Learn how to coordinate your technical, legal and PR response so that your business survives a cyberattack. […]
Read More… from What to Do Immediately After a Business Cyberattack
General Cybersecurity Educational Articles
Learn how to coordinate your technical, legal and PR response so that your business survives a cyberattack. […]
Read More… from What to Do Immediately After a Business Cyberattack
Whether you are a recreational gamer or a competitive gamer, chances are you have invested a lot of real money into your characters. Here are a few important tips on how you can be vigilant and protect your online accounts #1: Never reveal any personal details about yourself It is normal for gamers to use […]
This type of crime relates to obtaining another person’s personal or financial information to use their identity to commit fraud, such as making unauthorised transactions or purchases. Identity theft is committed in many different ways, and its victims are typically left with damage to their credit, finances, and reputation. Understanding Identity Theft This type of […]
Read More… from What is Identity Theft on the World Wide Web
A report published by INTERPOL gives key insights into cybercrime in Africa. The result of cross-sector collaboration helps countries in Africa to understand the most prevalent threats and formulate a coordinated regional response to cybercrime. The top threats are: Online scams Fake emails or text messages claiming to be from a legitimate source are used […]
Read More… from Top Threats & Key Insights Into Cybercrime in Africa
SA faces a rising tide of cyberattacks. No business, irrespective of size or industry, is safe. Find out what cybercrime is, who perpetrates it and how. […]
Read More… from Cyberattacks & How Your Business Might Be At Risk
Invasion of privacy or necessary protection? Learn how to balance your child’s need for independence with protecting them from cyberbullying. […]
Read More… from Cyberbullying: Why You Need to Monitor Your Child’s Phone
We look at reasons why children might not tell you about cyberbullying, and how to spot emotional and physical signs that your child might be a victim. […]
Read More… from Know the Signs of Cyberbullying & How it Affects Your Child
The demand for personal cybersecurity due to the increase of cyber incidents leaves you feeling exposed. What can you do to protect yourself and your personal data against the dark world of cybercriminals? The good news is… quite a lot, actually! By focusing on the basics, you can dramatically reduce the risk and what cybersecurity […]
Read More… from Personal Cybersecurity 101 – Focus on the Basics
Is your child a victim of cyberbullying? Learn more about this digital threat and how to avoid as well as deal with it if it does happen. […]
Read More… from What Is Cyberbullying & How to Help Prevent It
Cybersecurity is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It’s also known as information technology security or electronic information security. The term applies in various contexts, from business to mobile computing, and can be divided into a few common categories. Network security is the practice of securing […]
According to research from the Entertainment Software Association, 70% of families have at least one child who plays video games. According to Statista, there is an estimated 3.24 billion gamers across the globe. It was estimated that 56% of active PC gamers were millennials aged between 23 and 38, and 51% of gamers were Gen […]
Read More… from How to Protect Your Child From the Dangers of Online Gaming
International credit bureau TransUnion confirmed this morning that it has been the victim of a hack by a “criminal third party” and will not be paying the extortion demand that was received. Criminal hacking group N4aughtysecTU, allegedly based in Brazil, has claimed responsibility, alleging that it has accessed the personal information of 54 million consumers, amounting […]
Read More… from TransUnion breach: Is your personal data safe?
Three ways top crypto companies leverage Prove’s technology to onboard new users in 10 seconds while mitigating SIM swap fraud and other identity fraud. Cryptocurrency fraud is at an all-time high, with the FBI recently reporting a 5x surge in SIM swap attacks and issuing a warning to crypto investors not to talk about their crypto online. At […]
Read More… from Eliminate Crypto Onboarding Delays & SIM Swap Fraud
Valentine’s Day is just around the corner, so you might be thinking about picking a little something up for the ones you love. But remember to keep an eye out; with an increase in online romances, your special someone might be a fraudster, pretending to be someone they’re not. This year, protect your heart and […]