Here's how hackers break into the business environment and how it can be avoided
Here's how hackers break into the business environment and how it can be avoided

Organisations have to invest in comprehensive in-depth phishing plans, leveraging policies, technical tools and awareness training best practices to ensure that they're not vulnerable to attack. And this attack is absolutely guaranteed.

Anna CollardBy Anna Collard 3 days ago

Many faces of malware: Are you protected?
Many faces of malware: Are you protected?

Malware remains the biggest threat to corporate networks, more costly than any other threat including ransomware and trojans...

John Mc LoughlinBy John Mc Loughlin 2 Mar 2021

Understanding cybercrime's true impact is crucial to security in 2021
Understanding cybercrime's true impact is crucial to security in 2021

Vulnerabilities were exploited to the maximum and there were a number of highly publicised attacks across the globe. However, while this has led to greater awareness of the risks and an increase in caution, businesses cannot afford to let down their guard in 2021...

Simeon TassevBy Simeon Tassev 3 Feb 2021

Top IT security threats in 2021
Top IT security threats in 2021

Looking to the year ahead, we expect the most common form of attack - phishing emails - to increase in both volume and sophistication...

Anna CollardBy Anna Collard 20 Jan 2021

#BizTrends2021: Evolution of workforce skills demand - what the future holds
#BizTrends2021: Evolution of workforce skills demand - what the future holds

When reflecting on the fourth industrial revolution, a number of things immediately spring to mind - for example, IoT, AI, and robots. Regrettably, little attention is given to individual employees and workers in this emerging industrial world, unless one is discussing the concerns related to potential job losses...

Lyndy van den BarselaarBy Lyndy van den Barselaar 14 Jan 2021

#BizTrends2021: What the new year holds for cybersecurity
#BizTrends2021: What the new year holds for cybersecurity

The year 2020 has been one of the most challenging years in recent memory, both in terms of the effects of the coronavirus pandemic on societies and economies around the world, and the impact of a dramatic rise in cybercrime...

Brian PinnockBy Brian Pinnock 6 Jan 2021

Cybercrime risks are ruining the gains made over the last year
Cybercrime risks are ruining the gains made over the last year

While online merchants are revelling in the excellent growth of new customers, fraudsters are also migrating online and, if left unchecked, these bad actors could destroy the windfall of this new customer acquisition...

Brendon WilliamsonBy Brendon Williamson 11 Dec 2020

Why POPI compliance is not just an IT issue
Why POPI compliance is not just an IT issue

Many organisations believe that POPI compliance will not affect them. This is a short-sighted attitude that could see them falling foul of the law...

Johan ScheepersBy Johan Scheepers 7 Dec 2020

Boris Dzhingarov
How to protect your PC from operating system rootkits stealing your sensitive information

A rootkit is malicious hidden software that comes in many variations, one of them being operating system rootkits. They can target your phone, computer or laptop without you noticing it and create remote access to your device...

Boris DzhingarovBy Boris Dzhingarov, Issued by Monetary Library 1 Dec 2020

Data management is at the heart of cloud security
Data management is at the heart of cloud security

More businesses are finally making the move to the cloud in the wake of accelerated digital transformation. While these businesses now benefit from enhanced agility and flexibility, cybercriminals have leapt into action to exploit any vulnerabilities that may exist...

Johan ScheepersBy Johan Scheepers 1 Dec 2020

Data breaches becoming more common
Data breaches becoming more common

Another day, another data breach. South African businesses are becoming more susceptible to cyberattacks and seem to be easy targets for criminals...

John Mc LoughlinBy John Mc Loughlin 16 Oct 2020

Q&A: Mic Mann talks SingularityU SA Online Summit 2020
Q&A: Mic Mann talks SingularityU SA Online Summit 2020

Mic Mann, co-CEO of SingularityU South Africa, shares more about what can be expected from this year's SingularityU South Africa Summit, which takes place online from 14-15 October 2020...

Evan-Lee CourieBy Evan-Lee Courie 6 Oct 2020

#HumanTraffickingAwareness: Do you know your childs' exact location?
#HumanTraffickingAwareness: Do you know your childs' exact location?

The amount of women and children who go missing in South Africa is cause for national concern...

Evan-Lee CourieBy Evan-Lee Courie 15 Sep 2020

Local eateries going digital now at risk of cybercrime
Local eateries going digital now at risk of cybercrime

With many restaurants having implemented online ordering and new digital payment systems in a bid to survive the lockdown, they also face new cyber risks...

Doros HadjizenonosBy Doros Hadjizenonos 24 Aug 2020

Boris Dzhingarov
Shedding light on your company's dark data

We all know there are mountains after mountains of data out there - generating it is what our beloved Internet does, along with our smartphones and other connected devices...

Boris DzhingarovBy Boris Dzhingarov, Issued by Monetary Library 18 Aug 2020

#WomensMonth: Carey van Vlaanderen, CEO at ESET South Africa, provides safety tips this tax season
#WomensMonth: Carey van Vlaanderen, CEO at ESET South Africa, provides safety tips this tax season

"The best way to protect yourself and avoid possible cyber scammers is to always be vigilant and never give out your private or personal information", says Carey van Vlaanderen, CEO at ESET South Africa...

Evan-Lee CourieBy Evan-Lee Courie 18 Aug 2020

Photo by  from .
Disinformation defences

Forensic cybersecurity is a business imperative for content producers says Howard Plaatjes, CEO of AYO Technology Solutions...

Howard PlaatjesBy Howard Plaatjes 14 Jul 2020

Image source: Pixabay via .
The show must go on: How to protect media content

The threat landscape in the media industry is growing exponentially, similar to other industries, which is why a zero-threat approach to security is essential. Paul Beattie, sales director of media and technology at BT, shares his insights...

Paul BeattieBy Paul Beattie 18 Jun 2020

How to have strong cyber hygiene
How to have strong cyber hygiene

Cyber threats do not rest and they continue to evolve and bad actors develop new attack techniques. Good cybersecurity hygiene requires more than a strong password to avoid compromise.

Doros HadjizenonosBy Doros Hadjizenonos 26 May 2020

How to approach data breaches
How to approach data breaches

As data breaches continue to make their way into the public news cycle, individuals and organisations alike are looking for ways to protect their financial and personal information...

Doros HadjizenonosBy Doros Hadjizenonos 11 May 2020

How secure is your company data during a lockdown?
How secure is your company data during a lockdown?

Many businesses have developed business continuity plans (BCP) to mitigate risks and reduce the impact of the coronavirus crisis...

Paula SartiniBy Paula Sartini 4 May 2020

How to secure your remote workforce
How to secure your remote workforce

For many organisations, the need to suddenly enable a remote workforce at scale has overtaken long-term plans they may have had to gradually extend remote work capacity...

Doros HadjizenonosBy Doros Hadjizenonos 20 Mar 2020

I've been hacked! What do I do?
I've been hacked! What do I do?

With all the hype around cyber attacks and every single cybersecurity enterprise talking about cyber resilience to improve a business' security posture, nobody really knows what to do once they've been hacked...

John Mc LoughlinBy John Mc Loughlin 21 Feb 2020

Reconnecting with humanity in a tech-filled world
Reconnecting with humanity in a tech-filled world

Media keeps showing us pessimistic views of the future where it becomes all too easy to buy into the idea that tech is out to rob us of our humanity...

Evan-Lee CourieBy Evan-Lee Courie 17 Feb 2020

How many abandoned online accounts do you have?
How many abandoned online accounts do you have?

For some reason, our online accounts always seem to miss the proverbial 'spring' or 'New Year, new me' cleans ups...

Riaan BadenhorstBy Riaan Badenhorst 14 Feb 2020

Employees must be educated about mobile cyber threats
Employees must be educated about mobile cyber threats

Nearly 9 in 10 companies not only allow but actually rely on their employees to access critical business apps using their personal devices...

Doros HadjizenonosBy Doros Hadjizenonos 13 Feb 2020

#SaferInternetDay: Industry-specific approaches to cyber risks
#SaferInternetDay: Industry-specific approaches to cyber risks

Companies of all natures, shapes, and sizes are at risk of cyber threats and crime. No organisation is immune to cyber-attacks...

Evan-Lee CourieBy Evan-Lee Courie 10 Feb 2020

#BizTrends2020: Imagine the impossible
#BizTrends2020: Imagine the impossible

In order to stay in business, one needs to stay abreast with technology and remain up to date with the latest innovations...

Odette van der HaarBy Odette van der Haar 24 Jan 2020

Artificial intelligence: Do we know what we're doing?
Artificial intelligence: Do we know what we're doing?

Artificial intelligence is our shiny new toy. We're dazzled by its potential to help us make our lives more efficient, more productive... just... better...

Catherine BlackBy Catherine Black 20 Jan 2020

#BizTrends2020: Cybersecurity trends predictions
#BizTrends2020: Cybersecurity trends predictions

The realities of the negative impact of modern cyber threats arguably hit home for South Africans in 2019 - more than any other year...

Brian PinnockBy Brian Pinnock 16 Jan 2020

Next >
Let's do Biz