Home » data protection

data protection

3 Ways to Optimise Cloud Security Beyond What is in Place

Modernising business infrastructure by migrating to the cloud has become one of the most significant organisational priorities today. Unfortunately, as companies across industry sectors make the shift from on-premises to this dynamic new environment, so too has there been a tremendous increase in cyber threats and attacks. Contrary to the widely held belief, cloud computing is not the panacea for security many make it out to be. The most effective cyber attackers target the weakest points in any company’s digital defences. In fact, there has been a 50% surge in more sophisticated cyberattacks over the past year. This can at least partly be attributed to the rate at which new cloud deployments are taking place which makes it difficult for business and technology leaders to keep up and ensur...

The Cybersecurity Wave: Importance and Impact of Cybersecurity in Today’s Digital World

Cyberattacks continue to be a threat to organizations across the world, but using powerful cybersecurity solutions can help you defend your organization against these malicious attacks. Without proper security management, your organization is an easy target for cybercriminals. Poor configuration of cloud services combined with how easy it is for cybercriminals to launch an attack poses a great threat to organizations. On top of this, cybercriminals often target entities outside of their jurisdiction, making it difficult for governing bodies to draft effective cybersecurity policies. Unlike years ago, simply installing an antivirus solution across your systems isn’t enough to protect your network of devices. Cyberattacks can arise from any level of the organization. From IT admins...

Ransomware Attacks: 4 Steps to Protect Your Data

Ransomware attacks are on the rise, and the pay-out for a successful breach is growing as data becomes more and more valuable. The potential of falling victim to ransomware is escalating, and such an occurrence could end up costing billions in downtime and recovery. As we become more firmly entrenched in the cloud, it is imperative to evaluate not only the measures that have been put into place to prevent an attack but also the tools and protocols that have been implemented to help a business recover. Given the current economic climate and threat landscape, a successful ransomware attack is a strong possibility – is your backup strategy in a position to help or hinder the recovery? A proactive strategy for data One thing that has become clear is that businesses need a strategy, and a less ...

Ransomware Attacks: 4 Steps to Protect Your Data

Ransomware attacks are on the rise, and the pay-out for a successful breach is growing as data becomes more and more valuable. The potential of falling victim to ransomware is escalating, and such an occurrence could end up costing billions in downtime and recovery. As we become more firmly entrenched in the cloud, it is imperative to evaluate not only the measures that have been put into place to prevent an attack but also the tools and protocols that have been implemented to help a business recover. Given the current economic climate and threat landscape, a successful ransomware attack is a strong possibility – is your backup strategy in a position to help or hinder the recovery? A proactive strategy for data One thing that has become clear is that businesses need a strategy, and a less ...

Ransomware: The Threat that Lies in Wait

There can be no doubt that ransomware attacks are on the rise across the globe. A simple online search will reveal thousands of statistics in this regard, and South Africa is no exception. What is also clear from numerous examples of successful breaches, is the potentially devastating effect of a ransomware attack, which can cripple a business and shut down essential services for extended periods, not to mention cost a fortune to recover from. They are, in fact, legitimate business disasters, and need to be considered as such when it comes to disaster recovery and business continuity planning. Under Siege There is no shortage of high-profile examples of ransomware attacks in South Africa over the past two years, from Johannesburg City Power to the Life Healthcare hospital group, Transnet P...

A Brief View of Data Protection Laws in Africa

Image sourced from Pixabay In Africa, various jurisdictions have data protection laws to secure the transfer of personal data between entities. These laws largely affect multinational companies that do international trade. Organizations with a global footprint require personal data transfer across countries, and these data protection laws must be complied with to transfer data across borders legally. Organizations around the world are increasingly investing in the African market. To lawfully carry out business operations in Africa, it is imperative for organizations to understand the data protection landscape in Africa. Data protection laws are proposed by governments not to hinder personal data transfer by organizations but to regularize how organizations handle personal data. These laws ...

Effective Data Backup Becomes Essential as Kenya is Rocked by Ransomware

In the wake of the COVID-19 pandemic, cybercrime, in particular, ransomware, has seen a massive increase across the globe. As a burgeoning economy in Africa, Kenya has become a growing target, with a new report from internet security group Kaspersky recording 32.8 million attacks in the first half of 2021. According to INTERPOL, increasing digital demand in the country, coupled with “a lack of cybersecurity policies and standards, exposes online services to major risks”. As digital transformation continues to gain traction in Kenya, data becomes increasingly important for business, and it needs to be effectively protected. Effective data backup and recovery are key to overcoming the potential threat of a ransomware attack. Connected, but vulnerable In Kenya, as in much of the world, the pa...

6 PoPIA Tips to Ensure Security and Compliance

The full implementation of the Protection of Personal Information Act (PoPIA) heralds a new era of control and privacy for South African citizens and organisations, and holds the promise of deepening trust between organisations and their customers – provided organisations remain fully compliant. According to Cameron Beveridge, Regional Director Southern Africa at SAP, trust is the key to success in the digital economy. “Privacy and trust are essential elements in building strong connections with customers and ensuring a positive customer experience (CX) in today’s business environment. In fact, some studies have found that up to 90% of customers believe how their data is treated is indicative of the way they will be treated as a customer, and 91% won’t purchase from a company if they don’t...

Why Balancing Customer Experience with PoPIA Compliance is Critical

Image sourced from Innoverse 365. Meeting growing customer demand for relevant, personalised experiences while managing the regulatory demands of protecting data is emerging as one of the most significant challenges facing South African businesses today. Aspects such as managing customer consent and conforming to data privacy legislation create complexities for cloud-based data and analytics solution providers, the brands that use them, and the customers themselves. Given how the management of personal information (PI) is driven by the likes of the General Data Protection Regulation (GDPR) in Europe and the Protection of Personal Information Act (PoPIA) in South Africa, companies and providers need to navigate a minefield of compliance requirements to avoid significant financial fines and ...

How Will PoPIA Impact Cloud Providers?

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent. You Deserve to Make Money Even When you are looking for Dates Online. So we reimagined what a dating should be. It begins with giving you back power. Get to meet Beautiful people, chat and make money in the process. Earn rewards by chatting, sharing photos, blogging and help give users back their fair share of Internet revenue.

How Will PoPIA Impact Cloud Providers?

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent. You Deserve to Make Money Even When you are looking for Dates Online. So we reimagined what a dating should be. It begins with giving you back power. Get to meet Beautiful people, chat and make money in the process. Earn rewards by chatting, sharing photos, blogging and help give users back their fair share of Internet revenue.

  • 1
  • 2