Cyber Security

Quick tips to secure yourself against Cyber Threats

Quick tips to secure yourself against Cyber Threats

Cyber Security
There are many different ways to reduce cyber threats. First of all, computer security patches are continually released for operating systems that are widely used in the business world. Therefore, make sure your systems have all been updated with the latest security patches. Prioritize Remember, trying to protect all your assets against all possible risks equally is never profitable. Therefore, you need to prioritize which assets are the most valuable and which threats are the most dangerous. Our devices, our cars, our homes, our phones, our workplaces and even our clothes are connected to bring the world closer, but this also opens a Pandora’s box of cyber threats associated with this connectedness. Predict While the heart of the subject remains in the evangelization of users to m
Rwanda Government is Enhancing Measures to Boost Cyber Security

Rwanda Government is Enhancing Measures to Boost Cyber Security

Cyber Security
The government of Rwanda has over the last five years aggressively pursued and invested heavily in the information and communications technology (ICT), a move that has now heightened the momentum of securing the digital space Jean de Dieu Rurangirwa, ICT Minister, Rwanda has said. Having made major leaps in the digital space, it is time government challenged itself further on how to better policies and laws that can regulate the digital space? Are we responsive and progressive? What are our initiatives in protecting the now fast expanding digital economy,” posed the minister. Considering that there are real issues around protecting the digital ecosystem is infrastructure, and maintaining this position. In the second, we have an opportunity to create a self-sustaining cyber securi
4 ways to Hacker-Proof your website

4 ways to Hacker-Proof your website

Cyber Security
The alarming frequency with which websites are hacked, should have actually served as a wake up call for businesses and individuals with websites of their own. However, what has been witnessed is something on the contrary. Many website owners are lulled into a sense of false security that their website may not be the target of hackers. Far from it, regardless of the fact whether a website has a payment gateway, or anything of value, all websites share the same risk as high profile ones. There is a simple reason behind attempts to hack into websites. A hacker or hackers may try to gain control of the website with the intention of using it as a relay to spam, or to park files with content that is objectionable.  The bottom line is quite simple – all websites share a similar exposure t
Cyber threats to increase in 2018 for South Africa

Cyber threats to increase in 2018 for South Africa

Cyber Security
Nothing underlines South Africa’s integration into the global economy more than the country’s increasing vulnerability to the growing incidence of cybercrime, says Neil Cosser, Identity and Data Protection Manager for Africa at Gemalto. This is set to continue into 2018, with new threats coming into the foreground. “South Africa’s formal business sector and much of society are already highly dependent on digital platforms, with a strong emphasis on mobile technology, as is common in developing economies,” he says. “There were a number of high-profile cybercrime incidents locally in 2017, and while the proposed cybercrimes and cybersecurity legislation will go some way towards providing a framework for combatting crime, it is not necessarily perfect. In the digital sphere, law is on the ba
New Ransomware Targeting your Business

New Ransomware Targeting your Business

Cyber Security
Ransomware, a type of malware that infiltrates and infects a user or company’s system and encrypts their data, holding the organisation to ransom until a large sum of money is paid in return for a decryption key to unlock it, is more pervasive than ever. However, the emergence of a new type of ransomware strain late in 2017 showed a sinister new face to the already destructive malware. Rather than having their data recovered when they paid their ransom, the victims of the attack found their data completely and irretrievably wiped, even after paying large sums of money to recover their information. Whereas ransomware, in the traditional sense, seeks to make its perpetrators wealthy, the new strain seeks to destroy. It mimics ransomware and operates in a very similar fashion, accessin