Penetration-Testing

System Penetration Testing: Why It’s Important and How it Can Keep You Secure

As cyberattacks around the globe have increased and cybercriminals add new and innovative methods to breach networks, businesses are now incorporating penetration testing as a way to catch the loopholes before the criminals do. Circumventing these criminals is an ongoing process, as each time you plug one hole, they develop the next generation of Trojans […]

healthcare-cyberattack-davinciforensics

South African Healthcare Industry Vulnerable for Cyberattacks

Cyber criminals are always on the lookout for the easiest way to breach a system. In the past, this often involved sophisticated coding to break into a network and steal critical data. However, the criminals have changed their method of attack as well as their focus. Over the last year or so, they have turned […]

small business - cybersecurity - davinci

Ways to Improve Your Small Business Security

This is the fourth segment of a four part series devoted to helping small businesses understand cybersecurity and some of the steps that they can take to protect themselves. Small businesses are more susceptible to cybercrime simply due to the nature of the beast. Owners are embedded in the operations and success of the business […]

smallbusinesses-cybersecurity

Statistics On Small Business Cybersecurity: You Are At Risk

This is the third segment of a four part series devoted to helping small businesses understand cybersecurity and some of the steps that they can take to protect themselves. Small businesses are more susceptible to cybercrime simply due to the nature of the beast. Owners are embedded in the operations and success of the business […]

small business

Top 10 Tips To Keep Your Small Business Secure

This is the second segment of a four part series devoted to helping small businesses understand cybersecurity and some of the steps that they can take to protect themselves. Small businesses are more susceptible to cybercrime simply due to the nature of the beast. Owners are embedded in the operations and success of the business […]

businesses - davinci

Cybersecurity for Small Businesses: Are You Prepared?

This is the first segment of a four part series devoted to helping small businesses understand cybersecurity and some of the steps that they can take to protect themselves. Small businesses are more susceptible to cybercrime simply due to the nature of the beast. Owners are embedded in the operations and success of the business […]

Digital Forensics

Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime.The term digital forensics was originally used as a synonym for computer forensics but has expanded to cover investigation of all devices capable of storing […]

Computer Forensics

Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. Dedicated towards the branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to […]

Mobile Forensics

Mobile device forensics is a branch of digital forensics relating to recovery of digital evidence or data from a mobile device under forensically sound conditions. The phrase mobile device usually refers to mobile phones; however, it can also relate to any digital device that has both internal memory and communication ability, including PDA devices, GPS […]

Will PoPI Lead to More Extortion?

Will PoPI Lead to More Extortion? In November, 2013, the President enacted PoPI and since that time there have been continual questions as to when all of the process will in effect. While some of the portions of the Act came into effect in 2014, there has been a number of substantial revisions that require […]