Kaspersky makes threat intelligence reports available for auto industry
Kaspersky makes threat intelligence reports available for auto industry

Cybersecurity company Kaspersky recently announced that it has launched its tailored threat intelligence (TI) reporting tool for organisations working in the automotive industry...

20 Jan 2021

Top IT security threats in 2021
Top IT security threats in 2021

Looking to the year ahead, we expect the most common form of attack - phishing emails - to increase in both volume and sophistication...

Anna CollardBy Anna Collard 20 Jan 2021

Human fallibility remains the weakest link in cybersecurity
Human fallibility remains the weakest link in cybersecurity

If the South African financial industry can learn one thing from Experian's 2020 data breach, it is this: human fallibility is still the weakest link in the fight against cyberattacks...

By Yash Pillay 19 Jan 2021

Microsoft was the most imitated brand for phishing attempts in Q4 2020
Microsoft was the most imitated brand for phishing attempts in Q4 2020

Forty-three percent of all brand phishing attempts related to the technology giant - up from 19% in Q3, as threat actors continued to try to capitalise on people working remotely during the second wave...

15 Jan 2021

#BizTrends2021: Evolution of workforce skills demand - what the future holds
#BizTrends2021: Evolution of workforce skills demand - what the future holds

When reflecting on the fourth industrial revolution, a number of things immediately spring to mind - for example, IoT, AI, and robots. Regrettably, little attention is given to individual employees and workers in this emerging industrial world, unless one is discussing the concerns related to potential job losses...

Lyndy van den BarselaarBy Lyndy van den Barselaar 14 Jan 2021

Information Regulator engages Facebook SA over privacy policy
Information Regulator engages Facebook SA over privacy policy

South Africa's Information Regulator met Facebook South Africa this week to discuss its revised WhatsApp privacy policy...

14 Jan 2021

7 tips from Kaspersky on using Telegram privately and securely
7 tips from Kaspersky on using Telegram privately and securely

For those that have made the switch to Telegram following WhatsApp's privacy policy update, here are seven tips from Kaspersky to make your experience on the app as private and secure as possible...

13 Jan 2021

#BizTrends2021: What the new year holds for cybersecurity
#BizTrends2021: What the new year holds for cybersecurity

The year 2020 has been one of the most challenging years in recent memory, both in terms of the effects of the coronavirus pandemic on societies and economies around the world, and the impact of a dramatic rise in cybercrime...

Brian PinnockBy Brian Pinnock 6 Jan 2021

Why businesses should prioritise application security
Why businesses should prioritise application security

Application development is becoming an important business differentiator as companies embark on a digital transformation. Yet, many organisations treat cybersecurity as an afterthought - and this oversight leaves applications vulnerable to attack...

By Glenn Morgan 5 Jan 2021

SaaS adoption: Why organisations shouldn't neglect data protection, security aspects
SaaS adoption: Why organisations shouldn't neglect data protection, security aspects

With the acceleration of digital transformation due to the Covid-19 pandemic, organisations have had to turn to technologies such as cloud computing to ensure business continuity and enable employees to work remotely...

By Simon Williams 22 Dec 2020

Gov-X Innovation Challenge: What it is and why it's important for SA's cybersecurity
Gov-X Innovation Challenge: What it is and why it's important for SA's cybersecurity

It was recently announced that the University of the Western Cape: Future-Innovation Lab partnered with KnowBe4 to host a cyber-themed learning programme and hackathon called 'Gov-X Innovation Challenge'. But what exactly is this challenge?

21 Dec 2020

Think cybersecurity is expensive? Just wait until there's a breach...
Think cybersecurity is expensive? Just wait until there's a breach...

Medium-sized companies in South Africa are in a precarious position in terms of cybersecurity...

By Lukas van der Merwe 18 Dec 2020

#BestofBiz 2020: ICT
#BestofBiz 2020: ICT

We've compiled our annual #BestofBiz 2020 lists across all our industries featuring our most popular articles, most-read contributors and brand press offices with the most views. Discover the most read content on Bizcommunity's IT & Telecommunications site over the past year below...

14 Dec 2020

Cybercrime risks are ruining the gains made over the last year
Cybercrime risks are ruining the gains made over the last year

While online merchants are revelling in the excellent growth of new customers, fraudsters are also migrating online and, if left unchecked, these bad actors could destroy the windfall of this new customer acquisition...

Brendon WilliamsonBy Brendon Williamson 11 Dec 2020

3 things school IT teams should prioritise to prepare for our new digital future
3 things school IT teams should prioritise to prepare for our new digital future

Educational institutions and teachers themselves have come under pressure this year, as the pandemic has pushed them to pivot and adapt to a digital-only world. Moving forwards, schools and universities will be faced with a tricky challenge - caught between financial constraints and the need to future-proof and invest in their networks to support an influx of new technologies...

By Mandy Duncan 10 Dec 2020

Why POPI compliance is not just an IT issue
Why POPI compliance is not just an IT issue

Many organisations believe that POPI compliance will not affect them. This is a short-sighted attitude that could see them falling foul of the law...

Johan ScheepersBy Johan Scheepers 7 Dec 2020

Boris Dzhingarov
How to protect your PC from operating system rootkits stealing your sensitive information

A rootkit is malicious hidden software that comes in many variations, one of them being operating system rootkits. They can target your phone, computer or laptop without you noticing it and create remote access to your device...

Boris DzhingarovBy Boris Dzhingarov, Issued by Monetary Library 1 Dec 2020

Data management is at the heart of cloud security
Data management is at the heart of cloud security

More businesses are finally making the move to the cloud in the wake of accelerated digital transformation. While these businesses now benefit from enhanced agility and flexibility, cybercriminals have leapt into action to exploit any vulnerabilities that may exist...

Johan ScheepersBy Johan Scheepers 1 Dec 2020

Africa is a goldmine of cybersecurity opportunities
Africa is a goldmine of cybersecurity opportunities

Africa offers a wealth of chances for startups and innovators looking to address cybersecurity risk across the increasingly digitised continent...

By Anna Collard 26 Nov 2020

How not to be scammed online this Black Friday
How not to be scammed online this Black Friday

Looking to make the most of Black Friday? Well, cybercriminals are eagerly anticipating the day too. Here's what buyers and businesses can do to avoid being scammed...

By Maeson Maherry 25 Nov 2020



Show more
Let's do Biz