Visit Covid-19 news, links and sacoronavirus.co.za

Latest showcases

How to have strong cyber hygiene
How to have strong cyber hygiene

Cyber threats do not rest and they continue to evolve and bad actors develop new attack techniques. Good cybersecurity hygiene requires more than a strong password to avoid compromise.

By Doros Hadjizenonos 5 hours ago

How to approach data breaches
How to approach data breaches

As data breaches continue to make their way into the public news cycle, individuals and organisations alike are looking for ways to protect their financial and personal information...

By Doros Hadjizenonos 11 May 2020

How secure is your company data during a lockdown?
How secure is your company data during a lockdown?

Many businesses have developed business continuity plans (BCP) to mitigate risks and reduce the impact of the coronavirus crisis...

By Paula Sartini 4 May 2020

How to secure your remote workforce
How to secure your remote workforce

For many organisations, the need to suddenly enable a remote workforce at scale has overtaken long-term plans they may have had to gradually extend remote work capacity...

By Doros Hadjizenonos 20 Mar 2020

I've been hacked! What do I do?
I've been hacked! What do I do?

With all the hype around cyber attacks and every single cybersecurity enterprise talking about cyber resilience to improve a business' security posture, nobody really knows what to do once they've been hacked...

By John Mc Loughlin 21 Feb 2020

Reconnecting with humanity in a tech-filled world
Reconnecting with humanity in a tech-filled world

Media keeps showing us pessimistic views of the future where it becomes all too easy to buy into the idea that tech is out to rob us of our humanity...

By Evan-Lee Courie 17 Feb 2020

How many abandoned online accounts do you have?
How many abandoned online accounts do you have?

For some reason, our online accounts always seem to miss the proverbial 'spring' or 'New Year, new me' cleans ups...

By Riaan Badenhorst 14 Feb 2020

Employees must be educated about mobile cyber threats
Employees must be educated about mobile cyber threats

Nearly 9 in 10 companies not only allow but actually rely on their employees to access critical business apps using their personal devices...

By Doros Hadjizenonos 13 Feb 2020

#SaferInternetDay: Industry-specific approaches to cyber risks
#SaferInternetDay: Industry-specific approaches to cyber risks

Companies of all natures, shapes, and sizes are at risk of cyber threats and crime. No organisation is immune to cyber-attacks...

By Evan-Lee Courie 10 Feb 2020

Odette van der Haar, managing director of Publicis.
#BizTrends2020: Imagine the impossible

In order to stay in business, one needs to stay abreast with technology and remain up to date with the latest innovations...

By Odette van der Haar 24 Jan 2020

Artificial intelligence: Do we know what we're doing?
Artificial intelligence: Do we know what we're doing?

Artificial intelligence is our shiny new toy. We're dazzled by its potential to help us make our lives more efficient, more productive... just... better...

By Catherine Black 20 Jan 2020

#BizTrends2020: Cybersecurity trends predictions
#BizTrends2020: Cybersecurity trends predictions

The realities of the negative impact of modern cyber threats arguably hit home for South Africans in 2019 - more than any other year...

By Brian Pinnock 16 Jan 2020

#BizTrends2020: 6 cybersecurity trends to watch in 2020
#BizTrends2020: 6 cybersecurity trends to watch in 2020

The cybersecurity threat landscape is always shifting, making it easy for businesses to become vulnerable to emerging threats...

By Charl Ueckermann 15 Jan 2020

#BizTrends2020: Trends for the near future
#BizTrends2020: Trends for the near future

In the knowledge economy, every glimpse of the probable future carries monetary value...

By Marian Salzman 6 Jan 2020

What can we do to stop ransomware attacks on governments?
What can we do to stop ransomware attacks on governments?

The City of Johannesburg recently became the latest victim of high-profile ransomware attacks specifically targeting government departments...

By Simeon Tassev 16 Dec 2019

Image source: Gallo/Getty Images.
Securing your brand is a C-suite challenge

How can your customers trust you if you don't take precautions to protect their personal information?...

By Paula Sartini 13 Dec 2019

The complex and challenging world of cyber risks
The complex and challenging world of cyber risks

The rate at which digital technology is evolving and disrupting traditional business models, cyber risks seem to evolve even faster...

By John Mc Loughlin 11 Dec 2019

Are you leaving the front door open for cyber criminals?
Are you leaving the front door open for cyber criminals?

Are you careful about keeping your front door locked and garage securely closed? Do you switch the home alarm on at night before dozing off? Yep, we thought so...

By Aaron Thornton 16 Oct 2019

Try to tackle cybersecurity during #RWC2019
Try to tackle cybersecurity during #RWC2019

Simon McCullough, major channel account manager at F5 Networks, discusses the cybersecurity challenges facing a modern global sports showcase like the rugby world cup...

By Simon McCullough 20 Sep 2019

Stay safe from cybercrime with what's left of 2019
Stay safe from cybercrime with what's left of 2019

Data breaches and cyberattacks are undeniably on the rise as hackers become increasingly sophisticated...

By Simon McCullough 30 Aug 2019

FaceApp and the dark side of AI
FaceApp and the dark side of AI

Terminator and The Matrix got it wrong. We all thought the villains of the AI era would be killer robots or hostile programmes...

By Lee Naik 14 Aug 2019

A new phase of cyber warfare has begun
A new phase of cyber warfare has begun

Hackers acting on behalf of nation-state powers are no longer just out to disrupt critical infrastructures - they're also actively seeking trade secrets...

By Simon McCullough 7 Aug 2019

Stay ahead of emerging cyber threats
Stay ahead of emerging cyber threats

Over the past couple of decades, changes in the threat landscape have driven changes in how we design, implement and manage security...

By Doros Hadjizenonos 8 Jul 2019

Essential cloud security concepts
Essential cloud security concepts

Possibly the most important attribute of the cloud is that critical business applications can be deployed, managed, and distributed faster and easier than by any other method...

By Doros Hadjizenonos 20 Jun 2019

AI in cybersecurity - friend or foe?
AI in cybersecurity - friend or foe?

It's no news that advances in AI and machine learning have enormous transformative potential for cybersecurity defences...

By Simon McCullough 13 Jun 2019

The world then and now, and how the way we protect our children needs to change
The world then and now, and how the way we protect our children needs to change

This National Child Protection Week (CPW), Google South Africa and Media Monitoring Africa hosted a roundtable putting a spotlight on the importance of online safety for children...

By Jessica Tennant 31 May 2019

365 days of GDPR: Has the storm passed?
365 days of GDPR: Has the storm passed?

There's no doubt that May 2018 will be remembered in business and technology circles as an important milestone in the evolution of data protection legislation...

By Johan Scheepers 29 May 2019

6 Tips for creating secure passwords
6 Tips for creating secure passwords

Passwords are like toothbrushes - you want to choose a good one, never share it, and replace it quarterly...

By Doros Hadjizenonos 13 May 2019

Fantastic (ethical) hackers and where to find them
Fantastic (ethical) hackers and where to find them

Data breaches and cyberattacks are unignorably on the rise and hackers are becoming increasingly sophisticated...

By Simon McCullough 26 Apr 2019

Q&A: Jaya Baloo talks quantum computing, cybersecurity in financial institutions
Q&A: Jaya Baloo talks quantum computing, cybersecurity in financial institutions

Jaya Baloo has been working internationally in information security for nearly two decades...

By Evan-Lee Courie 18 Apr 2019

Next >
Let's do Biz