Wednesday, October 9, 2024
No menu items!

security threats

How can businesses enhance their cyber resilience in 2024?

Data has become a core business asset, and protecting this asset from data loss is a strategic priority, especially as new threats are constantly emerging. The escalating sophistication of cyber threats will necessitate advancements in AI-powered data security technologies...

Microsoft Research Shows: Sporting Events are a Major Target for Cyber Attacks

Microsoft’s latest Cyber Signals report highlights threats to large venues, and sporting and entertainment events, based on its learnings and telemetry from delivering cybersecurity support to critical infrastructure facilities during the State of Qatar’s hosting of the FIFA World...

What’s causing today’s IT security gap?

What's stopping global businesses from protecting their assets despite significant investments in cybersecurity programmes? That's the question we asked ourselves when trying to determine what the reasons are behind the dangerous gap in modern IT security. We define the gap...

Weaponised IoT attacks: what does the future hold?

The explosion of connected devices onto our networks is fuelling our imaginations and inspiring incredible visions for the future. There is limitless potential in being able to connect and integrate our cars, houses, appliances, and everything else we own. We’re...

What are the main security threats for 2016?

Panda Security has revealed its predictions regarding the main problems that could affect IT security in 2016. The coming year will be filled with threats that could affect private users and small businesses, as well as large corporations... This is according to...

Anti-virus software is just not enough anymore

Today’s society, globally and African-based, is always on, always connected – from PCs and notebooks to tablets, smartphones and even smart televisions and other devices - we have become used to accessing the Internet at will, wherever we are....

Security threats rank as top reason not to use illegal software

Computer users cite the risk of security threats from malware as the top reason not to use unlicensed software. Among their specific concerns are intrusions by hackers and loss of data. Yet 34 percent of the software installed on...

Social Networking poses security threats

Social networking is all about sharing: information, ideas, jokes, pictures, personal, academic and professional milestones. That is why it has become such a popular way for individuals around the world to stay in touch with each other and for...
- Advertisement -spot_img

Latest News

A New Era for Payments in South Africa with 1Voucher

Flash Group and Ecentric have formed a strategic partnership to transform South Africa's payment landscape by integrating 1Voucher, a...
- Advertisement -spot_img