Taming the ransomware beast

Taming the ransomware beast

By Denan Erasmus, channel manager Palo Alto Networks & Firemon at Westcon-Comstor Southern Africa Picture this: You receive an email from a person or organisation that you trust. In it, there is a link they ask you to click and you do it. Suddenly, a message pops...
Unsecured Pokémon download risks

Unsecured Pokémon download risks

South Africans who don’t want to wait any longer to download PokémonGo from their official app store may be searching for ways to get the game onto their devices, and many may have succeeded via third party sites. But, Securicom, a managed IT security services vendor,...
Business security issues: 10 solutions

Business security issues: 10 solutions

By Perry Hutton, Regional vice president – Fortinet Africa High-performance cybersecurity solutions company Fortinet says almost 80% of industrial security incidents in critical infrastructure organisations are caused by unintentional internal issues such as...
Writing the history of cyber threats

Writing the history of cyber threats

By Ovanes Mikhaylov, MD: emerging markets at Kaspersky Lab A few years from now someone will start writing the history of advanced, highly sophisticated cyber threats. This person will obviously start with Stuxnet, and go through the findings of campaigns like The...
PoPI: The Internet changes everything…

PoPI: The Internet changes everything…

The Protection of Personal Information (PoPI) Act has been signed into law and will soon be implemented.  For organisations yet to become PoPI compliant soon, it is going to have huge implications not only for policies, but how they enable these processes and ensure...