiday time, and maybe you’ve invited friends over and you plan to sit back and watch the...