Learn how to coordinate your technical, legal and PR response so that your business survives a cyberattack.
Whether you are a recreational gamer or a competitive gamer, chances are you have invested a lot of real money into your characters. Here are a few important tips on how you can be vigilant and protect your online accounts #1: Never reveal any personal details about yourself It is normal for gamers to use […]
This type of crime relates to obtaining another person’s personal or financial information to use their identity to commit fraud, such as making unauthorised transactions or purchases. Identity theft is committed in many different ways, and its victims are typically left with damage to their credit, finances, and reputation. Understanding Identity Theft This type of […]
A report published by INTERPOL gives key insights into cybercrime in Africa. The result of cross-sector collaboration helps countries in Africa to understand the most prevalent threats and formulate a coordinated regional response to cybercrime. The top threats are: Online scams Fake emails or text messages claiming to be from a legitimate source are used […]
SA faces a rising tide of cyberattacks. No business, irrespective of size or industry, is safe. Find out what cybercrime is, who perpetrates it and how.
Invasion of privacy or necessary protection? Learn how to balance your child’s need for independence with protecting them from cyberbullying.
We look at reasons why children might not tell you about cyberbullying, and how to spot emotional and physical signs that your child might be a victim.
The demand for personal cybersecurity due to the increase of cyber incidents leaves you feeling exposed. What can you do to protect yourself and your personal data against the dark world of cybercriminals? The good news is… quite a lot, actually! By focusing on the basics, you can dramatically reduce the risk and what cybersecurity […]
Is your child a victim of cyberbullying? Learn more about this digital threat and how to avoid as well as deal with it if it does happen.
Cybersecurity is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It’s also known as information technology security or electronic information security. The term applies in various contexts, from business to mobile computing, and can be divided into a few common categories. The scale of the cyberthreat The […]