Home » online security

online security

SA’s Cybersecurity Professionals Feel They’re “Losing Ground” Against Cybercriminals – Study

Image sourced from Pixabay Less than 40% of South African security operations (SecOps) professionals are very confident in their ability to adapt to new online threats, with 34% only somewhat confident. While 18% are not confident in their ability to deal with continuously evolving threats, over 10% are undecided. This was part of a global research study released today by Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), revealing the cost of siloed security, weak spots in protection and lack of confidence amongst SecOps teams. “Although South Africa is slightly ahead of the curve (relative to the global average) in its preparedness to deal with attacks, the number of threats is fast increasing, along with the stakes that attackers are playi...

Want to Be a Cybersecurity Expert? Kaspersky is Now Offering an Online Course

Sourced from Hypertext Developed by Kaspersky’s own cybersecurity specialists, the course aims to help businesses enhance or even build a security operations centre (SOC) from scratch – and improve SOC and security team skills in threat hunting, incident detection and investigation. The course guides the audience through the SOC structure, threat intelligence, and relevant attacks. The on-demand format and virtual hands-on labs allow training at the student’s own pace. “Enterprises need to bridge the expertise gap and increase the effectiveness of their security operations. While the question of additional investment is always sensitive, online education may be the solution to achieve their goals. Keeping in mind this business challenge, we developed a bunch of expert training courses on t...

Is Hacking Humans Easier Than Machines?

Anna Collard, SVP Content Strategy & Evangelist at KnowBe4 Africa. When it comes to cybersecurity, technology is not enough. Yes, it is the foundation. But it is not enough to mitigate the growing threat of cybercrime. The reality is that, even with best-in-class security systems, firewalls, endpoint protections and zero-trust frameworks, without a robust and agile culture of security, the business is at risk. The Dark Reading 2021 Strategic Security Survey found that around 48% of security professionals believe that users breaking policy are likely to be the single biggest cause of a major breach in the future.  This sentiment is echoed in a ITWeb and KnowBe4 study that examined cybersecurity culture and the impact of this on the South African organisation. “Having a robust cyber...

How to Protect Yourself from Gift Card Scams This Holiday Season

Image sourced from NorthJersey.com This holiday season checking off that gift list will look a little different than in past years. Many shoppers are planning to rely on e-commerce for a significant amount of their holiday shopping. Digital gift card sales are also likely to increase. However, given the spike in digital activity predicted over the holidays, cybercriminals, too, will be making their lists and checking them twice. It’s a particularly risky time of the year as shoppers of all ages (including some with less experience recognising digital threats) flock to search engines and online channels to place orders before holiday delivery date cutoffs. And opportunistic hackers know just how to create enticing, seasonally-appropriate lures—and even some of the simplest scams c...

Exclusive Networks Acquires Cyber Specialist to Establish Sub-Sahara African Presence

Jesper Trolle, CEO Exclusive Networks. Exclusive Networks, a global trusted cybersecurity specialist for digital infrastructure, has completed its acquisition of Networks Unlimited. Networks Unlimited is a major regional value-added distributor serving 38 national markets in Africa with cybersecurity and infrastructure solutions. The acquisition establishes Exclusive Networks’ first presence in sub-Saharan Africa, expanding its global footprint and providing new opportunities for vendor and reseller partners both within the region and around the world. “This is the perfect acquisition for us in Africa – I’m pleased to welcome Networks Unlimited into the global Exclusive family and believe this brings a host of benefits and opportunities to all our partners,” said Jesper Trolle, CEO at Excl...

Altron Security Appoints New Managing Director

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent. You Deserve to Make Money Even When you are looking for Dates Online. So we reimagined what a dating should be. It begins with giving you back power. Get to meet Beautiful people, chat and make money in the process. Earn rewards by chatting, sharing photos, blogging and help give users back their fair share of Internet revenue.

Why PoPIA Compliance Remains a Challenge for Many SA Businesses

South Africa’s Protection of Personal Information Act (POPIA) officially came into effect in July and many businesses are still facing compliance challenges in how personal information is stored and processed. According to Sameer Kumandan, MD of SearchWorks, South Africa’s largest innovative data aggregation platform, businesses should have already analysed their internal policies, processes, and procedures, and aligned them to the most applicable data privacy standards in the POPI Act. “It’s also crucial that organisations understand the role their business has as either a responsible party or a processor as well as ongoing training to ensure all areas of the business are POPI compliant.” The POPI Act’s purpose ensures that the right to privacy is taken seriously and includes a data subje...

31.5 Million Cyberthreats Targeted SA Users in the First Half of 2021

Image sourced from Feed Navigator. The increase in cyberthreats recorded by global internet security firm Kaspersky in the first half of this year across South Africa amounted to 31.5 million. “Threats can be categorised as criminal (80% of attacks), targeted (19.9%), and advanced (0.01%). The advanced grouping is significantly more sophisticated and feature increased investment from attack groups. Unfortunately, both criminal and targeted threat vectors learn from the advanced category to enhance their own attack techniques,” says Amin Hasbini, Head of Research Centre, Global Research & Analysis Team, Middle East, Turkey and Africa at Kaspersky. Attacks Are Becoming More Sophisticated Hasbini says that the current trends show that attackers around the world are embracing more sophisti...

How “Squid Game” is Being Used to Spread Malware & Steal User Info

Image sourced from WhatToWatch. During the month following its release, Squid Game, a South Korean survival drama TV series, became Netflix’s biggest show, with more than 111-million viewers. Following this unprecedented demand from viewers, cybercriminals were not shy in taking advantage of fans’ eagerness to watch the show, with well-known fraud schemes hitting the web themed after the series. Experts from cybersecurity group Kaspersky share their insights on the most common and sophisticated Squid Game-related threats found in the wild, including Trojans, adware, and phishy offers of Halloween costumes. Download an Episode of Squid Game for Free. Oh, and Some Malware too. From September to October 2021, Kaspersky found several dozen different malicious files on the web, the names of whi...

How to Prevent Further CyberAttacks on Businesses & Government Departments

Image sourced from Finance Times. The recent ransomware attacks on the Department of Justice and Constitutional Development (DoJ) and the South African National Space Agency (Sansa) is a testament to the sophistication and aggressiveness of cybercrime in South Africa. In response to these attacks, organisations need to devise a preventative plan of action. “With South Africa having the third-highest number of cybercrime victims worldwide, and the biggest threat being ransomware, businesses are prone to being victims of ransomware traps unknowingly. In such cases, cyber-criminals pose as credible agencies with the intent of luring organisations to their demise,” says Maeson Maherry, CEO and co-founder of LAWtrust. What are Ransomware Attacks? Ransomware attacks are cyberattacks where a cybe...

The New DDoS ‘Normal’ is Not Normal in Any Way

Image sourced from Shutterstock. Threat actors will never turn down an opportunity for innovation, and the COVID-19 pandemic has provided an enormous such opportunity. We are seeing this quite clearly in the numbers coming through – and the new ‘normal’ around distributed denial of service (DDoS) attacks is not normal at all. So says Carole Hildebrand, Senior Strategic Marketing Writer at NETSCOUT, a leading global provider of service assurance, security and business analytics. Writing in a recent blog, she explains, “After an astonishingly active first quarter of DDoS attack activity, things calmed down a bit for the second quarter of 2021. Unfortunately, ‘calmed down’ is a relative term.” NETSCOUT decided to compare the numbers of DDoS attacks during the COVID-19 era of 2020 and 2021 thu...

Only 20% of Cybersecurity Workforce Are Women Despite Industry Skills Deficit

Image sourced from OpportunitiesNB. “Diversity is more than gender. It is race, culture, ability and country. It is mixing up the talent pool and adding in the unique insights and perspectives that different people from different walks of life bring to create teams that are more engaging and innovative,” opines Anna Collard, SVP Content Strategy & Evangelist at KnowBe4 AFRICA. “It will also go a very long way towards filling the very real and very large security skills hole that is growing wider every day.” According to Collard, diversity is a critical and strategic step that the cybersecurity industry depends on to ensure longevity and ongoing security capability. “Women only make up about 20% of the current cybersecurity workforce and yet one of the top pain points for the CISO is th...

  • 1
  • 2