Tag Archives: africa

ESET Southern Africa guns for enterprise space

ESET Southern Africa guns for enterprise space

IT security firm ESET has announced its intention to aggressively target the enterprise market, underpinned by the rollout of a new consumer solution. The traditionally SME-focused company says the advent of the Internet of Things (IoT) and exponential growth in data volume has opened up businesses to more risk.

ESET is looking to capitalise on these commercial IT security trends to engage the highly competitive enterprise space and increase its position as the third largest endpoint security vendor in South Africa, according to the IDC and Gartner.

The security firm says any connected businesses in the digital age is far more exposed to external risks, including data theft, ID theft and extortion. This is exacerbated by the continued risk, within the company, posed by BYOD, offsite internet connectivity and access to the corporate network.

The company has now

Read more at: http://www.itwebafrica.com/security/513-africa/241646-eset-southern-africa-guns-for-enterprise-space

Automated data protection is critical says Redstor | IT News Africa …

‘;

winimg.document.writeln(doc);
winimg.document.close();
}

//]]

li>ul,.container,#coinslid {background-color:#ffffff}
ul#serinfo-nav{border-color:#ffffff !important}
.body2,.header_scroll,.headbg,.header_noslide,#footer,#rightsidebar,#navigation{background-color:#404040}
#nav li a,.nav>li>a,.nav>li>a{border-color:#404040}
#serinfo,#serinfo-nav li.current{background-color:#f9f9f9}
.overrating,#sidebar p input[type=submit],span.ribbon,a#triggernav,a#triggernav-sec,a.fromhome,.imgwrap,a.mainbutton,a.itembutton,.page-numbers.current,a.comment-reply-link,#submit,#comments .navigation a,.tagssingle a,.contact-form .submit,.intro,li.main h2,.plan-bottom a,.scrollTo_top a,.gallery-item, submit{background-color:#EC9D3A}
a.moreposts{color:#EC9D3A !important}
body{background-color:#fff}
h2.widget{border-color:#fff !important}
.body1 a, a:link, a:visited,.nav li ul li a{color:#2e372f}
span>a.moreposts,ul#serinfo-nav li a{color:#2e372f !important}
a:hover,.body1 a:hover,#serinfo a:hover,.nav>li.sfHover>a,.nav>li.current-menu-item>a,#serinfo-nav li.current a,#sec-nav>li.current-menu-item>a,ul#tabsmall>li.ui-tabs-selected>a.sidnav{color:#ec9c3a !important}
.nav>li>a:hover,.nav>li.current-menu-ancestor>a,.nav>li.current-menu-item>a,.nav>li.sfHover>a,.nav>li.current-menu-item>a{border-bottom-color:#ec9c3a !important}
.body2 a,a.body2 {color:#fff}

.body2 a:hover,p.body2 a:hover{color:#EC9D3A!important}
#coinslid,.archivepost li,#comments,#header,#sec-navigation,#core_bg,.seccol li,.teaser,.meta,.etabs,.tab,.widgetflexslider,.widgetcol,.widgetcol_small,#sec-nav>li>a,ul#serinfo,#serinfo-nav li.current,#hometab,#navigation,#sidebar h2,.ad300,.searchformhead input.s,.searchform input.s,.nav>li>ul,#main-nav>li,.nav li ul li a,.pagination,input, textarea,input checkbox,input radio,select, file{border-color:#ededed !important}
body,#sec-nav,input, textarea,input checkbox,input radio,select, file,h3.sd-title {font:200 14px/2.0em Arial, sans-serif;color:#545454}
h2.ads{color:#545454}
.body2 {font:200 14px/2.0em Arial, sans-serif;color:#fff}
.body2 h2,.body2 h3,.tickerwrap>span {color:#fff !important}
.intro h1,.intro h1 a,a.itembutton,a.mainbutton,.page-numbers.current{color:}
h1 {font:900 25px/1.5em “Montserrat”, sans-serif;color:#2e373f}#block ul li h2 {font-family:”Montserrat”, sans-serif}h2 {font:900 16px/1.2em “Montserrat”, sans-serif;color:#3d3d3d}h2.post {font:900 28px/1.2em “Montserrat”, sans-serif;color:#ec9d3d}#sidebar h2 {color:#ec9d3d}h3,h3#reply-title,#respond h3,.comment-author cite{font:400 14px/1.3em “Montserrat”, sans-serif;color:#222222 !important}a.mainbutton,a.itembutton,.page-numbers.current,a.comment-reply-link {font-family:”Montserrat”, sans-serif !important}h4 {font:400 13px/1.5em “Montserrat”, sans-serif;color:#222222}h5,.nav>li>a>span.walker,p.meta,.meta a {font:400 10px/1.5em Tahoma, Geneva, Verdana, sans-serif;color:#878787}h6 {font:400 10px/1.5em Tahoma, Geneva, Verdana, sans-serif;color:#878787}
#nav li

Read more at: https://www.itnewsafrica.com/2017/11/automated-data-protection-is-critical-says-redstor/

East Africa: Data Security – Safeguarding Your Business Network From Cyber Crime

We are living in an increasingly connected world where technology and internet plays significant roles in our everyday activities.

Kenya especially, has leaped in bounds in all matters technology. The things we do, the gadgets we touch, the services we receive and the lifestyle we dwell in have aspects of technology that can no longer be ignored.

This includes banking, home appliances, mobile phones, entertainment gadgets, wearables and basic government procurement services. The country has also employed considerable technology in conducting its elections!

Ideally, the importance of technology in our present-day existence and in future cannot be gainsaid.

These gains have seen institutions and corporates align their businesses to be techno-savvy, so as to cater for their clients with an increasing appetite for technology-based services and products.

Unfortunately, the expanding cyberspace we are experiencing is also a ripe recipe for various forms of cyber-attacks.

In years

Read more at: http://allafrica.com/stories/201711070967.html

Millions caught in South Africa’s ‘worst data breach’

Photograph of local website running cyber breach article

Image caption

South Africa has been hit by what is described as the worst data breach in history

Authorities in South Africa are investigating a data breach which has seen the personal details of more than 30 million citizens leaked on the internet – placing them

Read more at: http://www.bbc.com/news/world-africa-41696703

Millions caught in South Africa’s ‘worst data breach’ – BBC News

Photograph of local website running cyber breach article

Image caption

South Africa has been hit by what is described as the worst data breach in history

Authorities in South Africa are investigating a data breach which has seen the personal details of more than 30 million citizens leaked on the internet – placing them

Read more at: http://www.bbc.com/news/world-africa-41696703

South Africa: MEC Debbie Schäfer On Bullying Tactics in Schools

press release

The recent reports of bullying both in the Western Cape and across the country are very disturbing.

Bullying and school safety in general are issues of great concern to me, and about which I exercise my mind regularly as to how best to address them. Respect for human dignity is one of the values enshrined in our constitution, and bullying is a denial of this.

Bullying behaviour is typically when a child or group of children misuse their power to hurt other children or exclude them.

There are the “traditional” types of bullying, namely physical abuse, verbal or written abuse and social abuse, such as when learners gossip about each other, exclude each other from a group or reveal personal information about a learner with the goal of humiliating them.

But bullying tactics have now also developed with modern technology, and now also include cyber-bullying. Cyber-bullying is

Read more at: http://allafrica.com/stories/201709280771.html

South Africa: MEC Debbie Schäfer On Bullying Tactics in Schools …

press release

The recent reports of bullying both in the Western Cape and across the country are very disturbing.

Bullying and school safety in general are issues of great concern to me, and about which I exercise my mind regularly as to how best to address them. Respect for human dignity is one of the values enshrined in our constitution, and bullying is a denial of this.

Bullying behaviour is typically when a child or group of children misuse their power to hurt other children or exclude them.

There are the “traditional” types of bullying, namely physical abuse, verbal or written abuse and social abuse, such as when learners gossip about each other, exclude each other from a group or reveal personal information about a learner with the goal of humiliating them.

But bullying tactics have now also developed with modern technology, and now also include cyber-bullying. Cyber-bullying is

Read more at: http://allafrica.com/stories/201709280771.html

Shadow IT could be the reason businesses "wannacry" – ITWeb Africa

Shadow IT could be the reason businesses wannacry

There are mixed opinions about implementing unauthorised, IT applications (apps) within the organisation, a practice known as Shadow IT. Opinion on Shadow IT is divided into two camps. Some believe that due to the fast pace of business, demands are exceeding IT capability, Shadow IT answers the need for fast, agile solutions and encourages innovative thinking. However, others suppose that Shadow IT causes a breakdown in traditional yet necessary processes, opening up the scope for risk.

While the market has driven the need for Shadow IT to play a role, the risks cannot be overstated. There has been a significant rise in cyber-crime activity over the last few months, with malware such as the WannaCry Ransomware, and the more recent Petya and NotPetya attacks, making news headlines due to the damage caused on a global scale.

Shadow IT,

Read more at: http://www.itwebafrica.com/home-page/opinion/239970-shadow-it-could-be-the-reason-businesses-qwannacryq

Is your payroll data protected against cyber-crime? – Disrupt Africa

As cyber attacks against small businesses continue to rise, in this guest post, Warren van Wyk, director of PaySpace, offers advice on how startups can protect their data from cyber criminals.

Small businesses are often the targets of cyber criminals. In fact, data from Symantec’s 2016 Internet Security Threat Report shows that in 2016, 43 per cent of phishing attacks targeted small businesses. That’s a 25 per cent increase in just five years.

Hackers are likely to attack startups as they perceive them to be easy targets. They are aware that, unlike large corporations, smaller businesses generally have less funds to put towards online security. Some startups may also overlook the need for proper security measures, simply because they are not familiar with the issues – or the available solutions.

For these reasons, startups need to be extra vigilant in the fight against cyber-crime.

Most cyber criminals target commonly used software platforms with

Read more at: http://disrupt-africa.com/2017/08/is-your-payroll-data-protected-against-cyber-crime/

Is your payroll data protected against cyber-crime | IT News Africa …

‘;

winimg.document.writeln(doc);
winimg.document.close();
}

//]]

li>ul,.container,#coinslid {background-color:#ffffff}
ul#serinfo-nav{border-color:#ffffff !important}
.body2,.header_scroll,.headbg,.header_noslide,#footer,#rightsidebar,#navigation{background-color:#404040}
#nav li a,.nav>li>a,.nav>li>a{border-color:#404040}
#serinfo,#serinfo-nav li.current{background-color:#f9f9f9}
.overrating,#sidebar p input[type=submit],span.ribbon,a#triggernav,a#triggernav-sec,a.fromhome,.imgwrap,a.mainbutton,a.itembutton,.page-numbers.current,a.comment-reply-link,#submit,#comments .navigation a,.tagssingle a,.contact-form .submit,.intro,li.main h2,.plan-bottom a,.scrollTo_top a,.gallery-item, submit{background-color:#EC9D3A}
a.moreposts{color:#EC9D3A !important}
body{background-color:#fff}
h2.widget{border-color:#fff !important}
.body1 a, a:link, a:visited,.nav li ul li a{color:#2e372f}
span>a.moreposts,ul#serinfo-nav li a{color:#2e372f !important}
a:hover,.body1 a:hover,#serinfo a:hover,.nav>li.sfHover>a,.nav>li.current-menu-item>a,#serinfo-nav li.current a,#sec-nav>li.current-menu-item>a,ul#tabsmall>li.ui-tabs-selected>a.sidnav{color:#ec9c3a !important}
.nav>li>a:hover,.nav>li.current-menu-ancestor>a,.nav>li.current-menu-item>a,.nav>li.sfHover>a,.nav>li.current-menu-item>a{border-bottom-color:#ec9c3a !important}
.body2 a,a.body2 {color:#fff}

.body2 a:hover,p.body2 a:hover{color:#EC9D3A!important}
#coinslid,.archivepost li,#comments,#header,#sec-navigation,#core_bg,.seccol li,.teaser,.meta,.etabs,.tab,.widgetflexslider,.widgetcol,.widgetcol_small,#sec-nav>li>a,ul#serinfo,#serinfo-nav li.current,#hometab,#navigation,#sidebar h2,.ad300,.searchformhead input.s,.searchform input.s,.nav>li>ul,#main-nav>li,.nav li ul li a,.pagination,input, textarea,input checkbox,input radio,select, file{border-color:#ededed !important}
body,#sec-nav,input, textarea,input checkbox,input radio,select, file,h3.sd-title {font:200 15px/2.0em Arial, sans-serif;color:#545454}
h2.ads{color:#545454}
.body2 {font:200 14px/2.0em Arial, sans-serif;color:#fff}
.body2 h2,.body2 h3,.tickerwrap>span {color:#fff !important}
.intro h1,.intro h1 a,a.itembutton,a.mainbutton,.page-numbers.current{color:}
h1 {font:900 25px/1.5em “Montserrat”, sans-serif;color:#2e373f}#block ul li h2 {font-family:”Montserrat”, sans-serif}h2 {font:900 16px/1.2em “Montserrat”, sans-serif;color:#3d3d3d}h2.post {font:900 28px/1.2em “Montserrat”, sans-serif;color:#ec9d3d}#sidebar h2 {color:#ec9d3d}h3,h3#reply-title,#respond h3,.comment-author cite{font:400 15px/1.3em “Montserrat”, sans-serif;color:#222222 !important}a.mainbutton,a.itembutton,.page-numbers.current,a.comment-reply-link {font-family:”Montserrat”, sans-serif !important}h4 {font:400 13px/1.5em “Montserrat”, sans-serif;color:#222222}h5,.nav>li>a>span.walker,p.meta,.meta a {font:400 10px/1.5em Tahoma, Geneva, Verdana, sans-serif;color:#878787}h6 {font:400 10px/1.5em Tahoma, Geneva, Verdana, sans-serif;color:#878787}
#nav li

Read more at: https://www.itnewsafrica.com/2017/07/is-your-payroll-data-protected-against-cyber-crime/