Phishing: Users still being reeled in

MWR reviewed 100 recent phishd simulated attack campaigns, targeting almost a million individual users, which reveal that social media is the most effective lure to entice users to click a link in an email. Read on for results and safety tips . . .

Read More

What makes an 'ideal' data centre?

We live in a world where security has become one of our biggest concerns and for many organisations data security is a critical issue, and companies are looking to guarantee the physical security of their servers and 24-7 uptime.

Read More

Digital transformation doesn't happen haphazardly

Companies need to become the masters of how they will deploy, manage and continually evolve their digital services to achieve true transformation, says Charl Ueckermann, CEO at AVeS Cyber Security.

Read More

Cybercrime: Your money may not be refunded

With the variety and sophistication of online financial threats against consumers growing, losses from online fraud, identity theft and hacking are now running at billions a year - and it's not easy to get your money back.

Read More

2017's top trends in identity technology

HID Global predicts the 2017 trends will ultimately transform the way trusted identities are used with smart cards, mobile devices, wearables, embedded chips and other “smart” objects.

Read More

IoT and the top cyber-security risks for 2017

The rapidly increasing amount of data that is stored in the cloud is becoming real security threat and it is important to ensure that information is locked down, says Eset's Keagan Ackerman.

Read More

Cyber security not negotiable in IoT age

While it’s understood that many threats originate from an external source, the possibility that they are internal is far higher which makes it critical to implement an effective monitoring solution - are you covered?

Read More

What new donations tax could mean to firms

On 19 October 2016, the South African Revenue Services (SARS) issued a binding private ruling (BPR 253) which deals with donations tax consequences in certain transactions. See how this may affect your firm.

Read More

Why protect cars, homes but not our identities?

Imagine waking up to discover someone has racked up a huge amount of debt, and potentially a criminal record, in your name. Now imagine this person got all the info they needed to steal your identity by browsing your Facebook profile...

Read More

Real cost of IT security talent shortages

Large companies struggling to attract sufficiently skilled IT security experts end up paying up to three times more to recover from a cybersecurity incident, according to research by Kaspersky Lab.

Read More
Share This