Contact: 087 238 1870


Along with the rise in data leaks and cyber breaches in South Africa, there is also a marked increase in the number and volume of impersonation attacks being attempted. As long as the cybercriminal keeps being successful, this will not slow down.  Are you aware of what an impersonation attack is, and are you actively taking steps to identify and stop these attacks in your own environment?

There are billions of email addresses in use and often people have more than one address. Owing to the low risk and increased simplicity of launching an attack it is reported that 91% of cyber-attacks are started via email. Without visibility and awareness, the odds are definitely in the cyber criminals favour.

Impersonation attacks and phishing attacks are very similar.  One big difference between the two is that the impersonation attack is more precise and will have a specific target. Phishing attacks use the shotgun approach to hit as many targets as possible, also called a spray and pray.

Who wouldn’t want to be able to access and share information freely from a place of endless storage?

Cloud computing has become a household name, with businesses moving either to the cloud or they are there already.  A place where you can store, share and keep important data. How or where the hardware and software is located doesn’t matter to you, as long as you can access, add and store your information, you as the user, are in internet bliss. This way of storing information has become the way forward due to it being available “on-demand”. Cloud providers have options for public or private access, depending on what you are using it for.

Some people like the security of having something tangible i.e. a hard drive or server.  This is no longer the way to go because how many hard drives do you need to make a backup of a backup? And what if they all stop working? It’s too risky.

Others believe that a system that has a couple of servers is an improved solution for the business compared to a cloud-based solution.  Owning a couple of servers that are onsite doesn’t guarantee security. Onsite systems are large and this makes them pricey.  They can be accessed by many people and unless you are connected to that network, you would need to physically be there to access it. Cloud systems are accessible almost all of the time, from anywhere and you can provide different levels of access to staff, as required.

Cyber breaches are on every CEO’s mind. You cannot turn a page or hit a site without hearing of yet another corporate data loss disaster. No organisation is immune.

Nobody wants to be the next CEO at a press conference confirming that their cyber defences were penetrated and that their beloved customer’s personal data is now being actively traded on the cyber underground. Are you prepared to sit down with the regulator to explain that in the face of a clear and present danger, you did not do enough to stay cyber secure?

The truth is that as long as there are people who use systems, the probability of compromise is basically guaranteed. You will be compromised, it then depends on your multi-layered defence strategy to see whether the compromise leads to an all-out breach.

An important layer in your security program is your users. It is vital that all users have a sound awareness of cyber threats they may encounter in their daily activities.

cyber threatWhy are Millennials at a higher risk of falling victim to a cyber attack? The answer to this is simple, they make themselves easy pickings for cyber criminals.

How can a generation born into a world of all things cyber be such a cyber hazard? Millennials may be more knowledgeable when it comes to all things tech and how the internet works, but that doesn’t mean they are necessarily conscious of the risk this involves and the dark(web) side.

Various researchers have found that they worry less about being the target of a hack or a breach therefore not taking any measures to prevent attacks which can even lead to their respective place of work open to critical data being breached due to lack of care.

I hear this in several conversations with IT and security executives. This generation of technologically aware “kids” are now an integral part of the business community. The existing generation of leaders in business are struggling to properly integrate these people into existing and legacy security and risk frameworks.

The rising number of millennials in the workplace is seen as a major risk because the “youngsters” don’t take cyber security at work seriously enough. They simply do not care!

I am not convinced.

The modern workplace is an interesting place and in my opinion it is very unique. We have three distinct species who have to combine to generate ongoing value for the business. The business operates in and is part of a hyper-connected world and all three of these work species have different knowledge, acceptance and understanding of technologies. Here is my list of these species.