Artificial Intelligence isn’t evil – but it could be

Artificial Intelligence (AI) should – in the hands of the right people – prove to be a massive benefit to humanity. AI’s ability to process vast data sets quickly to identify and act on trends should help in important tasks like developing new drugs, improving transport systems and solving the mysteries of the Universe. For all its “intelligence” however, AI …

What happens if I violate GDPR?

Less than 65 days. That is how long is left until GDPR comes into force. Is your company prepared? The likelihood that your company is unprepared is high, as three out of five companies state that they are not ready to implement the changes that the new data protection regulation requires. According to a recent study by Forrester, a large …

Travel Fare Aggregator Orbitz has Been Hacked

On Tuesday, Expedia announced that one of its subsidiary companies might have been hacked. There is a high possibility that the online travel booking platform Orbitz.com might have been compromised in early 2016, and again right before Christmas of 2017. According to a statement released by Expedia earlier this week, cybercriminals might have had access to sensitive information of roughly …

The Dangers of Plug-ins

Plug-ins are add-ons developed for all types of solutions and applications. The most well-known provide new features for browsers, messenger services and tools such as WordPress. All of them, without exception, can cause significant security breaches at your company. Plug-ins as an attack target The widespread use of certain plug-ins is the main reason that some hackers have focused their attention …

Afraid of insider attacks? This is how you can defend your company

There is no doubt that insider attacks at a company can be catastrophic. According to Haystax, they can cost a company on up to $500,000 to $1,000,000. What’s more, 90% of companies surveyed in the latest Crowd Research report are considered to be vulnerable to this type of security problems. In fact, 53% of companies claim they have suffered an …

Your Company’s IT Resources are a Mine for Hackers

Blockchain technology was invented in early 2009 to support bitcoin, a new digital currency with a clear objective: make transactions without the need for traditional intermediaries. Invented by the enigmatic Satoshi Nakamoto, bitcoin kicked off the cryptocurrency boom. But as society’s interest in cryptocurrencies has grown, so has criminal interest, creating headaches for companies’ security departments. The rise of cryptojacking …

How Cybercriminals Target Freelancers – And What You Can Do About It

Whoever coined the adage “time is money” was probably a freelancer. It’s tough for the self-employed to enjoy the financial or emotional benefits of paid time off. Any hour you’re not writing, designing, or programming is an hour you’re not getting paid. There’s also the non-billable time you spend communicating with clients, tracking down late payments, and promoting yourself. You …

Keys for an Effective Incident Response Plan

Despite the fact that a cyberattack can have devastating effects, the majority of companies are not prepared to deal with such problems. And even though a company may have a good prevention plan and a solid security team, breaches do occur. That’s why a good incident response plan needs to be in place. What is a SIRP? A Security Incident …

Panda Security Africa and BDO form Strategic Partnership to Mitigate Cyber-Risk

Leading global cyber security firm Panda Security Africa and audit, advisory and tax firm, BDO South Africa, have formed a strategic cyber alliance to enable BDO to offer a managed security service to their clients, using Panda’s next generation EDR solution. Predictions for 2018 indicate that cybercriminal activity shows no signs of slowing down, and organizations need to constantly review …

BYOD: when protecting the perimeter is not enough

It’s a well-known fact that millennials and generation Z are digital natives and are basically always connected to their gadgets.  This trend has consequences extending beyond the consumer market, with an effect on the corporate world as this young cohort enters the workforce.  One example is more people using their own laptops and mobile phones at the office and for …