
SA Cyber Security Specialists Look to New Strategies to Protect Companies – and it’s Paying Off
Cybercriminals have targeted South Africa with attacks and breaches for decades. Knowing
Ransomware is a type of cryptovirology malware that threatens to publish or permanently block access to the victim’s personal data unless a ransom is paid. While some ransomware may simply lock the system without affecting any files, more advanced malware employs a technique known as cryptoviral extortion.

Cybercriminals have targeted South Africa with attacks and breaches for decades. Knowing

Today’s Cyber Security Requires a Change in the Way we do Things

Defending a company today requires due diligence and attention to cyber security.

The IAFCI, a non-profit international organisation, will provide services and an environment

The IACA is a non-profit, 501(c)(3) professional association comprised of criminal justice

Partnering with a cyber security company is considered part of doing business

Log4j is an example of a company trying to do something as

The People You Thought You Could Trust When you think of insider

Training staff is a priority aspect in deterring fraud attempts. Knowledgeable employees

The term “insider threat” sounds very ominous, but any time you trust

Attack Path Mapping (APM) uses a combination approach to reveal the most

Social media platforms such as Facebook and Instagram have been combating fake

One needs only hear the daily news to see the record number

When we examine how business is conducted, we recognise that a majority

If your organisation has already been infected with malware, these steps may

South Africa continues to rank third in the sheer volume of cybercrime,

The most recent cyberattack on Transnet, the state-owned port and rail operator,

5 Tips to Protect From Phishing that Can Help to Save Your

The digital age has brought into play a number of changes that

WASHINGTON, June 23 (Reuters) – On Wednesday, FBI Director Chris Wray urged

What is the purpose of the Act? • The purpose of the

Act No. 19 of 2020: Cybercrimes Act, 2020 The Cybercrimes Act 19

POPIA is empowered with the ability to investigate and fine responsible parties

A huge Chinese espionage effort against US and European government agencies, according

Cyber criminals using ransomware have been around for a long time however

As if a global pandemic hasn’t been enough, it appears that cybercrime

Experian reported that no consumer financial or credit data was included in

The priority of every cybersecurity organisation is to explain that a majority

Facebook has had a litany of problems almost since its inception. Creating

The problem with extremist apps, websites, and social media is that those
| Cookie | Duration | Description |
|---|---|---|
| cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
| cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
| cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
| cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
| cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
| viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |