How to Keep Hackers Out of Your Facebook and Twitter Accounts

Problem Scammers, pranksters, and bad actors all want to break into whatever social media accounts they can. Here’s how to keep yours safe. Scammers, pranksters, and bad actors all want to break into whatever social media accounts they can. Here’s how to keep yours safe.IT’S IMPORTANT TO proactively secure your social media accounts, especially since you […]

POPIA Compliance: Importance of Handling Data Subject Requests Correctly

Problem The Protection of Personal Information Act, 2013 (POPIA) is designed to respond to a growing concern about inappropriate use of personal information and add responsibilities for organisations for their response to data breaches. These ‘data subject requests’ are your responsibility as a responsible party. If you don’t comply, you would normally face real scrutiny […]

POPIA Compliance – WiFi Security

Problem Weak or insecure Wi-Fi networks are one of the simplest ways cyber criminals can bypass your security and break into your organisation. This is exactly how criminals were able to break into the multi-billion dollar company TJX, one of the largest apparel companies in the world.These criminals practiced what is called war-driving. They turned […]

POPIA Compliance – Cybersecurity Pledge

Information has value—and it’s at risk. The bad guys want it and will exploit our inattention or negligence to get it. Cybersecurity incidents and breaches of private information can be prevented if we all pay a little bit more attention. It’s time to do your part … it’s time to be a hero at work […]

POPIA Compliance – Physical Security Measures

Problem In some ways it is simpler for criminals to physically steal the information they need as we often forget to secure such information. In addition, while physical attacks against your data are less common, when they do happen they can have far greater impact. For example, let’s say a criminal wanted to break into […]

POPIA Compliance – Insider Threats

Problem The most important thing to your organisation is its data. Data drives your mission and is targeted by numerousadversaries or competitors. The easiest way for someone to compromise your organisation or their data is through an insider.An insider is a trusted individual who has ulterior motives, their goal is to steal your information or […]

POPIA Compliance – Privacy Basic Checklist

Do you need to collect personal information? Ensure there is a true business need for the information. Are you only requesting the minimum information required? Resist the temptation to collect additional information that you “might” need in the future. Are you informing the individual why you need it and what it will be used for? […]

Browsing the Internet Safely

Problem The Internet has become one of your most powerful tools for many tasks, such as searching for information, communicating with friends and co-workers, shopping online, and managing your finances. In almost all of thesecases the primary tool you use is your browser, such as Internet Explorer, Chrome or Mozilla Firefox. Your browser is in […]
MORE NEWS  

Leave a Reply

Your email address will not be published. Required fields are marked *