Musato Technologies Blog – Page 69 of 74 – Musato Technologies
loader image

We enable business and digital transformation decisions through the delivery of cutting-edge ICT solutions and products...





Musato Technologies

Get inspired…

  
  
  

The modern guide to staying safe online

Keeping safe and productive online requires smart decision-making and just the right preventive measures to fit the level of risk you can live with.- Staying safe online

The internet can be a scary place. Threats come in many forms, lurking in practically any corner. Worse, yesterday’sStaying Safe Online prevailing advice for staying safe online — avoid dodgy websites, don’t traffic in stolen or illegal goods, interact only with people you know — no longer holds. Phishing emails from supposed family members, spyware piggybacking on legitimate apps, well-known sites hijacked with malicious code — digital safety clearly needs new rules to meet today’s evolving threatscape.

Considering how much of our digital lives occurs online — communications, financial transactions, entertainment, work, education, to name a few — adopting even a few safe browsing practices can lead to broad benefits. And this includes how we deal with email messages as well, given how popular email is as a delivery mechanism for online attacks using exploit kits and malware.

Here, we provide a strategic guide for staying safe online, outlining what you can do to protect your data and privacy on the web, while remaining productive. Continue reading

Internet freedom across Africa: The thorny issue

Human beings are a very odd species. They don’t regard themselves as just another group of the myriad creatures that share this spinning orb we call Earth. No – they are a super-species, reinforced by the notion that they have “rights”. No other species has rights (other than those “granted” by humans).Internet freedom
After millions of years of evolution, we have arrived at the point where the development of technology ensures the supremacy of humans to the detriment of most other species. Even so, Nature still applies the “survival of the fittest” rule, so the supremacy is not universally beneficial. This means humans have a quality of life that ranges from luxurious to pitiful. Some humans use technology to oppress, others become oppressed through being denied access to technology.

How do rights fit into this scenario? Why are rights necessary? They are there to protect individuals and communities from the actions of others that would be detrimental to the continued existence of said individuals and communities. Which presumes that some members of the species will behave in such detrimental fashion. So, humans need to be protected from themselves. As I said, an odd species. Continue reading

This gallery contains 1 photo.

Five scams employees still fall for

Human nature may be to blame for many security breaches, but there are ways to help employees shed their bad habits and avoid these scams.Scams

You’ve trained them. You’ve deployed simulated phishing tests. You’ve reminded your employees countless times with posters and games and emails about avoiding phishing scams. Still, they keep falling for the same ploys they’ve been warned about for years.

It’s enough to drive security teams to madness. According to Verizon’s 2016 Data Breach Investigation Report, 30 percent of phishing messages were opened by their intended target, and about 12 percent of recipients went on to click the malicious attachment or link that enabled the attack to succeed.

A year earlier, only 23 percent of users opened the email, which suggests that employees are getting worse at identifying phishing emails — or the bad guys are finding more creative ways to outsmart users.
The consequences of a security breach caused by human error are bigger than ever. Continue reading