<center><ins data-revive-zoneid="65" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

IoT and the top cyber-security risks for 2017

The rapidly increasing amount of data that is stored in the cloud is becoming real security threat and it is important to ensure that information is locked down, says Eset's Keagan Ackerman.

Cyber security not negotiable in IoT age

While it’s understood that many threats originate from an external source, the possibility that they are internal is far higher which makes it critical to implement an effective monitoring solution - are you covered?

What new donations tax could mean to firms

On 19 October 2016, the South African Revenue Services (SARS) issued a binding private ruling (BPR 253) which deals with donations tax consequences in certain transactions. See how this may affect your firm.

Why protect cars, homes but not our identities?

Imagine waking up to discover someone has racked up a huge amount of debt, and potentially a criminal record, in your name. Now imagine this person got all the info they needed to steal your identity by browsing your Facebook profile...

Real cost of IT security talent shortages

Large companies struggling to attract sufficiently skilled IT security experts end up paying up to three times more to recover from a cybersecurity incident, according to research by Kaspersky Lab.

Basics of Cybercrimes, Cybersecurity Bill

The Cybercrimes Bill affects everyone using a computer or the Internet, or anyone who owns an information infrastructure that could be declared critical. Here's what South Africans should know . . .

Taming the ransomware beast

Ransomware is one of few cybercriminal business models where the same type of attack could affect 'a Fortune 500 company, a local restaurant down the street, and your grandmother'.

Unsecured Pokémon download risks

Since the release of PokémonGO, traffic on APK Mirror, a site where Android Application Package can be downloaded, has increased by 597%, from just over 600 000 visits on 5 July to over 4-million visits on 6 July.

Business security issues: 10 solutions

Critical infrastructure industries - utilities, transportation and natural resource producers - and the communities and economies they serve, face particularly damaging outcomes from cyber security attacks.

Writing the history of cyber threats

A few years from now someone will start writing the history of advanced, highly sophisticated cyber threats . . . Ovanes Mikhaylov of Kaspersky Lab explains the process.

PoPI: The Internet changes everything…

A new twist with PoPI is that penalties can be applied, consisting of fines – which have no limitation – and prison time. Importantly, these penalties could be both criminal and civil.

<center><ins data-revive-zoneid="61" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>
<center><ins data-revive-zoneid="62" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>
<center><ins data-revive-zoneid="63" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>
Share This