Stay focused to filter out cybersecurity threats

Loading player...
If you are worried about the threat of social engineering and the ways cybercriminals are looking to attack our most vulnerable assets, then this TCS+ conversation is not going to bring you much comfort. What it will do, though, is remind you that you are responsible for your actions and your inactions.
TCS+ welcomed Anna Collard back into the TechCentral studio to hear more about mindfulness and some of the techniques and tools we can apply to bring our emotional and physical selves into a more focused state.
Collard is senior vice president of content strategy and evangelist at KnowBe4 Africa and has a realistic perspective of the cybersecurity landscape. She promotes knowledge sharing and skills transfer while also sharing practical insights into cybersecurity and how susceptible we are to social engineering tricks if we are not mindful.
Given the complexity of generative AI and the interdisciplinary nature of AI research, the tech giants (Amazon, Microsoft, Apple and Meta, for example) are likely to form more partnerships with academic institutions, research organisations and brands, agencies and other companies that may not have well-considered regulations. This is all happening while AI technologies are becoming more powerful and widespread and Collard hints at the growing concern around the ethical and societal implications of AI.
This is where critical thinking comes into play. Collard suggests that it is everyone's responsibility to pause, reflect on their gut feel and question anything that may be at all suspicious. It is our responsibility to seek advice and sound the alarm if necessary.
She encourages companies to invest more in developing guidelines, tools and procedures to ensure the responsible use of AI and to encourage awareness and vigilance. This includes being transparent about your use of AI, your decision-making methods, how to mitigate against bias, enhance privacy protection and much more.
The goal is to keep the mind active and employ very specific decision-making when confronted by potential phishing e-mails or cyber threats,” said Collard. “Cybercriminals, as well as fake news, use emotionally triggering content such as fear, greed or curiosity to trick us out of critical thinking. If we learn to use our heightened emotions as early warning signs, applying mindfulness techniques to quieten down and pay attention before we react, we can remain in control, focus better and in turn prevent cyberattacks.”
Security training is essential for modern business, particularly when it comes to giving employees the tools they need to recognise threats and make informed decisions. However, as the world moves through the fallout from the pandemic, global uncertainty and ongoing stress, adding a wellness dimension to security training is fast becoming a critical factor in ensuring that the training kicks in when tiredness takes over.
In South Africa, there are multiple external factors also contributing to the burnout and stress cycle of cyberattacks on the workplace and in our personal lives. A timely example is that of load shedding, which has reached a critical level and has put immense pressure on people to perform fast and within tight windows of opportunity.
It has also damaged systems, introduced technology quirks and left people frantically clicking to get working. This scenario introduces vulnerabilities such as poor awareness and heightened stress levels that may very easily be taken advantage of by hackers.
21 Jun 2023 English South Africa Technology · Business

Other recent episodes

Just how secure is your cloud database?

In the second episode of this series on migrating to Microsoft Azure SQL, the focus turns to what’s involved in moving from SQL Server to Azure SQL, and First Distribution’s Preegan Chetty returns to discuss the key priority of securing databases in the cloud. If you missed episode 1 in…
19 Dec 12 min

Moving from SQL Server to Azure SQL – what you need to know

Is your company thinking about modernising its IT infrastructure? Is it planning to migrate from an on-premises Microsoft SQL Server database to the cloud-based Azure SQL Solution? Then this podcast is for you. In this two-part series, we delve into greater detail on what’s involved in a cloud database migration…
18 Dec 14 min

Bolt doubling down on safety for riders and drivers

The operating environment in South Africa for ride-hailing services like Bolt is fraught with complexity, while the country’s crime problem only contributes to the challenge of getting passengers safely from A to B. This complexity is compounded by the nuances of operating in different areas. Municipal districts have different permitting…
17 Dec 13 min

Beware the Toxic Cloud Trilogy – a discussion with Tenable

Companies moving to the cloud – and those already there – need to be aware of the Toxic Cloud Trilogy, three pitfalls in cloud computing that must be avoided. Bernard Montel, technical director at exposure management company Tenable for Europe, the Middle East and Africa, recently unpacked this for TechCentral’s…
6 Dec 22 min

Why your company needs network monitoring as a service

Trace Network Operations, founded in 2016, provides bespoke network solutions in network management and network monitoring. Company founder Darryl Theron saw a gap in the market for a company that provides leading solutions in this space, stemming from his many years of experience in the pan-African infrastructure market. This episode…
5 Dec 33 min