Vulnerabilities in technology are an unfortunate side effect of innovation. For example, when software companies release an update, it can contain weaknesses in the code, which hackers can use to exploit. Once this is realised the vulnerabilities are addressed with … Read More

No business wants to incur a cyberattack or data breach, but in the current online environment, it can be difficult to avoid them completely. According to an IBM Security report 83% of businesses have experienced at least one data breach. … Read More

The misconfiguration of cloud apps and online security protocols is often overlooked when businesses are planning their cyber risk mitigation strategies. Apps located in the cloud are generally easy to access and sign up for, and the consumer often ignores … Read More

Client Profile Alexandra Park Conference Centre provides chef prepared catering, comfortable accommodation, activity programs and experiences, and conference rooms for any type of group. There are four accommodation areas, multiple meeting rooms and 10 hectares that includes an oval, a … Read More

During the first months of 2022, malware attacks targeting mobile devices surged by an incredible 500%. This escalation is alarming both in its size, and because many mobile device holders and owners are not protecting their devices. Mobile device users tend … Read More

Data privacy and the protection of data has been evolving since the inception of the internet. With significant volumes of information being shared online, governments and industry bodies have been impelled to formulate and enforce privacy regulations to protect individuals … Read More

At the beginning of each year 1 in 4 people create personal resolutions that they hope to act upon for better self-improvement. This practice can also be useful for organisations as they look to improve their current technological practices. In this article, … Read More

Cybersecurity insurance might be a new concept for some small and medium-sized businesses. It first appeared in the 1990s to provide insurance coverage for larger organisations, and it initially covered areas such as errors made during data processing, and online … Read More

With most workplaces reliant on digital technology, employees will inevitably leave a digital trace from some of their work-related practices. From the moment that they join, an employee will be digitally connected to your organisation, via a company email address, … Read More

Once user credentials became a necessity for online activity their security, or lack thereof, became a serious concern very shortly after. Up to 81% of online security events occur due to weak or stolen user credentials, and unfortunately employees continue … Read More

1 2 3 4 5 6 7 12