breach - south-africa

Worst SA Breach Ever: Info and What You Can Do; Part 2

This is Part 2 of a 2-part series to offer information and potential actions on the serious data breach that is now affecting almost everyone in South Africa. As the fallout continues to cascade on the worst information and data security breach that has ever happened in South Africa, people are left stunned, angry and […]

data breach south africa

Worst SA Breach Ever: Info and What You Can Do; Part 1

This is Part 1 of a 2-part series to offer information and potential actions on the serious data breach that is now affecting almost everyone in South Africa. As the fallout continues to cascade on the worst information and data security breach that has ever happened in South Africa, people are left stunned, angry and […]

The Battle Against TV Piracy in South Africa

The Battle Against TV Piracy in South Africa

Everyone pays a price for media piracy and it has become one of the major problems in South Africa. Downloading and illegal access to movies and television has been consistently increasing over the last number of years. While television is the highest in consumer spending, the net comes in second. A report done by Price […]

jacque-tracey-hibert

Trapping and Convicting a South African Pirate TV Box Seller

Television piracy has increased over the last number of years to the point where many consumers are so accustomed to it that they are unaware of the fact that it is not only theft, but one that is being cracked down on with severe consequences. The cost of entertainment and media piracy is in the […]

Penetration-Testing

System Penetration Testing: Why It’s Important and How it Can Keep You Secure

As cyberattacks around the globe have increased and cybercriminals add new and innovative methods to breach networks, businesses are now incorporating penetration testing as a way to catch the loopholes before the criminals do. Circumventing these criminals is an ongoing process, as each time you plug one hole, they develop the next generation of Trojans […]

healthcare-cyberattack-davinciforensics

South African Healthcare Industry Vulnerable for Cyberattacks

Cyber criminals are always on the lookout for the easiest way to breach a system. In the past, this often involved sophisticated coding to break into a network and steal critical data. However, the criminals have changed their method of attack as well as their focus. Over the last year or so, they have turned […]

computer-forensics

The Art and Science of Cyber Security Forensics

Most people relate the term ‘forensics to the television shows that involve investigative authority organizations. Yet in today’s technology driven world we now have additional levels of forensics in the realms of the cyber universe. Unlike physical detection methods such as fingerprints or DNA, cyber security forensics involve delving into the depths of the data […]

Forensic-davinci forensics

Cyber Forensic: Entering the Dark Side of Information Technology

When you watch some of the crime fighting programs on television, you get the impressions that their lives are filled with continually exciting moments. This is a requirement for ‘entertainment’ that does not exist in the world of standard forensics and it gets even worse when you deal with cyber forensics. Delving through piles of […]

small business - cybersecurity - davinci

Ways to Improve Your Small Business Security

This is the fourth segment of a four part series devoted to helping small businesses understand cybersecurity and some of the steps that they can take to protect themselves. Small businesses are more susceptible to cybercrime simply due to the nature of the beast. Owners are embedded in the operations and success of the business […]

smallbusinesses-cybersecurity

Statistics On Small Business Cybersecurity: You Are At Risk

This is the third segment of a four part series devoted to helping small businesses understand cybersecurity and some of the steps that they can take to protect themselves. Small businesses are more susceptible to cybercrime simply due to the nature of the beast. Owners are embedded in the operations and success of the business […]