5 Tips to Protect From Phishing that Can Help to Save Your Business

5 Tips to Protect From Phishing that Can Help to Save Your Business

Digital security is now one of the top concerns of businesses around the globe, however, it is of particular importance in South Africa, where breaches and cyber attacks have been on the rise. Phishing has been one of the easiest ways for cybercriminals to access important and proprietary business data and once stolen, it can […]

https://davinciforensics.co.za/cybersecurity/wp-content/uploads/Cybercrime-Bill.pdf

Act No. 19 of 2020: Cybercrimes Act, 2020

Act No. 19 of 2020: Cybercrimes Act, 2020   The Cybercrimes Act 19 of 2020 intends: to create offences which have a bearing on cybercrime; to criminalise the disclosure of data messages which are harmful and to provide for interim protection orders; to further regulate jurisdiction in respect of cybercrimes; to further regulate the powers to investigate cybercrimes; to […]

Ransomware Attack on Pipeline Alerts Companies to Dangers

Ransomware Attack on Pipeline Alerts Companies to Dangers

Cyber criminals using ransomware have been around for a long time however in the last 5 years or so they have changed their methods of attack from private citizens to larger, more lucrative victims. In the last few years, hackers have focused on the bigger medical institutions and in May 2021 they sent their malware […]

Experian Breach May Have Hit Millions in South Africa

Experian Breach May Have Hit Millions in South Africa

It has almost become commonplace to hear about cybersecurity attacks that result in system breaches. From individuals to corporations, everything from ransomware to network rifts, even those that have made attempts to protect personal and proprietary information have suffered by perpetrators. Given the high level of attention that global company communities have had towards cybercriminals, […]

Easiest Way for Cybercrime is with “Privileged Access” in an Organization

Easiest Way for Cybercrime is with “Privileged Access”

One of the priorities of every cybersecurity organisation is to explain that a majority of breaches in a system occurs due to compromised “privileged access” accounts. Depending on the age and size of a business, privileged access account management could have gone unchecked for years to decades, allowing an increasing number of accounts to access […]