Advertisement
Home Tags Multifactor Authentication (MA)

Tag: Multifactor Authentication (MA)

The key proactive IT support components for SMEs

0
In today’s digital age, small and medium-sized enterprises (SMEs) rely heavily on their IT infrastructure. It is essential for maintaining smooth operations and staying competitive. However, managing IT systems can be complex and time-consuming. This is especially true for SMEs that operate with limited resources.

Spotting phishing emails – key warning signs

0
Email plays an integral role in daily life, but cybercriminals exploit it as a prime attack channel. Phishing scams involve malicious emails designed to trick recipients into revealing sensitive information. These scams rank among the most prevalent cybersecurity threats.

BEC cyber threat protection – staying vigilant amid year-end fatigue

0
As the year ends, businesses face year-end fatigue and the pressures of the approaching festive season. This period, marked by heavy workloads and rushing to meet targets, creates opportunities for cybercriminals to exploit vulnerabilities. One prominent method is business email compromise (BEC), a sophisticated cybercrime targeting organisations via email system infiltration. A common BEC tactic involves altering banking details on invoices.

The Joint Standard 2 of 2024 on cybersecurity & cyber resilience...

0
The Financial Sector Regulation (FSCA) and the Prudential Authority (PA) published Joint Standard 2 of 2024 on Cybersecurity and Cyber Resilience Requirements on 17 May 2024. The Joint Standard 2 of 2024 (Joint Standard) applies to all financial institutions as defined in the Joint Standard. It sets out the requirements for sound practices and processes relating to cybersecurity and cyber resilience for financial institutions.

Embracing the power of APIs in cybersecurity

0
In the fast-evolving landscape of cybersecurity, the intersection of technology and security has become imperative. Within this dynamic realm, application programming interfaces (APIs) have risen to prominence as a linchpin in fortifying our digital defences.

Smart devices – from cars to cots

0
We live in a world surrounded by smart devices – from our pockets to our driveways and living rooms. These advancements offer convenience, and in many cases, extra security. But when gadgets are fitted with computing power and internet connectivity, they also become a target for remote hackers. 

Protecting schools from data breaches and ransomware

0
As organisations across the globe contend with an increasing number of cyberattacks, schools and higher learning institutions are looking for innovative and cost-effective ways to protect their students, staff, and data from breaches and ransomware.

Ways not to become a cybercrime statistic

0
If you believe cybercrime is something that only happens to businesses and “other people,” now is a good time to reboot your attitude. South Africa currently has the third highest number of cybercrime victims worldwide according to Accenture, with cybercrime costing South Africa R2.2 billion per year.

Public access Wi-Fi – a costly convenience?

0
Working from home works pretty well for much of the cloud enabled workforce most of the time. Primarily, a reliable and secure internet connection that builds a bridge between home and the office – perhaps via your organisation’s Virtual Private Network (VPN) – was all that you needed.

Understanding the threat of RDP attacks in a remote working world...

0
At a time when hybrid working is normalised, many companies have taken to using the Remote Desktop Protocol (RDP) that enables computers on the same corporate network to be linked together and accessed remotely even when employees are at home.

MOST POPULAR

X

Forgot Password?

Join Us