Data Analytics and Big Data – What does it mean for me?

Few people can dispute that the amount of data that is generated and disseminated on any given day is increasing daily, with no slowing down in sight. According to business intelligence company, Bernard Marr & Co, every two days the population creates as much data as was recorded from the beginning of time until the year 2000.

With this continuing increase in data creation, the question remains – where does this data come from? Could this be what is referred to as Big Data? Where does all this data end up going and what purpose does it serve?

Read more Source: https://www.itnewsafrica.com/2018/06/data-analytics-and-big-data-what-does-it-mean-for-me/

More critical Remote Desktop flaws expose Windows systems to hacking

Microsoft finds and fixes multiple RDS and RDP vulnerabilities in Windows, but new research on BlueKeep patch rates suggests many machines could remain exposed.

Read more Source: https://www.itworld.com/article/3431665/more-critical-remote-desktop-flaws-expose-windows-systems-to-hacking.html

What the heck is blockchain?

What is blockchain? Blockchain is a network of computers that polices itself, so people or businesses can cooperate without fear that somebody is tampering with the data. Today most data is sealed up at a central organization, like a bank or the Department of Motor Vehicles.

Source: https://www.cnet.com/videos/what-the-heck-is-blockchain/

The top five security threats in cloud computing

Data breaches are at the top of the list of security threats in the cloud, according to a new report released by Cloud Security Alliance.
For the “Top Threats to Cloud Computing: Egregious Eleven” report, 241 industry experts were interviewed and rated 11 salient threats, risks and vulnerabilities in their cloud environments in order of significance.
This is the fourth instalment of the report, which states that data breaches; misconfiguration and inadequate change control; lack of cloud security architecture and strategy; insufficient identity, credential, access and key management; and account hijacking are the top five threats in cloud computing.
Many cloud security issues that featured in the previous “Treacherous 12” report dropped off the list. These include denial-of-service, shared technology vulnerabilities and data loss.

Rad more Source: https://itweb.co.za/content/PmxVEMKX9glqQY85

ESET Internet Security® delivers rock-solid protection

ESET Internet Security® delivers rock-solid protection for everyday web users, built on ESET’s trademark best mix of detection, speed and usability. As well as giving you proven ESET Antivirus, it shields your webcam and helps you bank and pay more safely online.

 

Windows 10 update (and retirement) calendar: Mark these dates

Microsoft is releasing new versions of Windows 10 on a set schedule – and just as regularly retiring older versions from support. Here are all the dates you need to know about through Windows 7’s retirement in 2020 and beyond.

Read more Source: https://www.idginsiderpro.com/article/3234766/windows-10-update-and-retirement-calendar-mark-these-dates.html

Criminals have the keys to steal your airtime and hijack your mobile number

South African mobile users are sitting ducks for criminals, who are given the keys to steal their airtime and hijack their mobile number.

What is even worse is that mobile users can do nothing about it. Instead, they just have to wait until they become a victim and hope the damage is not too significant.

Considering this state of affairs, it is not surprising that millions in airtime is stolen from South Africans each month and that online banking fraud is skyrocketing.

The South African Banking Risk Information Centre’s (SABRIC’s) annual crime statistics for 2018 reflected a 75.3% increase in online and mobile banking fraud.

Last year alone, R263 million was stolen from over 23,000 South Africans after their mobile numbers were hijacked and their banking details compromised.

Read more Source: https://mybroadband.co.za/news/cellular/315411-criminals-have-the-keys-to-steal-your-airtime-and-hijack-your-mobile-number.html

Ransomware a growing threat to SA organisations

The rise in cybercrime is unprecedented, writes Ian Jansen van Rensburg, Senior Systems Engineer at VMware. Over one-third of South African IT decision-makers (35%) are on high alert and are expecting cyber-attacks on their businesses within days.

Moreover, besides expecting imminent attacks, another 31% of organisations are expecting an attack with the year. Fewer than one in five IT decision-makers in SA enterprises believe themselves safe from attack in the next two years.

These were two of the findings of a new research study dubbed “The State of Enterprise Security in South Africa 2019,” conducted by World Wide Worx in partnership with Trend Micro and VMware.

 

Read more Source: http://www.business-it.co.za/ransomware-a-growing-threat-to-sa-organisations/

Users abandon Windows 7 as 2020 time bomb nears

Windows 7 users are beginning to abandon their ageing software and finally upgrade their devices to Windows 10 in greater numbers.
According to data from NetMarketShare, the number of users still running Windows 7 worldwide has decreased dramatically over the last month.
The trend over the past year has been the slow decline of Windows 7’s market share in favour of Windows 10, but this has accelerated recently.
One major factor which could have contributed to the sharp decline of Windows 7 user numbers is the looming end-of-life deadline set out by Microsoft.
The company has stated on numerous occasions that it will officially end support for Windows 7 on 14 January 2020.
Despite this quickly-approaching deadline, however, almost a third of all PC users in the world are still using the older operating system.

Read more Source : https://mybroadband.co.za/news/software/315381-users-abandon-windows-7-as-2020-time-bomb-nears.html

5 ways to detect a phishing email – with examples

Phishing is one of the most longstanding and dangerous methods of cyber crime.

Despite what people think they know about phishing, they consistently fall victim.

According to Verizon’s 2019 Data Breach Investigations Report, 32% of all cyber attacks involved phishing.

In this blog, we use real-life examples to demonstrate five clues to help you spot phishing scams.

Source: https://www.itgovernance.co.uk/blog/5-ways-to-detect-a-phishing-email