Cybercrime: Your money may not be refunded

With the variety and sophistication of online financial threats against consumers growing, losses from online fraud, identity theft and hacking are now running at billions a year - and it's not easy to get your money back.

Read More

2017's top trends in identity technology

HID Global predicts the 2017 trends will ultimately transform the way trusted identities are used with smart cards, mobile devices, wearables, embedded chips and other “smart” objects.

Read More

IoT and the top cyber-security risks for 2017

The rapidly increasing amount of data that is stored in the cloud is becoming real security threat and it is important to ensure that information is locked down, says Eset's Keagan Ackerman.

Read More

Cyber security not negotiable in IoT age

While it’s understood that many threats originate from an external source, the possibility that they are internal is far higher which makes it critical to implement an effective monitoring solution - are you covered?

Read More

What new donations tax could mean to firms

On 19 October 2016, the South African Revenue Services (SARS) issued a binding private ruling (BPR 253) which deals with donations tax consequences in certain transactions. See how this may affect your firm.

Read More

Why protect cars, homes but not our identities?

Imagine waking up to discover someone has racked up a huge amount of debt, and potentially a criminal record, in your name. Now imagine this person got all the info they needed to steal your identity by browsing your Facebook profile...

Read More

Real cost of IT security talent shortages

Large companies struggling to attract sufficiently skilled IT security experts end up paying up to three times more to recover from a cybersecurity incident, according to research by Kaspersky Lab.

Read More

Basics of Cybercrimes, Cybersecurity Bill

The Cybercrimes Bill affects everyone using a computer or the Internet, or anyone who owns an information infrastructure that could be declared critical. Here's what South Africans should know . . .

Read More

Taming the ransomware beast

Ransomware is one of few cybercriminal business models where the same type of attack could affect 'a Fortune 500 company, a local restaurant down the street, and your grandmother'.

Read More

Document security for mobile users

To really protect the personal data inside a document, it should encrypted AND password protected with a medium to strong password, says Stergios Saltas, MD of Striata SA.

Read More
Share This