CSAM Theme 4 – Scams Article

Scams come in various shapes and forms and generally fall into four high-level categories: • Stealing personal information • Buying/selling goods and services • Dating and romance • Threats and extortion Other scams such as threats and extortion, fake charities, employment and get rich quick scams make up the balance. Scams that attempt to steal…

Social media and civil unrest: Stoking the sparks of hatred

In the recent spate of events, saboteurs under the guise of rioting have managed to incite the public to loot and destroy apparently in support of former president Jacob Zuma, who now sits in Prison convicted for contempt of court. His faction within the ANC was able to communicate via Whatsapp to coordinate the obliteration…

Free Cybersecurity Career Guidance for Young Guns and Old Bulls 2021

Free Cybersecurity Career Guidance for Young Guns and Old Bulls 2021 Unbeknown to many graduates who mostly learn about coding or Information Technology (IT) at university, the cybersecurity field is massive and offers a great career opportunity for those willing to invest in it. I have been in this industry for nearly two decades, hired…

Insider Threats and Mitigations

Insider threats can be malicious or unintentional, but the unifying factor is that the threat agent, in this case, is someone who has or has had authorised access to the organisation’s information assets. According to “The Common Sense Guide to Mitigating Insider Threats, 5th Edition”, published by “The CERT Insider Threat Center”, insiders/insider threats can…