SOUTH AFRICA How the 'GoFetch' attack could target your MacApple has found success with its Macs after moving to homebaked silicon because of the incredible battery endurance. Source: Apple Newsroom | |
SOUTH AFRICA #CybersecurityMonth: EMEA faces surge of DDoS attacks in H1 2023[Lindsey Schutters] Cybercriminals ramped up their nefarious activities during the first half of 2023, EMEA receives most DDOS attacks... | |
SOUTH AFRICA #CybersecurityMonth: What are Passkeys and why is it the future of online security?[Lindsey Schutters] Google is rolling out Passkeys by default to its account users, and both Apple and Microsoft are on board... | |
SOUTH AFRICA 4 ways to manage the human threat to cybersecurityHigh pressure modern business environment. Source: Fauxels/Pexels | |
SOUTH AFRICA #EcomAfrica: Boardroom confidence in cybersecurity crucial for e-commerce success[Imran Salie] Cybersecurity isn't something that individuals take very seriously. Think for a moment about how often you make a concerted effort to ensure that your personal information is secure online... | |
SOUTH AFRICA Cybersecurity awareness is no longer a generic exercise for business[Simeon Tassev] Anew precedent has been set, with ENSafrica being ordered to pay R5.5m and legal fees to an individual who lost money due to a manipulated email from the firm... | |
SOUTH AFRICA SA shoppers warned of online scams ahead of shopping season[Dan Thornton] This holiday season, we can expect an array of shopping-related scams where you won't get what you have paid for... | |
SOUTH AFRICA Building cyber-savvy workplaces in SA[Dan Thornton] The vast majority of cyber-attacks against South African businesses and individuals are carried out by international cyber criminal groups... | |
SOUTH AFRICA Ransomware is a business resilience issue, not an IT problem[Kate Mollett] Although ransomware affects IT infrastructure, the impact of an attack goes far beyond and stretches to every corner of a business... | |
SOUTH AFRICA The changing role of the chief information security officer in a data-driven world[Chris de Bruyn] The role of the chief information security officer used to be purely focused on managing security problems and risks... | |
SOUTH AFRICA Cyber savvy parents keep kids safer online[Dan Thornton] Cybersecurity involves the whole family... | |
SOUTH AFRICA Cyber fraud has steep collective costs[Dan Thornton] At the root of the vast majority of cybercrime is a simple human mistake - one password used over and over again, your barcoded boarding pass posted on social media, or your entire collection of digital passwords collated in an Excel doc or iPhone notes. | |
SOUTH AFRICA Why cybersecurity needs to tighten up as cryptocurrencies plummet[Dan Thornton] There's never been a more important time to be concerned about cybersecurity and the widespread cybercrimes that flourish in the 'Wild West' territories of cryptocurrencies... | |
SOUTH AFRICA Tax season is coming amidst a shocking rise in cybercrime[Dan Thornton] Sars has warned of a sharp increase in scams targeting taxpayers aimed at getting us to disclose personal information... | |
SOUTH AFRICA SA's Cybercrimes Act - will it change how you use the internet?[Matthew Campbell] What does this new act mean for South African consumers and businesses online? Here's what you need to know about it... | |
SOUTH AFRICA What online privacy and security will look like in 2022[Andrew Bourne] Online privacy and security is an ongoing battle and organisations of all sizes will have to keep stepping up their efforts when it comes to protection... | |
SOUTH AFRICA 5 cybersecurity tips to secure your workforceImage source: © Maksim Kabakou – 123RF.com | |
SOUTH AFRICA 5 important lessons to learn from the REvil ransomware attack[Anna Collard] Anna Collard, SVP of content strategy and evangelist for KnowBe4 Africa, offers five important lessons to learn from the recent REvil ransomware attack... | |
SOUTH AFRICA Here's how hackers break into the business environment and how it can be avoided[Anna Collard] Organisations have to invest in comprehensive in-depth phishing plans, leveraging policies, technical tools and awareness training best practices to ensure that they're not vulnerable to attack. And this attack is absolutely guaranteed... |