Cyber Security

How to avoid commercial identity theft

How to avoid commercial identity theft

Business, Cyber Security
The recent data breach where a wide range of sensitive information was revealed to be available on millions of South African consumers should be a wake-up call to businesses. This is according to Frank Knight, CEO of credit management company Debtsource, who says all South African businesses, regardless of size, must be more vigilant about any documentation, print or electronic, containing financial or personal information. “It is more lucrative for criminals to target businesses, rather than individuals, when it comes to perpetrating identity theft scams as the pay-off in a commercial environment is significantly higher as normal lines of trade credit are usually much more than those granted in a consumer environment. These facts have not been lost on local fraudsters,” he says. Glob
Nigeria loses N127 billion to cybercrime

Nigeria loses N127 billion to cybercrime

Cyber Security
Dr Bukola Saraki, President of the Senate, on Monday 6 November 2017 revealed that Nigeria has lost about N127 billion to cybercrime. He made the revelation at Nigeria’s first Legislative Stakeholders Conference on ICT and Cyber security in Abuja. Saraki, who was represented by Philip Aduda Saraki, Senate Minority Whip did not, however, highlight the exact period within which the nation lost such an amount to cyber crime. He said the loss was indicative of the hole created in the economy by cybercrime amounting to 0.08 per cent of the Gross Domestic product (GDP). “It is indeed ironic that while internet penetration in Nigeria is tentative at best, hovering at just over the 90 million people mark, a percentage of 47.7 per cent, internet-facilitated crime seems to be growing. Our cyb
Tech Internet Solutions launches advisory arm to help firms in Kenya mitigate cyber risk

Tech Internet Solutions launches advisory arm to help firms in Kenya mitigate cyber risk

Cyber Security
Businesses have invested in too many solutions that work well on their own but don’t offer efficient security; exposing them to unforeseen risks, to fill this gap, Internet Solutions Kenya has introduced an enterprise security solution to help enterprises mitigate, secure and ensure continuity for businesses. Dubbed the Proactive cyber security solution, the suite will enable businesses to ramp up their cyber security landscape through creating a safer and more secure cyberspace, establishing a coordinated approach to the prevention of cyber crime, ensuring operational compliance, skills development, business resilience and training. According to Dr. Bright G. Mawudor – Hea of Cyber Security at Internet Solutions, “The question for most businesses today is not what if a cyber-attack oc
How your data will be safe with the new data protection laws

How your data will be safe with the new data protection laws

Cyber Security
The data breach of over 30 million people’s personal records dubbed  “masterdeeds” has been cited as South Africa’s worst-ever data breach. The sensitive information in question, including names, addresses, ID numbers, genders, ethnicities and email addresses of people both living and deceased, was extracted from one of South Africa’s top real estate companies, Jigsaw Holdings. In light of this catastrophic data leak, what guarantee do you have that your personal information – and that of your clients – is safe? Ross Saunders, the Director of Global Technology Services at Cura Software Solutions, believes that the data should not have been where it was to begin with, and beyond that, the source website did not have best practices in place to keep any data safe. “Their first mistake
Artificial intelligence could one day take charge of cybersecurity

Artificial intelligence could one day take charge of cybersecurity

Cyber Security
For a long time, information security has been a war between men but recently it has become a battle between man and machine. The development of AI is slowly moving this fight into a new environment: machine versus machine, carefully directed by scientists or hackers. A number of cybersecurity companies are now turning to machine learning in an attempt to stay one step ahead of professionals working to steal industrial secrets, disrupt national infrastructures, hold computer networks for ransom and even influence elections. A study from 2016 uncovered that information theft is the primary concern of companies. Yet, over half of them (5 8%) don’t have the necessary systems in place to detect a sophisticated attack, which is explained by the fact that 42% don’t have a threat det