Results for cybersecurity breach

News

Why HR is at risk from cyberattacks
Why HR is at risk from cyberattacksArticle

Human Resources professionals are a common, high risk target for cyberattacks - simply because they are easily accessible...

9 Apr 2021

Think cybersecurity is expensive? Just wait until there's a breach...
Think cybersecurity is expensive? Just wait until there's a breach...Article

Medium-sized companies in South Africa are in a precarious position in terms of cybersecurity...

Lukas van der Merwe 18 Dec 2020

How will cybersecurity help your business comply with POPI Act?
How will cybersecurity help your business comply with POPI Act?Article

With the new sections of the Protection of Personal Information Act (POPIA) being implemented, businesses need to tighten their cybersecurity...

1 Jul 2020

Flattening the cybercrime curve
Flattening the cybercrime curveArticle

With millions of office workers now working from home as a result of the Covid-19 pandemic, this has become an opportune time for cybercriminals seeking to exploit the crisis and penetrate corporate defences via unsecured home networks.

14 Apr 2020

Cyber risk during Covid-19 outbreak
Cyber risk during Covid-19 outbreakArticle

A common response by businesses to the spread of the coronavirus (Covid-19) has been to implement measures that require social distancing and remote working...

Rosalind Lake and Priyanka Naidoo 19 Mar 2020

Do you have a cyber incident response plan?
Do you have a cyber incident response plan?Article

This time of the year is a boom time for cybercriminals. Consumers are shopping and transacting more...

18 Dec 2019

SMEs are the weakest link in supply chain cybersecurity
SMEs are the weakest link in supply chain cybersecurityArticle

Small to medium enterprises are at greatest risk from cybersecurity threats, and their vulnerability in turn poses a danger to the major corporations that they do business with...

7 Oct 2019

The need for zero trust in cybersecurity
The need for zero trust in cybersecurityArticle

Cybersecurity in an age of such rapid technological advancement has brought one incontrovertible fact to the fore...

Graeme O'Driscoll 21 Aug 2019

Safeguard your network from attacks
Safeguard your network from attacksArticle

Ongoing vigilance, maintenance of systems and a holistic approach to security remains vital for critical infrastructure entities

30 Jul 2019

Employee education is a critical weapon against cyber threats. Image supplied
Employee education a critical weapon against cyber threatsArticle

The better an employee's understanding of cybersecurity risks is, the greater their potential to participate in reducing these risks...

5 Jun 2019

There's a massive cybersecurity job gap - we should fill it by employing hackers
There's a massive cybersecurity job gap - we should fill it by employing hackersArticle

Cybersecurity incidents are gaining an increasingly high profile. In the past, these incidents may have been perceived primarily as a somewhat distant issue for organisations such as banks to deal with...

John McAlaney and Helen Thackray 24 Apr 2019

A quick guide to end-to-end business security
A quick guide to end-to-end business securityArticle

The threat of cyber attacks has been at the forefront of discussions in the media and in the technology industry itself...

Elaine Wang 5 Feb 2019

4 Strategies to get your website security ready
4 Strategies to get your website security readyArticle

Is it too obvious to say that website security is vitally important to small to medium-sized enterprises (SMEs)?

Gary Stevens 10 Dec 2018

What makes a WAF 'advanced'?
What makes a WAF 'advanced'?Article

While traditional web application firewalls (WAF) may have once been highly effective in mitigating application layer attacks...

19 Nov 2018

The DNA of cybersecurity failure
The DNA of cybersecurity failureArticle

Cybersecurity has become one of the most important aspects determining the safety of companies, governments and individuals in the modern age...

Martin Potgieter 8 Oct 2018

Data security in the cloud - whose responsibility is it really?
Data security in the cloud - whose responsibility is it really?Article

When moving data into the cloud, organisations should be aware that it is the responsibility of the information owner...

24 Aug 2018

PoPI requires effective data management structures
PoPI requires effective data management structuresArticle

The Protection of Personal Information Act (PoPI) will fundamentally change how companies store, process and use personal customer data. And even though it has not yet officially been implemented, organisations have been steadily working on ensuring their compliance...

Claude Schuck 31 Oct 2017

AfriSecure Cybersecurity Summit ready for Johannesburg
AfriSecure Cybersecurity Summit ready for JohannesburgArticle

The AfriSecure Cybersecurity Summit, which takes place on from 18-19 October 2017, aims to connect senior executives responsible for protecting their companies' critical infrastructures with solution providers...

16 Oct 2017

Business growth a priority for Africa's CEOs
Business growth a priority for Africa's CEOsArticle

Business growth remains high on the African boardroom agenda despite economic and socio-political headwinds...

11 May 2017

Sub-Saharan Africa third highest exposure to cyber fraud
Sub-Saharan Africa third highest exposure to cyber fraudArticle

Given that sub-Saharan Africa has the third highest exposure to incidents of cyber fraud in the world, the revised draft Cybercrimes and Cybersecurity Bill is a welcome addition to the prevention of cybercrime...

Krevania Pillay 18 Apr 2017

Industry 4.0: SA gets digital
Industry 4.0: SA gets digitalArticle

In South Africa, a surge is expected in digital in five years' time, with the current level of digitisation and integration expected to rise from 27% to 64%...

Danette Breitenbach 26 Apr 2016

Ties between software piracy and malware
Ties between software piracy and malwareArticle

Rather than hacking consumer PCs as well as home and business networks, cybercriminals are starting to rely upon the software piracy industry to leave the "security back door" open, enabling them to steal identities, passwords and your banking login details more easily.

24 Mar 2014

Next >
Let's do Biz