Data Breach

Remote Working – The Cost of a Data Breach

0
I’d like to start this series by breaking down the latest IBM Data Breach report and hopefully translate it into business language...
Dawid Jacobs

Taking Identity Management Seriously – Self Sovereign Identities

0
By Dawid JacobsIdentity Management Specialist, on behalf of LexisNexis South Africa As humans we have embraced the digital and...
Phishing Infographic

Security-Related and Giveaway Phishing Email Subject Lines Get the Most Clicks

0
KnowBe4, the provider of the world’s largest security awareness training and simulated phishing platform, revealed the results of its Q4 2019 top-clicked...

Focusing on cyber security in 2020

0
As we welcome in the new year, companies today have unprecedented access to innovative technologies that empower them to drive business opportunities...
Marketing scam calls

The end of annoying marketing calls in South Africa

0
Direct marketing is a serious industry in South Africa and it is frequently used by businesses as a marketing tool. Justine Krige,...
Information Security Chain

Fixing the Weak Link in Your Information Security Chain

0
How many security incidents do you think the average business has a year? How many do you think the average business had...
Marcus Weinberger

Ethical Hacker Meets Cyber Security Expert

0
As the last Futures Law Faculty Masterclass for 2020, the Ethical Hacker meets Cyber Security Expert,  hosted on 24 October 2019 at...
Louis_Podbielski_and_Graham_Croock

Two important cases on EFT Fraud

0
Paying by electronic funds transfer (EFT) is so convenient for running one’s home or business, with us being able to make payments...
Data Breach

Breaches in Data Security – Rights and Responsibilities – The Rise of Data Breaches

0
If the discussion around data security wasn’t pertinent enough, the data breach, or hack, against the digital infrastructure of the City of...
Identity Theft

Companies need to protect their customers from identity theft and data breaches

0
Identity theft and data breaches are on the rise with Fraudscape stating in its 2019 report that identity theft hit an all-time...
Law firm hackers notice

16 Year Old Hacker – Law Firms are most Lucrative

0
You would be excused if your image of a hacker conjures up images of  a guy, with a hoodie pulled over his...
Data Breach

The consequential implications following a Data Breach and the Mitigation of same

0
The consequences of a cyber-attack or its related data breach are wide and far reaching, impacting customer trust  in the organisation and...