What is Phishing and How Does it Work?

Phishing remains one of the most common types of cyberattacks. It’s a firm favorite of cybercriminals because of its simplicity, effectiveness and high rate of profitability. Phishing has certainly evolved from its infancy of scamming people impersonating a Nigerian prince in need of emergency medical treatment. Phishing today is increasingly sophisticated with specific targets and … Read more

Five Cyber Threats that Security Teams Should Pay More Attention to

Ransomware has been a major threat to organizations for the last couple of years and is one of the most publicised threats online. But it is by no means the only cyberthreat your organization will face. Preparing to face these threats head on can facilitate increased security while preparing IT risk managers to improve their strategy’s … Read more

eBook Launch: A Comprehensive Guide to Business Continuity and Recovery Planning

Data loss, whether intentional or accidental, is not only inconvenient but can have severe financial implications and indeed cost you your business. Our aim with this eBook is to prepare for those instances when disaster strikes by providing you with guidance in respect of disaster recovery and business continuity. The aim is to ensure you … Read more

Cybercrime tactics are changing yet again. Here’s three trends to watch out for in 2019

Cybercrime continues to increase, and cyber criminals are continuously changing their tactics. Just as the security industry seems to get on top of the latest cybercrime threat, a new, more sophisticated threat emerges. With ransomware dominating 2017 and cryptomining malware becoming popular with hackers throughout 2018, it seems e-crime is the latest trend in cybercrime … Read more

What is Network Recovery as a Service (NRaaS) and why do I need it?

Network recovery is the process of recovering and restoring business operations on a computer network. It is similar in scope to disaster recovery to the extent that both services are tailored to prepare organizations for disasters that could disrupt, amongst others, network services. Network recovery as a service, together with an organization’s business continuity plan, … Read more

What is disaster recovery as a service (DRaaS) and is it right for me?

As technology becomes more advanced in the mobile, social, and IoT spheres, businesses become more resilient and more responsive. But, with the desire to remain resilient and available comes an increased risk of disaster striking. When considering Disaster Recovery as a Service and whether it is right for you, the key question is how much, … Read more

What is Distributed Denial of Service (DDoS) Attack and What Can You Do About It?

A distributed denial of service (DDoS) attack is an exceptionally malicious form of cybercrime where the hackers’ end goal is to take down a website or flood a corporate network with malicious traffic (such as incoming messages, fake pockets or requests for connection) to deny legitimate traffic and so take it offline. The victims of … Read more

eBook Launch: Layman’s Guide to Business Continuity Planning

Disaster recovery and business continuity planning are key components of an organization’s risk management strategy. It facilitates  critical services to continue during a disaster until normal operations can resume. Layman’s Guide to Business Continuity Planning provides an abridged and easy-to-understand guide to ensure that your business operations continue-, during as well as after disruption or disaster. Part … Read more

MALWARE MAYHEM: The Current State of the Malware Threat Landscape and How To Stay Ahead

The malware threat landscape saw many changes since 2018 – traditional threats such as ransomware are still rife, causing damage to organizations and their bottom-line; crimeware (financially motivated malware) remains the most prevalent threat; while threats such as cryptojacking (“the unauthorized use of a device by cybercriminals to mine for cryptocurrency”) and phishing notably increased. … Read more

Understanding Hacking Strategies (How Hackers Hack)

The techniques employed by hackers are constantly evolving and so are their tools. Data theft is the end goal for numerous attacks, with hackers seeking predominantly personal data, credentials, and credit card information. In order to steal this data, hackers compromise online platforms such as bookings sites, social media sites and e-commerce websites. It is … Read more