Phishing Infographic

Security-Related and Giveaway Phishing Email Subject Lines Get the Most Clicks

0
KnowBe4, the provider of the world’s largest security awareness training and simulated phishing platform, revealed the results of its Q4 2019 top-clicked phishing report. The...

Focusing on cyber security in 2020

0
As we welcome in the new year, companies today have unprecedented access to innovative technologies that empower them to drive business opportunities irrespective of...
Marketing scam calls

The end of annoying marketing calls in South Africa

0
Direct marketing is a serious industry in South Africa and it is frequently used by businesses as a marketing tool. Justine Krige, a director...
Information Security Chain

Fixing the Weak Link in Your Information Security Chain

0
How many security incidents do you think the average business has a year? How many do you think the average business had 10 years...
Marcus Weinberger

Ethical Hacker Meets Cyber Security Expert

0
As the last Futures Law Faculty Masterclass for 2020, the Ethical Hacker meets Cyber Security Expert,  hosted on 24 October 2019 at the very...
Louis_Podbielski_and_Graham_Croock

Two important cases on EFT Fraud

0
Paying by electronic funds transfer (EFT) is so convenient for running one’s home or business, with us being able to make payments from our...
Data Breach

Breaches in Data Security – Rights and Responsibilities – The Rise of Data Breaches

0
If the discussion around data security wasn’t pertinent enough, the data breach, or hack, against the digital infrastructure of the City of Johannesburg (CoJ)...
Identity Theft

Companies need to protect their customers from identity theft and data breaches

0
Identity theft and data breaches are on the rise with Fraudscape stating in its 2019 report that identity theft hit an all-time high of...
Law firm hackers notice

16 Year Old Hacker – Law Firms are most Lucrative

0
You would be excused if your image of a hacker conjures up images of  a guy, with a hoodie pulled over his head half...
Data Breach

The consequential implications following a Data Breach and the Mitigation of same

0
The consequences of a cyber-attack or its related data breach are wide and far reaching, impacting customer trust  in the organisation and its ability...
Email Correspondence Risks

Cyber Attacks – Email Correspondence Risks

0
How much of the following sounds familiar:  An email from a potential new client, asking for legal advise based on the attached document, whether it...

Beware of Property Cyber Scammers

4
“Forewarned is Forearmed!” (Wise old saying) Why yet another warning about cyber-scams in the property industry? It’s because the hard fact is that the criminals...