IT Security

Your business may be battling to compete because of this common misperception

Business Email Compromise: Driving the cyber-crime pandemic

Business Email Compromise (BEC) attacks are a sophisticated type of scam, targeting both businesses and individuals, which aim to transfer funds from victims’ bank accounts to criminals. The FBI’s 2019 Internet Crime Report states that the total annual losses generated by BEC in the US alone reached $1.7 billion. BEC scams also accounted for half of all cybercrime losses in the US in 2019, making ... »

corona virus

Cybercriminals taking advantage of COVID-19 (Coronavirus) fears

Sophos security expert, Chester Wisniewski, has provided his perspective on the significance of this type of attack in the commentary below. The particular example below, impersonating a charity around COVID-19, is a novel method not yet seen, as stated by Wisniewski. Wisniewski states that: “As people’s fear and desire to do something about COVID-19 is dominating the news, it is also ... »

Cell C

Cell C to educate kids about cyber bullying

Cell C has officially launched its Cyber Safety Pilot 2 programme in partnership with Active Education Foundation. The launch took place in front of both learners and the media at Amberfields College in Rooihuskraal North, Centurion.  The programme aims to educate learners about responsible and safe mobile usage, cyber safety and cyberbullying.  It also encourages responsible use of soci... »

Record level of vulnerabilities sparks cybersecurity innovation among global enterprises

Record level of vulnerabilities sparks cybersecurity innovation among global enterprises

Dimension Data, the USD 8 billion global technology integrator and managed services provider for hybrid IT, has revealed exclusive findings from its Executive Guide to NTT Security’s 2019 Global Threat Intelligence Report concerning the cybersecurity maturity of organisations across a number of markets and sectors. Globally, the average cybersecurity maturity rating stands at a worrying 1.45 out o... »

Cyberattack

SA industrial facilities at risk of cyber attacks

With international analysts warning of a growing risk of cyber war, sabotage and espionage impacting industrial and mining facilities, South African stakeholders must step up their efforts to mitigate risk. This is according to GECI, an international tactical cyber security specialist now launching its portfolio of cyber security solutions in South Africa. After Europe, GECI has chosen to expand i... »

ransomware

Kaspersky Lab uncovers critical vulnerability in Windows OS

Kaspersky Lab’s automated technologies have detected a previously unknown vulnerability in Microsoft Windows. It was exploited by an unidentified criminal group in an attempt to gain full control over a targeted device. The attack was aimed at the core of the system – its kernel – through a backdoor constructed from an essential element of Windows OS. Backdoors are an extremely dangerous type of m... »

Cyberattack

This is why Cybersecurity is vital to business strategies in 2019

Relentless cyber criminals are becoming smarter and more resourceful by the day. 2018 taught us many lessons and one of them is that companies cannot afford to develop business strategies without cybersecurity being at the heart of it. Many companies that became victims of cyber-attacks witnessed first-hand how difficult, time-consuming and expensive it is to recover from, if at all. Cybersecurity... »

financial crime trends

Discussing the top financial crime trends for 2019

The same concept holds true for cybercrime and the Financial Services industry. At the end of the day, regardless of who the ultimate victim of a cyberattack is, the end goal of most cyber events continues to be financial gain. Cybercriminals increasingly target online banking and mobile apps According to Fortinet’s Threat Landscape Report, over one-quarter of organisations experienced a mobile ma... »

Cyber Security

The criminals have a roadmap in place, do you?

Organisations that do not have a clear longer-term security roadmap in place are putting themselves at risk of being compromised. It is the companies that are already investing in tomorrow’s tools to solve today’s problems that will survive the ongoing onslaught to circumvent security solutions. This is the view of Jon Tullett, research manager – IT Services for Sub-Saharan Africa at International... »

it security

Trusted MSPs should be utilised to assist in protecting businesses

The Kaspersky Lab IT Security Risks Survey 2017 highlighted that 42% of small and medium businesses (SMBs) and 51% of enterprises indicated that they worked with Managed Service Providers (MSPs) in 2017. This suggests that businesses are starting to realise that MSPs can be a helping hand towards enhancing their IT security. A trusted MSP is vital in remotely managing the IT infrastructure of an o... »

Page 1 of 7123»