Thursday, January 23, 2025
No menu items!

nClose

Talking Public Sector Cybersecurity with Nclose – ITNA Digital Innovation Podcast EP 6

This week's podcast is sponsored by the Public Sector Cybersecurity Summit held on the 2nd and 3rd of August 2022. This virtual event will have all the information you and your public organisation will need to prepare yourself for...

LinkedIn: Are There Cyber-Risks Lurking Beneath the Surface?

In February 2021, the data from 500 million LinkedIn users was leaked by hackers, in June 2021, more than 700 million LinkedIn users had their data leaked and put up for sale. In June 2022, the FBI said that the...

How a Small Email Phish Can Become a Million Rand Ransom

Cybercrime is smart, innovative, and agile. Cybercriminals are well-rewarded for their innovative attack vectors and have no incentive to stop finding inventive ways of penetrating systems and moving past the most vulnerable defences. According to Paul Grapendaal, Head of Managed...

Beware: Microsoft is One of the Most Impersonated Brands in Phishing Attacks

Check Point Research for the second quarter of 2021 found that Microsoft was the most popular brand used to lure unsuspecting individuals and employees. This isn’t hard to believe because Microsoft’s Active Directory, continues to dominate the market share globally...

The DNA of cybersecurity failure

Cybersecurity has become one of the most important aspects determining the safety of companies, governments and individuals in the modern age. Headline-grabbing examples of major cybersecurity breaches have become increasingly commonplace, from the Sony Pictures hack in 2014 that...

Modern KPIs for effective cybersecurity

Faced with increasingly frequent and sophisticated cyber-attacks, enterprises are scrambling to put technologies and processes in place to effectively detect and combat cyber risks. Research by Symantec found that ransomware attacks increased by 36% in 2017 following the introduction...

SA operational technologies open to attack

South African operational Industrial Control System (ICS) /SCADA systems are becoming increasingly intelligent and connected, and therefore increasingly at risk of attack. “While a major breach has not yet been reported in South Africa, it is only a matter of...
- Advertisement -spot_img

Latest News

3Dtracking and the Evolution of Telematics: Transforming Fleet Management Across Africa

As businesses increasingly prioritize efficiency, cost savings, and safety, telematics technologies have become a critical tool for optimizing logistics,...
- Advertisement -spot_img