
Peter Mbele
Total 10 Posts
While total security is a myth, good security is not
Information security breaches seem to be prevalent lately in technology news being reported on the internet. Total protection from information security breaches is not possible because unethical hackers with enough resources, money, time and motivation can hack into almost any system. This being the reason why most countries are starting
Information security shouldn't be an after thought when designing Internet services
Free Wi-Fi seems to be a much talked about issue these days - from those wanting it and those companies offering it. Truth be told, Wi-Fi or rather free Wi-Fi, is a great thing to have. Also, with the South African government's push of increasing broadband access, these free Wi-Fi
Cyber-crime Threat and Mitigation
South Africa has been ranked as having the third largest number of cybercrime victims - second only to China and Russia. According the CyberThreat Barometer 2012/3, released by Wolfpack Information Risk, direct losses to cybercrime in South Africa between January 2011 and August 2012 were R2.65 billion, with
Information Security Awareness
Oft times when information security professionals talk about information security, you will no doubt hear a three letter acronym that may confuse some: C.I.A - and no, it's not the Central Intelligence Agency. When talking of the C.I.A. we refer to the three-pronged structure upon which
Is Safe and Free Wi-Fi Possible?
Free Wi-Fi seems to be a much talked about issue these days - from those wanting it and those companies offering it; and, truth be told, Wi-Fi or rather free Wi-Fi, is a great thing to have (Easy access of internet services to those 65 % who have formerly not been
Secure Your Site with HSTS
I'm pretty sure by now that almost everyone has heard of the NSA saga, I even heard my non-techie friends tell me how 'bad things have become on the internet' the NSA story broke out. Considering how powerful the NSA is, they can pretty much mess around with you as
Importance of Ongoing Information Security Training
Imagine if every employee in your company knew how to identify a phishing attack and knew how to respond to various threats and incidents that may, and certainly will, happen in most companies. Imagine if all your employees knew how to store, share, access and dispose of data in a