Advertisement
Home Tags Cyber security

Tag: cyber security

Tech pathways for matriculants – from matric results to careers

0
With the 2024 matric results being announced on Monday, there are tech pathways for matriculants. These pathways could open up a world of possibilities for aspiring tech professionals. The South African technology sector is undergoing an extraordinary transformation. This change is marked by a surging demand for skilled professionals across diverse industries.

STUDY | How technology will make or break business in 2024

0
In an era of unprecedented uncertainty, the headwinds facing businesses are stronger than ever. Businesses find themselves navigating a complex landscape, where economic shifts and geopolitical challenges loom large on the horizon. In such turbulent times, the key question is not whether change will occur, but rather how effectively leaders can prepare for and adapt to it.

Safeguarding your company – impact of CIPC information breach

0
Reparative measures may have been taken to remedy the Companies and Intellectual Property Commission hack which reportedly took place on 29 February 2024 however this information breach may have long-lasting and detrimental effects!

Armour up ahead of holidays shopping season

0
Picture this: It’s Black Friday and it’s time to take advantage of the massive sale on your favourite online shop. You’ve been receiving emails all month in the run-up to the day and you’ve bookmarked several items that you just have to have – and their prices for one day only are ridiculously low. You open the browser, head to the store and….

The tools needed for success in the hybrid working environment

0
One of the phrases that emerged in the last two years as more companies adopted remote working was 'the new normal.' At the time, most of us took that to mean that – along with having to wear masks and sanitise our hands at every opportunity – businesses that found they could continue operations on a remote working basis would continue to do so in perpetuity.

Law firms under attack

0
Law firms remain targets of cyber-criminals, largely due to the vast amounts of client data, information and money that they retain and the continued refusal of most law firms to take basic precautions when it comes to their cyber security posture.

Cyber governance – future sustainability

0
It is a common belief that 'data is the new oil', and Information Technology (IT) supports almost every modern-day transaction, from the delivery of electricity and water to banking, shopping, manufacturing, and correspondence. The confidentiality, integrity, authenticity, and accessibility of information that enable these operations must be ensured to avoid the failure of related and unrelated information, devices, and activities. These failures expose businesses and individuals to the risk of reputation, income, assets, and the very endurance of the business or organisation and as a going concern. As a result, like sustainability, cybersecurity is now a critically important 'C-suite' issue.

Cyber governance – vendor cybersecurity assessment vital!

0
Many organisations in today's digital landscape rely heavily on third-party vendors who help carry out delegated operations. A third-party vendor could be a company or entity that provides certain services to your business.

Cyber governance – the challenges of interoperability

0
Information has undoubtedly become one of the most valuable assets for organisations, and whose dependence on it is constantly rising. At the same time, the frequency, sophistication and ferocity of cyberattacks are also increasing, posing a significant threat to business environments.

Cyber governance – the human factor

0
Cyber and information technology security governance refers to the system by which an organisation directs and controls IT security and, to a large extent, involves decision making to mitigate cyber risks. By definition, this implies that cyber governance determines who is authorised to make decisions regarding the adoption of frameworks and the design and implementation of effective controls, which to a significant extent rely on continuous human involvement.

MOST POPULAR

X

Forgot Password?

Join Us