https://davinciforensics.co.za/cybersecurity/wp-content/uploads/Cybercrime-Bill.pdf

Act No. 19 of 2020: Cybercrimes Act, 2020

Act No. 19 of 2020: Cybercrimes Act, 2020   The Cybercrimes Act 19 of 2020 intends: to create offences which have a bearing on cybercrime; to criminalise the disclosure of data messages which are harmful and to provide for interim protection orders; to further regulate jurisdiction in respect of cybercrimes; to further regulate the powers to investigate cybercrimes; to […]

POPI Act Finally Has the Power | Data Protection SA

POPI Act Finally Has the Power

The POPI (Protection of Personal Information Act 4 of 2013) in South Africa became effective in 2016, however, as most businesses know, it has had little in the way of enforcement. This status has completely changed effective July 1, 2020, because now POPIA is empowered with the ability to investigate and fine responsible parties for […]

COVID-19 Fears Make Cyber Scams in South Africa Easier

COVID-19 Fears Make Cyber Scams in South Africa Easier

As if a global pandemic hasn’t been enough, it appears that cybercrime is on the rise in South Africa as criminals take advantage of corporate weaknesses during the COVID-19 crisis. From increased phishing scams to attacks on networks, companies seem to be aware that they need to do something but few are taking an action. […]

Experian Breach May Have Hit Millions in South Africa

Experian Breach May Have Hit Millions in South Africa

It has almost become commonplace to hear about cybersecurity attacks that result in system breaches. From individuals to corporations, everything from ransomware to network rifts, even those that have made attempts to protect personal and proprietary information have suffered by perpetrators. Given the high level of attention that global company communities have had towards cybercriminals, […]

Easiest Way for Cybercrime is with “Privileged Access” in an Organization

Easiest Way for Cybercrime is with “Privileged Access”

One of the priorities of every cybersecurity organisation is to explain that a majority of breaches in a system occurs due to compromised “privileged access” accounts. Depending on the age and size of a business, privileged access account management could have gone unchecked for years to decades, allowing an increasing number of accounts to access […]