joomla templates top joomla templates template joomla

InfoReg’s patience with POPIA violators is coming to an end

Written by Simnikiwe Mzekandaba IT in Government Editor. Posted in Resources

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

 

Despite the spate of data compromises in SA, none of the organisations that suffered a data breach have been fined, the Information Regulator has revealed.

South Africa’s data privacy legislation − the Protection of Personal Information Act (POPIA) − came into force on 1 July 2021, following a year-long grace period for organisations to comply with the Act.

Life Healthcare reveals damage caused by data breach

Written by Sibahle Malinga, ITWeb senior news journalist. Posted in Resources

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Life Healthcare Group, the second largest private hospital operator in SA, says it has “substantially” restored its IT systems following the cyber attack that crippled its operations in June and July.

The hospital group was hit by the cyber attack, in the midst of the COVID-19 outbreak, in the second week of June.

The Right to be Forgotten under Privacy legislation!

Written by admin. Posted in Resources

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

One aspect of GDPR that has received a lot of attention is the ‘Right to be Forgotten’ which is outlined in Article 17 entitled “Right to Erasure (’right to be forgotten’)”. It states:
“The data subject shall have the right to obtain from the controller the erasure of personal data concerning him or her without undue delay and the controller shall have the obligation to erase personal data without undue delay where one of the following grounds applies:

A SECURE USER-FRIENDLY WAY TO SEND EMAIL

Written by The KEPT Team. Posted in Resources

User Rating: 5 / 5

Star ActiveStar ActiveStar ActiveStar ActiveStar Active

Sending an email message is like sending a postcard,
Anyone can read it. says scientist Andy Yen in this thought-provoking talk:

Yet encryption, the technology that protects the privacy of email communication, does exist. It's just that until now it has been difficult to install and a hassle to use. Showing a demo of an email program he designed with colleagues at CERN, Yen argues that encryption can be made simple to the point of becoming the default option, providing true email privacy to all.   Watch the video

SA healthcare sector ill-equipped to deal with cyber crime

Written by Sibahle Malinga, ITWeb senior news journalist. Posted in Resources

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

SA’s healthcare sector is woefully ill-equipped to deal with the global increase in cyber attacks driven by the COVID-19 pandemic.

This is according to research conducted by local domain-based message authentication, reporting and conformance security firm Sendmarc, which warns that the personal data of healthcare patients has emerged as the most valuable to cyber criminals, as they capitalise on the uncertainty caused by COVID-19 to conduct malicious cyber activities.

While COVID-19 is proving to be a boon for cyber criminals across sectors, attacks on healthcare institutions are more lucrative for criminals, with the malicious actors expected to intensify their campaigns and ransomware attacks in the coming months.

Where is cybercrime really coming from?

Written by Super User. Posted in Resources

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

 

Please do watch this TED Talk and  keep  in mind that one of the primary loopholes in cybercrime is that we keep doing things the same way.. By this i mean we continue to trust all our personal data incuding our identities to organisations that really are not ready to protect it! 
Click continue reading to watch...

Rise Of The Hackers - Social Engineering Segment

Written by Super User. Posted in Resources

User Rating: 5 / 5

Star ActiveStar ActiveStar ActiveStar ActiveStar Active
Published on Oct 17, 2014

This segment of the PBS Nova episode named "Rise of the Hackers" from September 2014 tells the tale of a sophisticated computer person being hacked purely through the use of Social Engineering, no malware of virus was required. Social engineering takes advantage of weaknesses in exsisting social or internet platforms to fool organisations and also use ID Fraud to pose as you to piggy back from one platform through to the next until the desired target platform is compromised.

Watch this video to get a better understanding of what this is.

Identity Theft Documentary: An Educational Documentary

Written by Super User. Posted in Resources

User Rating: 3 / 5

Star ActiveStar ActiveStar ActiveStar InactiveStar Inactive
Published on Jul 16, 2012 

Identity Theft is when someone uses your Identity and personal information to either open credit account, which the thief then drains leaving the dept in your name or when they pretend to be you to use your existing funds and credit to purchase expensive items which they later liquidate for cash, effectively emptying your accounts. This fraud is the the most horrendous because they are destroying your credibility. Most victims struggle for years to recover if ever at all! This documentary exposes this phenomenon and explains just how you can become a victim.

Watch this video to get a better understanding of what this is.

KEPT Users Online

KEPT - One Identity!