5 Major Short List Topics to Help Deter Your Security Risk

5 Major Short List Topics to Help Deter Your Security Risk

Chief Information Security Officers have made some radical changes over the last year or so, including the understanding that security breaches involve a number of variables. From internal and external sources to the very technology that we use to do business, CISO’s are taking action to address these and other issues to deflect the risk […]

healthcare-cyberattack-davinciforensics

South African Healthcare Industry Vulnerable for Cyberattacks

Cyber criminals are always on the lookout for the easiest way to breach a system. In the past, this often involved sophisticated coding to break into a network and steal critical data. However, the criminals have changed their method of attack as well as their focus. Over the last year or so, they have turned […]

breach - south-africa

Worst SA Breach Ever: Info and What You Can Do; Part 2

This is Part 2 of a 2-part series to offer information and potential actions on the serious data breach that is now affecting almost everyone in South Africa. As the fallout continues to cascade on the worst information and data security breach that has ever happened in South Africa, people are left stunned, angry and […]

data breach south africa

Worst SA Breach Ever: Info and What You Can Do; Part 1

This is Part 1 of a 2-part series to offer information and potential actions on the serious data breach that is now affecting almost everyone in South Africa. As the fallout continues to cascade on the worst information and data security breach that has ever happened in South Africa, people are left stunned, angry and […]

The Cost of a Data Breach

One in four law firms with at least 100 attorneys have experienced a breach due to a hacker, website attack, break in, or lost or stolen devices. It is in attorneys’ best interest to take the appropriate steps to prevent cyber security breaches.