Cybersecurity Insights

Must Know Cyber

Tips For Choosing The Right Cybersecurity Partner

You finally got the go-ahead from the board that there is a budget for a cybersecurity partner - great news! However, with so many similar yet different security services on...

The Dark Web Reality Check

Dark Web talk has gained momentum since 2010, often appearing on television shows and in the media as an indicator of illicit online activity. Hackers and malicious actors undoubtedly use...

What Is A Secret Server And Why Should You Have It

Is the username for your privileged accounts "admin"? Do you have so many accounts that there is some no one even knows about? A Secret Server, Privileged Account Management (PAM)...

Who Is Watching The Watchers?

Small and large businesses have been subject to successive waves of malicious cyber-attacks and accidental data breaches, which have spurred heightened spending and hasty decision-making on cybersecurity. Weak cybersecurity practices...

Unpacking the US Cyber Strategy and Leadership

President Biden's latest executive order for the country's cybersecurity and the protection of federal government networks is a much-needed step to bring the US on par with peer countries.  The...

Why Cybersecurity is Important for a Modern-day Society

The internet has made the world smaller in many ways, but it has also opened us up to a multitude of villainous influences that have never been so diverse and...

Phishing Is One Of The Worst Security Threats

“What is phishing?” is one of the most searched terms on the Internet. It has become one of the most effective techniques used by cybercriminals to gain access into the...

POPI Act, Are You Compliant?

The POPI Act (Protection of Personal Information Act) officially commenced on the 1st of July 2020 when it was signed into effect by the President. This means that businesses now...

Remote Working: 10 Steps To Making It More Secure

Author: Monique Magalhaes Across the globe, we are all working remotely — from our homes. Being able to work remotely is one thing, but doing it securely is another and...

IT Must Speak Business

Many businesses are frustrated by the gap that seems to exist between their daily operations and IT. It is a near impossible feat for IT to deliver, because it simply...

The Impact of Critical IT Incidents

Businesses from around the world have continually faced the challenge of IT incidents in the form of data breach. Computer Weekly published that the average business logs 1200 IT incidents...

The Battle of The Firewalls

Cybercriminals are getting better by the day and as the modern threats have evolved to outsmart network security, so too have the firewall solutions. The basic function of a firewall...

Social Engineering Attacks – imposter at the door

You have barbed wire fences around your house, burglar bars on your windows, alarm systems, armed response security and locks on all your doors… None of this matter if you...

Open Source Security – Manage The Risks

Much like propriety software, open source has plenty of positives and negatives. When making a decision between one or the other, it’s essential that business owners and IT professionals separate...

Hacking Scams – who is liable?

Hacking scam attempts occur more often than is realised, especially in smaller business environment. It would be foolish to assume that SMME’s are not targets for cyber-attacks and hacking scams....

More Insights