The Solar Winds Hack Shows the Danger to All Countries

The Solar Winds Hack Shows the Danger to All Countries

The hacking that occurred in many of the U.S. agencies and departments has caused a massive tsunami around the globe.  The breach may have made the news in its announcement of the plight in the U.S., but it has also caused major problems with organizations, companies (including Microsoft), and even other governments of the world. […]

The Solar Winds Hack Shows the Danger to All Countries

The Solar Winds Hack Shows the Danger to All Countries

The hacking that occurred in many of the U.S. agencies and departments has caused a massive tsunami around the globe.  The breach may have made the news in its announcement of the plight in the U.S., but it has also caused major problems with organizations, companies (including Microsoft), and even other governments of the world. […]

South Africa Suffers with Third Highest Cybercrime

South Africa Suffers with Third Highest Cybercrime

As if 2020 wasn’t bad enough with a global pandemic that has brought most of the world to its knees, South Africans have experienced an insult to industry by having the third number of cyber crime victims. A report by Accenture shows that even though South Africa ranks 25th in the world’s population, its citizens […]

Small Business Cybersecurity Toolkit- Part 2 of 2

Small Business Cybersecurity Toolkit- Part 2 of 2

Cybersecurity is one of the top considerations and should be considered part of the cost of doing business. Small companies are often left out with little or no information, abilities, or resources to protect their investments. Implementing best cybersecurity practices can be a challenge for most small companies, however, organizing system-wide actions can save time, […]

Steps to Recognise Software Vulnerability and Ways to Manage Them

Steps to Recognise Software Vulnerability and Ways to Manage Them

In an age when savvy management is stating that cybersecurity is part of the cost of doing business, the question arises as to what are the most cost-effective and practical methods to incorporate the price while ensuring identification and remediation of high-risk software vulnerabilities. While there are standard configuration alterations and software updates and patches […]