Let’s start with the basics. “Cybersecurity refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cybersecurity may also be referred to as information technology security.” Now that we’ve presented a formal definition from an industry leader in the data loss prevention (DLP) industry, I’d like to …
Data Security Threats with a Remote Workforce
Remote workers cover many job areas, from data entry to graphics designers, HR personnel, management, and nearly every job in between. Your sales force can be remote as well, with the freedom to connect with more potential customers and a wider sales field. With each remote worker, however, comes potential cyber threats that you must include in your overall comprehensive IT strategy. What …
Cyber Security Defence
During the week, the IT industry has been scrambling to answer questions regarding several patches that address vulnerabilities. These vulnerabilities allow a hacker to send communication packets to a remote Windows 10 or Windows Server 2019 operating system and potentially gain control over the device. This patch is critical and necessary to defend against attacks that can happen from anywhere in …
COVID-19 Scams? Make Sure Your Remote Employees Know About The Danger
Worried about COVID-19 scams again? Managing your remote employees through the coronavirus pandemic means more than keeping them productive – they have to be secure as well. Do you know what cybercrime scams you have to be aware of right now? It’s a dangerous time right now. Cybercriminals are taking advantage of the confusion and lack of awareness that stems …
Protecting Your Business – Data Security FAQ
As one of Southern Africa’s leading managed IT service providers, we hear a lot of questions and concerns about data security – and rightfully so. Data security is critical to business operations, but many business owners overlook this potentially dangerous facet of their business. What happens if your security is breached? What if disaster strikes and you can’t access important …
Cybersecurity training: creating a more holistic business security plan
Did you know employee error accounts for more than a quarter of all company security breaches? Or that the average expense of a data breach is R36 million, globally? Experts say ransomware is expected to cost businesses R120 billion this year and that nearly 2 billion records were leaked in January 2022 alone. Hackers are improving as technology continues to advance …
The basics on 2-step and 2-factor authentication
Cybersecurity is a vital component to businesses these days. You need to make sure that criminals cannot just hack into your network. When it comes to verifying users’ identity, there are two types of authentication used: two-step and two-factor. These two are so similar, many confuse one with the other. Learn the difference between the two, so you’re more knowledgeable …
Warning signs your computer has malware
With the rise of eCommerce and online banking, cyber-crime has evolved. Like criminals who pull smash-and-grab jobs, they go where the money is. However, unlike bank robbers, cyber criminals do their best to avoid detection by letting malware do the work for them. Viruses and ransomware sneak into PCs to quietly steal passwords, financial credentials, and other personal information to …
Cyberthreats and the Finance Sector
The financial sector has long been heavily targeted by cybercriminals. Over the years, the number of Cyberthreats and attacks that involved extortion, social engineering, and credential-stealing malware has surged rapidly. This means that financial institutions should strive to familiarise themselves with the threats and the agents behind them. Here are seven new threats and tactics, techniques, and procedures that security …
Why is HTTPS (Hypertext transfer protocol secure) important?
Many internet users still do not understand what the padlock icon in their web browser’s address bar is for. It represents HTTPS ( Hypertext transfer protocol secure ), a security feature that authenticates websites and protects the information users submit to them. This is an important feature that lets users know whether the website they are visiting is secure or …
Fileless malware: Are you at risk?
Over the past few years, the security industry has been witnessing a rapid evolution in attack techniques, including fileless malware, which uses legitimate tools and services such as existing software, applications, and authorised protocols to carry out malicious activities such as unauthorised data retrieval or data damage. It therefore pays to stay abreast of such threats. What is fileless malware? …
The dangers of the web and how to stay safe
You probably go to great lengths to keep yourself safe, whether at home or in public. But what happens when you get online? Learn more about how you could be exposing yourself and your personal information over the internet so you can stay safe. Staying up to date with Online Security is key. With the headlines about data breaches and …