cybersecurity

Auto Added by WPeMatico

Why Organisations Need to Invest in Digital, Customer-Facing Technology

Why Organisations Need to Invest in Digital, Customer-Facing Technology

Over the past two years, Chief Information Officers (CIOs) and senior IT executives have largely focused their efforts on digital transformation. This is mostly because COVID-19 forced organisations to expedite planned and unplanned re-engineering of their IT environments to fulfil the digital marketplace’s ever-increasing demand. While the top issues for IT departments have traditionally been…

Bad Actors Innovate, Extort & Launch 9.7M DDoS Attacks

Bad Actors Innovate, Extort & Launch 9.7M DDoS Attacks

In March 2022 we released our 2H 2021 Threat Intelligence Report. The report covers worldwide distributed denial-of-service (DDoS) attack activity during 2021—particularly during the second half of the year. As always, it’s chock-full of DDoS attack statistics, trends, and insights from our elite NETSCOUT ATLAS Security Engineering and Research Team (ASERT). Key findings include: DDoS…

How Emails Can Cause Cybersecurity Vulnerabilities in Your Organisation

How Emails Can Cause Cybersecurity Vulnerabilities in Your Organisation

Since the start of the pandemic, many businesses have shifted to remote work. Cybercriminals saw the opportunity to target businesses’ remote users leaving unprepared businesses vulnerable to cyberattacks. Phishing attacks have become one of the most prominent data security problems for a number of businesses in South Africa. “Remote working increased organisation’s reliance on email,…

Understanding the Risks to Cryptocurrency Trading

Understanding the Risks to Cryptocurrency Trading

Alongside self-fertilizing crops and low-carbon shipping, cryptocurrencies have made the World Economic Forum (WEF) list of top tech trends in 2022 bolstered by research by the Thomson Reuters Foundation that describes it as moving from the ‘fringes of finance to the mainstream’. Perceptions around cryptocurrencies have shifted, with several countries adopting it as legal tender,…

How to Be Safe From the “Reset Password” Email Scam

How to Be Safe From the “Reset Password” Email Scam

Most online services have built-in security systems that alert employees when the systems detect “unusual” activity on their accounts. For example, legitimate email services or similar will send notifications about attempts to reset the phone number and e-mail address linked to the account, or the password. Of course, as soon as such messages became commonplace,…

5 Advantages to Cloud Computing Security for Your Business

5 Advantages to Cloud Computing Security for Your Business

The COVID-19 pandemic has forced numerous businesses to adapt to remote working. The trend does not just affect huge companies but small businesses too. To support a successful transition to remote working, it is important to have the right tools in place. “As more businesses shift to cloud-based services, it is vital that companies protect…

Why Ransomware is the Greatest Threat to Your Organisation

Why Ransomware is the Greatest Threat to Your Organisation

Ransomware is getting nastier and more expensive all the time and it has affected almost every industry and geography. No one is immune from the threat. In a global ransomware survey conducted by Fortinet, 67% of organizations report suffering a ransomware attack. Even worse, almost half said they had been targeted more than once, and nearly one in…

Why Women Are Underrepresented in Cybersecurity

Why Women Are Underrepresented in Cybersecurity

One of the industries struggling with significant bias and gender stereotypes is cybersecurity. This field plays an increasingly crucial role in our digital world and, as a result, offers many fulfilling career paths and opportunities. However, there are still significant barriers and misperceptions driving the belief that a career in cybersecurity is not for women….

OT Security – Everything You Need To Know

OT Security – Everything You Need To Know

Most enterprises know that cyberattacks in the information security realm are continuously growing in sophistication, severity and number. However, up until now, many organisations that run plants, factories, pipelines and other infrastructure have paid less attention to the threats they face in the realm of operational technology (OT). Recent global, OT-focused cyberattacks highlight why South…