What to do as Ransomware Continues to Attack South Africa
It was only a few years ago that the term “ransomware” was only known to those in the cybersecurity world […]
Read moreIt was only a few years ago that the term “ransomware” was only known to those in the cybersecurity world […]
Read moreThe fact that almost any network or computer session is vulnerable to session hijacking should give pause to everyone. While […]
Read moreAlmost all systems are vulnerable to session hijacking and they can be a serious threat to web applications and networks. […]
Read moreCybersecurity is one of the top considerations and should be considered part of the cost of doing business. Small companies […]
Read moreGoogle and their email service, Gmail, have become the gold standard services for both individual and some company accounts. As […]
Read moreCookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |