The ease of hacking smart homes and offices and How You Can Protect Yourself

The ease of hacking smart homes and offices and How You Can Protect Yourself

Smart homes and offices were once thought to be the wave of the future, but are clearly here now. When it comes to new technologies, we seem to never be able to get enough and new devices are being added every day for efficiency and convenience. As many are jumping on the bandwagon to transition their homes and offices into the “internet of everything”, we need to step back and
The Buzz About Fileless Malware

The Buzz About Fileless Malware

When it comes to being devious, cybercriminals are relentless and in their world this means seeking out new ways of thievery. Those that specialise in malware have been using standard methods for the last number of years. As security software and firewalls begin catching them, they are now developing a newer way to access your data and this involves what is being called “fileless malware.” Cybercrime relies on the fact
Malvertising - davinciforensics

Malvertising: Accessing Your Data through Legitimate Advertising

Both consumers and businesses have long made the assumption that malware is delivered in a variety of ways, but most are through accessing low-level websites or opening email. As with any form of cyber hacking, the criminals have developed even more sophisticated methods and the most recent has been sending malware through legitimate advertising areas.  This process has opened the portal to unknowing consumers that are downloading everything from ransomware
siem-soc-davinciforensics

The Benefits of Using a Third Party SIEM SOC Centre

Businesses in South Africa are learning the hard way that they cannot control cybercrime on their own. The sheer volume of security breaches in companies has escalated to such an extent that the cost is devastating to many organisations. The use of a third party SIEM SOC Centre is the one area that owners and managers can turn to for the type of cyber protection that is required. These are
5 Major Short List Topics to Help Deter Your Security Risk

5 Major Short List Topics to Help Deter Your Security Risk

Chief Information Security Officers have made some radical changes over the last year or so, including the understanding that security breaches involve a number of variables. From internal and external sources to the very technology that we use to do business, CISO’s are taking action to address these and other issues to deflect the risk of security problems.  The entire topic may seem overwhelming to some, but every company is